ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-4q69-q4q7-x82c
|
High severity vulnerability that affects rendertron
|
Rendertron 1.0.0 includes an _ah/stop route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application.
|
{'CVE-2017-18353'}
|
2021-09-01T17:52:46Z
|
2019-01-04T17:41:46Z
|
HIGH
| null | null |
{'https://github.com/GoogleChrome/rendertron', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353', 'https://github.com/advisories/GHSA-4q69-q4q7-x82c', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
| null |
npm
|
GHSA-f4hq-453j-p95f
|
Open redirect in Slashify
|
The package is an Express middleware that normalises routes by stripping any final slash, redirecting, for example, `bookings/latest/` to `bookings/latest`. However, it does not validate the path it redirects to in any way. In particular, if the path starts with two slashes (or two backslashes, or a slash and a backslash, etc.) it may redirect to a different domain.
Consider the [example from the docs](https://www.npmjs.com/package/slashify#usage). Assume we have run it and started a server on `localhost:3000`, then visiting `localhost:3000///github.com/` redirects you to https://github.com.
## Recommendation
This vulnerability is currently un-patched in the `slashify` package so there is no known safe version of this package. Discontinuing use of `slashify` is recommended.
|
{'CVE-2021-3189'}
|
2021-04-02T13:58:31Z
|
2021-02-05T20:43:34Z
|
HIGH
| null |
{'CWE-601'}
|
{'https://security.netapp.com/advisory/ntap-20210401-0004/', 'https://www.npmjs.com/package/slashify', 'https://github.com/divshot/slashify', 'https://securitylab.github.com/advisories/GHSL-2020-199-open-redirect-slashify', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3189'}
| null |
npm
|
GHSA-fv9m-f7w4-889c
|
Exfiltrates Discord login tokens to pastebin in discordi.js
|
The `discordi.js` package is malware that attempts to discover and exfiltrate a user's [Discord](https://discordapp.com/) credentials, sending them to pastebin.
All versions have been unpublished from the npm registry.
## Recommendation
Do not install / use this module. It has been unpublished from the npm registry but may exist in some caches. Any users that logged into Discord using this library will need to change their credentials.
|
{'CVE-2017-16207'}
|
2020-08-31T18:27:12Z
|
2018-08-06T21:43:03Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/545', 'https://github.com/advisories/GHSA-fv9m-f7w4-889c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16207', 'https://www.npmjs.com/advisories/545'}
| null |
npm
|
GHSA-qcc9-q247-3m2m
|
Malicious Package in js-regular
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:17:10Z
|
2020-09-03T19:46:49Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1129'}
| null |
npm
|
GHSA-qx4v-6gc5-f2vv
|
Regular Expression Denial of Service
|
A Regular Expression Denial of Service vulnerability was discovered in esm before 3.1.0. The issue is that esm's find-indexes is using the unescaped identifiers in a regex, which, in this case, causes an infinite loop.
| null |
2021-02-25T17:20:28Z
|
2019-06-20T14:32:56Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b', 'https://github.com/standard-things/esm/issues/694'}
| null |
npm
|
GHSA-58g2-9fqr-36q2
|
Prototype Pollution in Proto
|
This affects all versions of package Proto. It is possible to inject pollute the object property of an application using Proto by leveraging the merge function.
|
{'CVE-2021-23426'}
|
2021-09-10T17:08:40Z
|
2021-09-02T22:01:01Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/adriancmiranda/Proto', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23426', 'https://snyk.io/vuln/SNYK-JS-PROTO-1316301', 'https://www.npmjs.com/package/Proto'}
| null |
npm
|
GHSA-pgf8-28gg-vpr6
|
Path traversal
|
### Impact
A malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API.
This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API.
### Patches
The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
|
{'CVE-2021-32662'}
|
2021-06-07T18:55:30Z
|
2021-06-04T19:09:20Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32662', 'https://github.com/backstage/backstage/releases/tag/release-2021-05-27', 'https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6', 'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208'}
| null |
npm
|
GHSA-j665-rvj7-2jv9
|
Code Injection in mosc
|
mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution.
|
{'CVE-2020-7672'}
|
2021-07-29T18:11:51Z
|
2021-05-17T21:00:17Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7672', 'https://snyk.io/vuln/SNYK-JS-MOSC-571492'}
| null |
npm
|
GHSA-q42c-rrp3-r3xm
|
Malicious Package in commmander
|
All versions of `commmander` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
## Recommendation
Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
| null |
2021-09-30T22:02:15Z
|
2020-09-11T21:13:44Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/923'}
| null |
npm
|
GHSA-rj38-87f3-93p6
|
Downloads Resources over HTTP in limbus-buildgen
|
Affected versions of `limbus-buildgen` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `limbus-buildgen`.
## Recommendation
Update to version 0.1.1 or later.
|
{'CVE-2016-10674'}
|
2021-01-07T22:31:53Z
|
2019-02-18T23:42:27Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/276', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10674', 'https://www.npmjs.com/advisories/276', 'https://github.com/advisories/GHSA-rj38-87f3-93p6'}
| null |
npm
|
GHSA-46hv-7769-j7rx
|
Unauthorized File Access in harp
|
Affected versions of `harp` are vulnerable to Unauthorized File Access. The package states that it ignores files and directories with names that start with an underscore, such as `_secret-folder`. If the underscore character is URL encoded the server delivers the file.
## Recommendation
Upgrade to version `0.40.2` or later.
|
{'CVE-2019-5437'}
|
2021-06-03T17:09:41Z
|
2019-06-13T16:12:22Z
|
MODERATE
| null |
{'CWE-548'}
|
{'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210', 'https://www.npmjs.com/advisories/807', 'https://hackerone.com/reports/453820', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5437'}
| null |
npm
|
GHSA-6343-m2qr-66gf
|
Malicious Package in js-sja3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:14:57Z
|
2020-09-03T23:10:41Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1291'}
| null |
npm
|
GHSA-w457-6q6x-cgp9
|
Prototype Pollution in handlebars
|
Versions of `handlebars` prior to 3.0.8 or 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' `__proto__` and `__defineGetter__` properties, which may allow an attacker to execute arbitrary code through crafted payloads.
## Recommendation
Upgrade to version 3.0.8, 4.3.0 or later.
|
{'CVE-2019-19919'}
|
2021-07-26T21:51:06Z
|
2019-12-26T17:58:13Z
|
CRITICAL
| null |
{'CWE-74'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19919', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919', 'https://github.com/wycats/handlebars.js/issues/1558', 'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc', 'https://www.npmjs.com/advisories/1164'}
| null |
npm
|
GHSA-g37j-v5gh-g25c
|
Malicious Package in js-shi3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:14:07Z
|
2020-09-03T23:06:48Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1288'}
| null |
npm
|
GHSA-49c6-3wr4-8jr4
|
Malicious Package in malicious-npm-package
|
All versions of `malicious-npm-package` contain malicious code. The malware targets Windows systems. It runs a powershell command that downloads an executable file from a remote server and runs it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:07:48Z
|
2020-09-04T15:05:26Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1323'}
| null |
npm
|
GHSA-hxxf-q3w9-4xgw
|
Malicious Package in eslint-scope
|
Version 3.7.2 of `eslint-scope` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to 2 remote servers.
## Recommendation
The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
| null |
2021-09-14T17:35:41Z
|
2018-07-12T19:52:02Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://github.com/eslint/eslint-scope/issues/39', 'https://snyk.io/vuln/SNYK-JS-ESLINTSCOPE-11120', 'https://github.com/advisories/GHSA-hxxf-q3w9-4xgw', 'https://www.npmjs.com/advisories/673', 'https://eslint.org/blog/2018/07/postmortem-for-malicious-package-publishes', 'https://github.com/eslint/eslint-scope'}
| null |
npm
|
GHSA-8g4m-cjm2-96wq
|
Sandbox escape in notevil and argencoders-notevil
|
This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878). This package has been deprecated.
|
{'CVE-2021-23771'}
|
2022-03-25T16:47:42Z
|
2022-03-18T00:01:11Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23771', 'https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946', 'https://github.com/mmckegg/notevil', 'https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587'}
| null |
npm
|
GHSA-6jmr-jfh7-xg3h
|
False-positive validity for NFT1 genesis transactions
|
### Impact
In the npm package named "slp-validate", versions prior to 1.2.2 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification.
### Patches
npm package "slp-validate" has been patched and is published and tagged as version 1.2.2.
### Workarounds
Upgrade to slp-validate 1.2.2.
### References
* Package location: https://www.npmjs.com/package/slp-validate
* SLP NFT1 spec: https://slp.dev/specs/slp-nft-1/#nft1-protocol-requirements
* Git commit hash fixing this issue: https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c
* Unit tests have been added to assist validator implementations in avoiding this bug: https://github.com/simpleledger/slp-unit-test-data/commit/8c942eacfae12686dcf1f3366321445a4fba73e7
### For more information
If you have any questions or comments about this advisory please open an issue in the [slp-validate](https://github.com/simpleledger/slp-validate.js/issues) repository.
|
{'CVE-2020-15131'}
|
2021-01-08T21:00:17Z
|
2020-07-30T14:58:53Z
|
CRITICAL
| null |
{'CWE-697'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15131', 'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c', 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-6jmr-jfh7-xg3h'}
| null |
npm
|
GHSA-j59f-6m4q-62h6
|
Improper Key Verification in ipns
|
Versions 0.1.1 or 0.1.2 of `ipns` are vulnerable to improper key validation. This is due to the public key verification was not being performed properly, resulting in any key being valid.
## Recommendation
Update to version 0.1.3 or later.
| null |
2021-08-04T21:17:50Z
|
2019-05-30T17:28:48Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0', 'https://www.npmjs.com/advisories/693'}
| null |
npm
|
GHSA-x6fg-f45m-jf5q
|
Regular Expression Denial of Service in semver
|
Versions 4.3.1 and earlier of `semver` are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed.
## Recommendation
Update to version 4.3.2 or later
|
{'CVE-2015-8855'}
|
2021-09-21T22:15:35Z
|
2017-10-24T18:33:36Z
|
HIGH
| null | null |
{'https://nodesecurity.io/advisories/31', 'https://www.npmjs.com/advisories/31', 'http://www.securityfocus.com/bid/86957', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8855', 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS', 'https://github.com/advisories/GHSA-x6fg-f45m-jf5q', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-p33q-w45h-2hcj
|
Malicious Package in 4equest
|
All versions of `4equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:44:09Z
|
2020-09-02T18:30:03Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/837'}
| null |
npm
|
GHSA-55r9-7mf8-m382
|
Cross-site Scripting in edge.js
|
Edge is a logical and batteries included template engine for Node.js. This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.
|
{'CVE-2021-23443'}
|
2022-05-04T03:38:31Z
|
2021-09-22T20:36:46Z
|
MODERATE
| null |
{'CWE-79', 'CWE-843'}
|
{'https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556', 'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21', 'https://github.com/edge-js/edge', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23443'}
| null |
npm
|
GHSA-pfr3-87q3-65rc
|
Cross-site Scripting in vmd
|
vmd through 1.34.0 allows 'div class="markdown-body"' XSS, as demonstrated by Electron remote code execution via require('child_process').execSync('calc.exe') on Windows and a similar attack on macOS.
|
{'CVE-2021-33041'}
|
2021-05-25T20:47:12Z
|
2022-02-10T23:46:28Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33041', 'https://github.com/yoshuawuyts/vmd/issues/137', 'https://www.npmjs.com/package/vmd'}
| null |
npm
|
GHSA-vp77-fqqp-79j8
|
Prototype Pollution in decal
|
This affects all versions of package decal. The vulnerability is in the set function.
|
{'CVE-2020-28449'}
|
2021-03-22T22:39:06Z
|
2021-04-13T15:20:27Z
|
HIGH
| null |
{'CWE-400', 'CWE-1321'}
|
{'https://www.npmjs.com/package/decal', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28449', 'https://github.com/gigafied/decal.js/blob/master/src/utils/set.js%23L45-L73', 'https://snyk.io/vuln/SNYK-JS-DECAL-1051007'}
| null |
npm
|
GHSA-mgv2-57vj-99xc
|
Low severity vulnerability that affects eye.js
|
## Test breaking
### Impact
In v1.2.0, tests are broken: all tests are always succeeding. If tests are looking for security vulnerabilities, these were compromised.
### Patches
Users should upgrade to `v1.2.1`
### Workarounds
Users who don't use eye.js for looking for vulnerabilities are safe. Upgrading will just fix some bugs.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [EyeJS](https://github.com/arguiot/EyeJS)
* Email us at [arguiot@gmail.com](mailto:arguiot@gmail.com)
| null |
2021-12-03T14:39:45Z
|
2019-10-07T16:54:24Z
|
LOW
| null | null |
{'https://github.com/arguiot/EyeJS', 'https://github.com/advisories/GHSA-mgv2-57vj-99xc', 'https://github.com/arguiot/EyeJS/security/advisories/GHSA-mgv2-57vj-99xc'}
| null |
npm
|
GHSA-2wpq-vvw6-67wr
|
Hijacked Environment Variables in nodecaffe
|
The `nodecaffe` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16070'}
|
2021-09-16T20:56:28Z
|
2018-08-29T23:38:35Z
|
CRITICAL
| null |
{'CWE-506', 'CWE-433'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16070', 'https://nodesecurity.io/advisories/509', 'https://www.npmjs.com/advisories/509'}
| null |
npm
|
GHSA-p7w2-mc6m-mfx2
|
Malicious Package in scroool
|
Version 0.1.7 of `scroool` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:26Z
|
2020-09-11T21:22:25Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/944'}
| null |
npm
|
GHSA-f2c5-997w-7f5c
|
Cross-site Scripting in peertube
|
peertube is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). It was found that one could upload a SVG image and then send the url of that to other users and when they open the link we can get their complete session keys as the session keys stored in local storage and with Javascript easily can be stolen by attackers.
|
{'CVE-2021-3780'}
|
2021-09-24T13:07:20Z
|
2021-09-20T20:42:41Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65', 'https://github.com/chocobozzz/peertube', 'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3780'}
| null |
npm
|
GHSA-qjf4-7642-c57p
|
Downloads Resources over HTTP in unicode
|
Affected versions of `unicode` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Update to version 9.0.0 or later.
|
{'CVE-2016-10578'}
|
2021-01-08T21:18:41Z
|
2019-02-18T23:51:52Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/161', 'https://nodesecurity.io/advisories/161', 'https://github.com/advisories/GHSA-qjf4-7642-c57p', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10578'}
| null |
npm
|
GHSA-488m-6gh8-9j36
|
Moderate severity vulnerability that affects bracket-template
|
bracket-template suffers from reflected XSS possible when variable passed via GET parameter is used in template
|
{'CVE-2018-3735'}
|
2020-06-16T20:57:50Z
|
2018-07-27T17:05:06Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/317125', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3735', 'https://github.com/advisories/GHSA-488m-6gh8-9j36'}
| null |
npm
|
GHSA-mx3x-ghqm-r43h
|
Prototype pollution vulnerability in 'predefine'
|
Prototype pollution vulnerability in 'predefine' versions 0.0.0 through 0.1.2 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28280'}
|
2021-10-08T22:13:34Z
|
2021-10-12T16:27:18Z
|
CRITICAL
| null | null |
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28280', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280', 'https://github.com/bigpipe/predefine', 'https://github.com/bigpipe/predefine/blob/238137e3d1b8288ff5d7529c3cbcdd371888c26b/index.js#L284'}
| null |
npm
|
GHSA-p82g-2xpp-m5r3
|
Cross-Site Scripting in dojo
|
Versions of `dojo` prior to 1.2.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize HTML code in user-controlled input, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 1.2.0 or later.
|
{'CVE-2015-5654'}
|
2021-09-28T16:55:57Z
|
2020-09-11T21:18:05Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/973', 'http://www-01.ibm.com/support/docview.wss?uid=swg21975256', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000153', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5654', 'http://www.securityfocus.com/bid/77026', 'https://snyk.io/vuln/SNYK-JS-DOJO-174933', 'http://jvn.jp/en/jp/JVN13456571/index.html', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5654', 'http://www.securitytracker.com/id/1034848'}
| null |
npm
|
GHSA-4gp3-p7ph-x2jr
|
OS Command Injection in devcert-sanscache
|
devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization.
|
{'CVE-2019-10778'}
|
2021-08-23T15:12:51Z
|
2020-04-14T23:09:00Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10778', 'https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926'}
| null |
npm
|
GHSA-3mpr-hq3p-49h9
|
Prototype Pollution in mixin-deep
|
Versions of `mixin-deep` before 1.3.1 are vulnerable to prototype pollution via merging functions.
## Recommendation
Update to version 1.3.1 or later.
|
{'CVE-2018-3719'}
|
2020-08-31T18:28:31Z
|
2018-07-26T15:10:54Z
|
LOW
| null |
{'CWE-471'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3719', 'https://github.com/advisories/GHSA-3mpr-hq3p-49h9', 'https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c', 'https://hackerone.com/reports/311236', 'https://www.npmjs.com/advisories/578'}
| null |
npm
|
GHSA-ww4j-c2rq-47q8
|
Command injection in ts-process-promises
|
This affects all versions of package ts-process-promises. The injection point is located in line 45 in main entry of package in lib/process-promises.js.
|
{'CVE-2020-7784'}
|
2021-01-12T23:54:52Z
|
2021-01-13T18:22:28Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7784', 'https://snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334'}
| null |
npm
|
GHSA-7vq3-wcjw-3fxh
|
Directory Traversal in lab6.brit95
|
Affected versions of `lab6.brit95` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16140'}
|
2020-08-31T18:24:33Z
|
2018-07-23T20:48:53Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-7vq3-wcjw-3fxh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16140', 'https://nodesecurity.io/advisories/475', 'https://www.npmjs.com/advisories/475', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6.brit95'}
| null |
npm
|
GHSA-83rx-c8cr-6j8q
|
Insecure Default Configuration in tesseract.js
|
Versions of `tesseract.js` prior to 1.0.19 default to using a third-party proxy. Requests may be proxied through `crossorigin.me` which clearly states is not suitable for production use. This may lead to instability and privacy violations.
## Recommendation
Upgrade to version 1.0.19 or later.
| null |
2021-08-04T21:33:58Z
|
2019-06-05T20:48:55Z
|
MODERATE
| null |
{'CWE-829'}
|
{'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28', 'https://www.npmjs.com/advisories/792', 'https://snyk.io/vuln/SNYK-JS-TESSERACTJS-174085', 'https://github.com/naptha/tesseract.js/pull/267'}
| null |
npm
|
GHSA-rjqq-98f6-6j3r
|
Improper Input Validation in sanitize-html
|
Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.
|
{'CVE-2021-26539'}
|
2022-04-27T19:14:02Z
|
2021-05-06T16:10:05Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/apostrophecms/sanitize-html/pull/458', 'https://github.com/apostrophecms/sanitize-html', 'https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#231-2021-01-22', 'https://advisory.checkmarx.net/advisory/CX-2021-4308', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26539'}
| null |
npm
|
GHSA-g2c4-4m64-vxm3
|
Malicious Package in buffer-yor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:25:10Z
|
2020-09-03T22:15:25Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1254'}
| null |
npm
|
GHSA-c27r-x354-4m68
|
HMAC-SHA1 signatures can bypass validation via key confusion
|
### Impact
An attacker can inject an HMAC-SHA1 signature that is valid using only knowledge of the RSA public key. This allows bypassing signature validation.
### Patches
Version 2.0.0 has the fix.
### Workarounds
The recommendation is to upgrade. In case that is not possible remove the 'http://www.w3.org/2000/09/xmldsig#hmac-sha1' entry from SignedXml.SignatureAlgorithms.
| null |
2020-10-27T20:35:52Z
|
2020-10-27T20:39:46Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://github.com/yaronn/xml-crypto/security/advisories/GHSA-c27r-x354-4m68', 'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100', 'https://www.npmjs.com/package/xml-crypto'}
| null |
npm
|
GHSA-qmxf-fxq7-w59f
|
Malicious Package in angular-material-sidenav-rnd
|
Version 0.1.1 of `angular-material-sidenav-rnd` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T14:46:00Z
|
2020-09-01T19:43:53Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/615', 'https://github.com/sovanna/angular-material-sidenav', 'https://snyk.io/vuln/SNYK-JS-ANGULARMATERIALSIDENAVRND-451015', 'https://github.com/musabgosset/angular-material-sidenav'}
| null |
npm
|
GHSA-h3cq-j957-vhxg
|
Cross-site Scripting in fullpage.js
|
using fullpage.js you can create a anchor tag . But when put href in anchor then it does not sanitize the url which allow for a break in the context of anchor element and can add our new element.
|
{'CVE-2022-1330'}
|
2022-04-22T20:26:49Z
|
2022-04-13T00:00:16Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1330', 'https://github.com/alvarotrigo/fullpage.js', 'https://huntr.dev/bounties/08d2a6d0-772f-4b05-834e-86343f263c35', 'https://github.com/alvarotrigo/fullpage.js/commit/e7a5db42711700c8a584e61b5e532a64039fe92b', 'https://github.com/alvarotrigo/fullPage.js/pull/4360'}
| null |
npm
|
GHSA-724c-6vrf-99rq
|
Sensitive Data Exposure in loopback
|
Versions of `loopback` prior to 3.26.0 (3.x) and 2.42.0 (2.x) are vulnerable to Sensitive Data Exposure. Invalid API requests to the login endpoint may return information about the first user in the database. This can be used alongside other attacks for credential theft.
## Recommendation
If you're using `loopback` 3.x upgrade to version 3.26.0 or later.
If you're using `loopback` 2.x upgrade to version 2.42.0 or later.
| null |
2021-09-27T22:31:27Z
|
2020-09-02T21:49:48Z
|
LOW
| null |
{'CWE-200'}
|
{'https://github.com/strongloop/loopback/issues/4195', 'https://loopback.io/doc/en/sec/Security-advisory-06-17-2019.html', 'https://www.npmjs.com/advisories/915', 'https://github.com/strongloop/loopback'}
| null |
npm
|
GHSA-x6ch-c6rv-f7wh
|
Malicious Package in asymc
|
All versions of `asymc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:46:49Z
|
2020-09-02T18:34:22Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/841'}
| null |
npm
|
GHSA-4pf7-579w-f4gm
|
Downloads Resources over HTTP in dwebp-bin
|
Affected versions of `dwebp-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dwebp-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10633'}
|
2021-09-16T20:55:09Z
|
2019-02-18T23:57:04Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://github.com/advisories/GHSA-4pf7-579w-f4gm', 'https://www.npmjs.com/advisories/232', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10633', 'https://github.com/1000ch/dwebp-bin', 'https://nodesecurity.io/advisories/232'}
| null |
npm
|
GHSA-wpvm-wqr4-p7cw
|
Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4
|
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
|
{'CVE-2021-26272'}
|
2022-02-08T21:39:05Z
|
2021-10-13T15:34:09Z
|
MODERATE
| null |
{'CWE-829'}
|
{'https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26272', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
| null |
npm
|
GHSA-93q8-gq69-wqmw
|
Inefficient Regular Expression Complexity in chalk/ansi-regex
|
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3807'}
|
2022-04-26T21:00:26Z
|
2021-09-20T20:20:09Z
|
HIGH
| null |
{'CWE-1333'}
|
{'https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/chalk/ansi-regex/releases/tag/v6.0.1', 'https://github.com/chalk/ansi-regex', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311', 'https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994', 'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3807'}
| null |
npm
|
GHSA-r6rj-9ch6-g264
|
Prototype pollution in Merge-deep
|
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
|
{'CVE-2021-26707'}
|
2021-06-16T19:58:45Z
|
2021-06-07T22:09:26Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/package/merge-deep', 'https://securitylab.github.com/advisories/GHSL-2020-160-merge-deep/', 'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5', 'https://security.netapp.com/advisory/ntap-20210716-0008/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26707'}
| null |
npm
|
GHSA-c4qp-h3m6-785f
|
Downloads Resources over HTTP in ibm_db
|
Affected versions of `ibm_db` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Update to version 1.0.2 or later.
|
{'CVE-2016-10577'}
|
2021-01-08T19:01:22Z
|
2019-02-18T23:51:59Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10577', 'https://github.com/advisories/GHSA-c4qp-h3m6-785f', 'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94', 'https://nodesecurity.io/advisories/163', 'https://www.npmjs.com/advisories/163'}
| null |
npm
|
GHSA-5wqj-f379-6jh4
|
Command injection in kill-process-on-port
|
All versions of package kill-process-on-port are vulnerable to Command Injection via a.getProcessPortId.
|
{'CVE-2020-28426'}
|
2021-03-16T01:08:14Z
|
2021-03-19T21:19:47Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28426'}
| null |
npm
|
GHSA-8f93-rv4p-x4jw
|
SQL Injection in sql
|
All versions of `sql` are vulnerable to sql injection as it does not properly escape parameters when building SQL queries.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
| null |
2020-08-31T18:31:48Z
|
2019-06-12T16:36:52Z
|
MODERATE
| null |
{'CWE-89'}
|
{'https://hackerone.com/reports/319465', 'https://www.npmjs.com/advisories/662', 'https://nodesecurity.io/advisories/662'}
| null |
npm
|
GHSA-m7j4-fhg6-xf5v
|
Prototype pollution in datatables.net
|
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
|
{'CVE-2020-28458'}
|
2021-01-08T21:20:46Z
|
2020-12-17T21:00:50Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806', 'https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28458'}
| null |
npm
|
GHSA-785g-gx74-gr39
|
Malicious Package in js-wha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T14:35:20Z
|
2020-09-03T23:12:48Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1294'}
| null |
npm
|
GHSA-6c9x-mj3g-h47x
|
Spoofing attack in swagger-ui-dist
|
The swagger-ui-dist package before 4.1.3 for Node.js could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim.
|
{'CVE-2021-46708'}
|
2022-03-29T19:10:02Z
|
2022-03-12T00:00:36Z
|
MODERATE
| null |
{'CWE-1021'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46708', 'https://security.snyk.io/vuln/SNYK-JS-SWAGGERUIDIST-2314884', 'https://security.netapp.com/advisory/ntap-20220407-0004/', 'https://www.npmjs.com/package/swagger-ui-dist/v/4.1.3', 'https://github.com/swagger-api/swagger-ui'}
| null |
npm
|
GHSA-rrrm-qjm4-v8hf
|
Inefficient Regular Expression Complexity in marked
|
### Impact
_What kind of vulnerability is it?_
Denial of service.
The regular expression `block.def` may cause catastrophic backtracking against some strings.
PoC is the following.
```javascript
import * as marked from "marked";
marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`);
```
_Who is impacted?_
Anyone who runs untrusted markdown through marked and does not use a worker with a time limit.
### Patches
_Has the problem been patched?_
Yes
_What versions should users upgrade to?_
4.0.10
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources.
### References
_Are there any links users can visit to find out more?_
- https://marked.js.org/using_advanced#workers
- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [marked](https://github.com/markedjs/marked)
|
{'CVE-2022-21680'}
|
2022-01-14T19:56:20Z
|
2022-01-14T21:04:41Z
|
HIGH
| null |
{'CWE-1333'}
|
{'https://github.com/markedjs/marked/releases/tag/v4.0.10', 'https://github.com/markedjs/marked', 'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0', 'https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21680'}
| null |
npm
|
GHSA-x6hx-7gh3-3q98
|
Prototype Pollution in mootools
|
This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge()
|
{'CVE-2021-23432'}
|
2021-08-25T18:25:11Z
|
2021-09-02T17:09:30Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23432', 'https://github.com/vsviridov/mootools-node'}
| null |
npm
|
GHSA-52r9-g5g6-2hjp
|
Path Traversal in node-srv
|
Versions of `node-srv` before 2.1.1 are vulnerable to path traversal allowing a remote attacker to read files from the server that uses `node-srv`.
## Recommendation
Update to version 2.1.1 or later.
|
{'CVE-2018-3714'}
|
2020-08-31T18:28:55Z
|
2018-07-26T14:50:41Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/309124', 'https://www.npmjs.com/advisories/588', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3714', 'https://github.com/advisories/GHSA-52r9-g5g6-2hjp'}
| null |
npm
|
GHSA-x9hc-rw35-f44h
|
Sandbox Breakout / Arbitrary Code Execution in static-eval
|
Versions of `static-eval`prior to 2.0.2 pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.
## Proof of concept
```
var evaluate = require('static-eval');
var parse = require('esprima').parse;
var src = process.argv[2];
var payload = '(function({x}){return x.constructor})({x:"".sub})("console.log(process.env)")()'
var ast = parse(payload).body[0].expression;
console.log(evaluate(ast, {x:1}));
```
## Recommendation
Upgrade to version 2.0.2 or later.
| null |
2021-09-27T13:40:52Z
|
2020-09-02T15:46:03Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-STATICEVAL-173693', 'https://www.npmjs.com/advisories/758'}
| null |
npm
|
GHSA-q2c6-c6pm-g3gh
|
Arbitrary Code Execution in handlebars
|
Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It is due to an incomplete fix for a [previous issue](https://www.npmjs.com/advisories/1316). This vulnerability can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting).
## Recommendation
Upgrade to version 3.0.8, 4.5.3 or later.
| null |
2020-08-31T18:55:11Z
|
2020-09-04T15:07:38Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1324'}
| null |
npm
|
GHSA-xc7v-wxcw-j472
|
Memory Exposure in tunnel-agent
|
Versions of `tunnel-agent` before 0.6.0 are vulnerable to memory exposure.
This is exploitable if user supplied input is provided to the auth value and is a number.
Proof-of-concept:
```js
require('request')({
method: 'GET',
uri: 'http://www.example.com',
tunnel: true,
proxy:{
protocol: 'http:',
host:'127.0.0.1',
port:8080,
auth:USERSUPPLIEDINPUT // number
}
});
```
## Recommendation
Update to version 0.6.0 or later.
| null |
2020-08-31T18:29:19Z
|
2019-06-03T17:08:26Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0', 'https://www.npmjs.com/advisories/598', 'https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4'}
| null |
npm
|
GHSA-rfhr-62xp-2fp2
|
Open Redirect in trailing-slash
|
The package trailing-slash before 2.0.1 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::createTrailing(), as the web server uses relative URLs instead of absolute URLs.
|
{'CVE-2021-23387'}
|
2021-05-27T22:38:20Z
|
2021-06-08T23:19:21Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/fardog/trailing-slash/blob/f640ece055fe85275c983de5eb94661b95e35670/index.js%23L36', 'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23387', 'https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707'}
| null |
npm
|
GHSA-f7jg-mcvw-9gwv
|
Directory Traversal in reecerver
|
Affected versions of `reecerver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16188'}
|
2020-08-31T18:23:21Z
|
2018-07-23T20:40:40Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16188', 'https://github.com/advisories/GHSA-f7jg-mcvw-9gwv', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/reecerver', 'https://nodesecurity.io/advisories/443', 'https://www.npmjs.com/advisories/443'}
| null |
npm
|
GHSA-mm7h-323r-9p4g
|
Downloads Resources over HTTP in imageoptim
|
imageoptim is a Node.js wrapper for some images compression algorithms.
imageoptim downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested tarball with an attacker controlled tarball if the attacker is on the network or positioned in between the user and the remote server.
## Recommendation
No fix is currently available for this vulnerability.
It is our recommendation to not install or use this module at this time.
|
{'CVE-2016-10596'}
|
2020-08-31T18:14:15Z
|
2019-02-18T23:50:33Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/194', 'https://www.npmjs.com/advisories/194', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10596', 'https://github.com/advisories/GHSA-mm7h-323r-9p4g'}
| null |
npm
|
GHSA-4qwq-q4pr-rr7r
|
Vulnerability in packageCmd function leads to arbitrary code execution via filePath parameters
|
aaptjs is a node wraper for aapt. An issue was discovered in the packageCmd function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
|
{'CVE-2020-36378'}
|
2022-05-04T03:45:26Z
|
2021-11-02T15:42:38Z
|
CRITICAL
| null |
{'CWE-77', 'CWE-78'}
|
{'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36378', 'https://github.com/shenzhim/aaptjs'}
| null |
npm
|
GHSA-jg8v-48h5-wgxg
|
Prototype Pollution
|
This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g __proto__, toString, etc) results in a returned object with a modified prototype instance.
|
{'CVE-2021-23413'}
|
2021-08-31T20:58:01Z
|
2021-08-10T16:02:18Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36', 'https://snyk.io/vuln/SNYK-JS-JSZIP-1251497', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23413', 'https://github.com/Stuk/jszip', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498', 'https://github.com/Stuk/jszip/blob/master/lib/object.js%23L88', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499', 'https://github.com/Stuk/jszip/pull/766'}
| null |
npm
|
GHSA-r5xw-q988-826m
|
Remote Memory Exposure in mongoose
|
Versions of `mongoose` before 4.3.6, 3.8.39 are vulnerable to remote memory exposure.
Trying to save a number to a field of type Buffer on the affected mongoose versions allocates a chunk of uninitialized memory and stores it in the database.
## Recommendation
Update to version 4.3.6, 3.8.39 or later.
| null |
2021-09-23T21:51:49Z
|
2020-09-01T19:39:37Z
|
MODERATE
| null |
{'CWE-201'}
|
{'https://www.npmjs.com/advisories/599', 'https://gist.github.com/ChALkeR/440bc3dfcbd9b6da75c3', 'https://github.com/Automattic/mongoose/issues/3764', 'https://gist.github.com/ChALkeR/d4a8055625221b6e65f0'}
| null |
npm
|
GHSA-xj3h-vc9j-j823
|
Directory Traversal in nodeaaaaa
|
Affected versions of `nodeaaaaa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16223'}
|
2020-08-31T18:23:28Z
|
2018-07-23T20:39:32Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeaaaaa', 'https://nodesecurity.io/advisories/446', 'https://www.npmjs.com/advisories/446', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16223', 'https://github.com/advisories/GHSA-xj3h-vc9j-j823'}
| null |
npm
|
GHSA-cfm4-qjh2-4765
|
Improper Verification of Cryptographic Signature in node-forge
|
### Impact
RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used.
### Patches
The issue has been addressed in `node-forge` `1.3.0`.
### References
For more information, please see
["Bleichenbacher's RSA signature forgery based on implementation error"](https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/)
by Hal Finney.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge)
* Email us at [example email address](mailto:security@digitalbazaar.com)
|
{'CVE-2022-24771'}
|
2022-03-18T23:09:54Z
|
2022-03-18T23:09:54Z
|
HIGH
| null |
{'CWE-347'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24771', 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2'}
| null |
npm
|
GHSA-jpcq-cgw6-v4j6
|
Potential XSS vulnerability in jQuery
|
### Impact
Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code.
### Patches
This problem is patched in jQuery 3.5.0.
### Workarounds
To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method.
### References
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
|
{'CVE-2020-11023'}
|
2022-02-08T22:06:24Z
|
2020-04-29T22:19:14Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html', 'https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E', 'https://www.drupal.org/sa-core-2020-002', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/', 'https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E', 'https://www.tenable.com/security/tns-2021-10', 'https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html', 'https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/', 'https://jquery.com/upgrade-guide/3.5/', 'https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E', 'https://github.com/jquery/jquery/releases/tag/3.5.0', 'https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html', 'https://security.netapp.com/advisory/ntap-20200511-0006/', 'https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4693', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E', 'https://security.gentoo.org/glsa/202007-03', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11023', 'https://www.tenable.com/security/tns-2021-02', 'https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/', 'https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html', 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/jquery/jquery', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html', 'https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E'}
| null |
npm
|
GHSA-x6m6-5hrf-fh6r
|
Denial of Service in markdown-it-toc-and-anchor
|
All versions of `markdown-it-toc-and-anchor` are vulnerable to Denial of Service. Parsing markdown containing `**text**+\n@[toc]` causes the application to enter and infinite loop.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-24T22:05:24Z
|
2020-09-01T21:26:50Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-MARKDOWNITTOCANDANCHOR-73500', 'https://www.npmjs.com/advisories/749', 'https://github.com/medfreeman/markdown-it-toc-and-anchor'}
| null |
npm
|
GHSA-qqgx-2p2h-9c37
|
Prototype Pollution
|
### Overview
The `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability.
If an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context.
### Patches
This has been patched in 1.3.6
### Steps to reproduce
payload.ini
```
[__proto__]
polluted = "polluted"
```
poc.js:
```
var fs = require('fs')
var ini = require('ini')
var parsed = ini.parse(fs.readFileSync('./payload.ini', 'utf-8'))
console.log(parsed)
console.log(parsed.__proto__)
console.log(polluted)
```
```
> node poc.js
{}
{ polluted: 'polluted' }
{ polluted: 'polluted' }
polluted
```
|
{'CVE-2020-7788'}
|
2021-07-28T21:11:23Z
|
2020-12-10T16:53:45Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html', 'https://snyk.io/vuln/SNYK-JS-INI-1048974', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7788', 'https://www.npmjs.com/advisories/1589', 'https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1'}
| null |
npm
|
GHSA-9xww-fwh9-95c5
|
Malicious Package in uglyfi-js
|
Version 3.4.6 of `uglyfi-js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:56:44Z
|
2020-09-02T21:43:59Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/911'}
| null |
npm
|
GHSA-5854-jvxx-2cg9
|
Denial of Service in subtext
|
Versions of `subtext` >=4.1.0 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
This package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`.
| null |
2020-08-31T19:00:47Z
|
2020-09-03T15:46:57Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1478'}
| null |
npm
|
GHSA-79p8-4cwq-rhqh
|
Directory Traversal in jn_jj_server
|
Affected versions of `jn_jj_server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16210'}
|
2020-08-31T18:22:36Z
|
2018-07-23T20:40:07Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/424', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16210', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jn_jj_server', 'https://github.com/advisories/GHSA-79p8-4cwq-rhqh', 'https://nodesecurity.io/advisories/424'}
| null |
npm
|
GHSA-ff5x-w9wg-h275
|
Holder can generate proof of ownership for credentials it does not control in vp-toolkit
|
### Impact
The [`verifyVerifiablePresentation()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-presentation-signer.ts#L97) method check the cryptographic integrity of the Verifiable Presentation, but it does not check if the [`credentialSubject.id`](https://github.com/rabobank-blockchain/vp-toolkit-models/blob/develop/src/model/verifiable-credential.ts#L150) DID matches the signer of the VP proof.
The **verifier** is impacted by this vulnerability.
### Patches
Patch will be available in version 0.2.2.
### Workarounds
- Compute the address out of the `verifiablePresentation.proof.n.verificationMethod` using `getAddressFromPubKey()` from `crypt-util@0.1.5` and match it with the `credentialSubject.id` address from the credential.
### References
[Github issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14)
### For more information
If you have any questions or comments about this advisory:
* Discuss in the existing [issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14)
* [Contact me](https://github.com/rabomarnix)
| null |
2020-02-28T16:38:18Z
|
2020-03-06T01:15:46Z
|
HIGH
| null | null |
{'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-ff5x-w9wg-h275', 'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b', 'https://github.com/rabobank-blockchain/vp-toolkit/issues/14'}
| null |
npm
|
GHSA-f9cv-665r-275h
|
Prototype Pollution in merge-change
|
All current versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
|
{'CVE-2021-23421'}
|
2021-08-30T19:27:27Z
|
2021-09-01T18:36:01Z
|
CRITICAL
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-MERGECHANGE-1310985', 'https://github.com/VladimirShestakov/merge-change/blob/9901f145e06158f284f52de42e6ba5b0f702fb65/utils.js#L89-L123', 'https://github.com/VladimirShestakov/merge-change', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23421'}
| null |
npm
|
GHSA-gvff-25cc-4f66
|
Path Traversal in restify-swagger-jsdoc
|
Versions of `restify-swagger-jsdoc` prior to 3.2.1 are vulnerable to Path Traversal. The package fails to properly sanitize URLs, which may allow attackers to access server files outside the `swagger-ui` folder by using relative paths.
## Recommendation
Upgrade to version 3.2.1 or later.
| null |
2020-08-31T18:44:58Z
|
2020-09-03T17:15:56Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/1037'}
| null |
npm
|
GHSA-gm8g-xhh8-rmwr
|
Prototype Pollution in doc-path
|
This affects the package doc-path before 2.1.2.
|
{'CVE-2020-7772'}
|
2021-04-19T22:22:45Z
|
2021-05-10T19:17:25Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7', 'https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952', 'https://github.com/mrodrig/doc-path/blob/stable/src/path.js%23L54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7772'}
| null |
npm
|
GHSA-h9jc-284h-533g
|
Context isolation bypass via contextBridge in Electron
|
### Impact
Apps using both `contextIsolation` and `contextBridge` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
### Fixed Versions
* `9.0.0-beta.21`
* `8.2.4`
* `7.2.4`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org)
|
{'CVE-2020-4077'}
|
2021-01-07T23:48:28Z
|
2020-07-07T00:01:10Z
|
HIGH
| null |
{'CWE-501'}
|
{'https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g', 'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4077', 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}
| null |
npm
|
GHSA-qfxv-qqvg-24pg
|
OS Command Injection in im-metadata
|
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
|
{'CVE-2019-10788'}
|
2021-03-29T22:57:19Z
|
2021-04-13T15:17:36Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639', 'https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10788'}
| null |
npm
|
GHSA-2p99-6f47-8x9j
|
Malicious Package in asnc
|
All versions of `asnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:55:37Z
|
2020-09-02T18:38:39Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/845'}
| null |
npm
|
GHSA-wq7q-7vfh-2x3h
|
Downloads Resources over HTTP in install-nw
|
Affected versions of `install-nw` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `install-nw`.
## Recommendation
Update to version 1.1.5 or later.
|
{'CVE-2016-10566'}
|
2021-01-08T01:38:47Z
|
2019-02-18T23:54:09Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10566', 'https://github.com/advisories/GHSA-wq7q-7vfh-2x3h', 'https://nodesecurity.io/advisories/204', 'https://www.npmjs.com/advisories/204'}
| null |
npm
|
GHSA-wpg7-2c88-r8xv
|
Exposure of Sensitive Information in simple-get
|
In versions of simple-get prior to 4.0.1, 3.1.1, and 2.8.2, when fetching a remote url with a cookie location response, headers will be followed, potentially resulting in an exposure of the session cookie to a third party.
|
{'CVE-2022-0355'}
|
2022-02-03T16:08:56Z
|
2022-01-28T22:54:16Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0355', 'https://github.com/feross/simple-get/pull/76#issuecomment-1027754710', 'https://huntr.dev/bounties/42c79c23-6646-46c4-871d-219c0d4b4e31', 'https://github.com/feross/simple-get/pull/75#issuecomment-1027755026', 'https://github.com/feross/simple-get/'}
| null |
npm
|
GHSA-39qv-prmh-x37f
|
Prototype Pollution in @strikeentco/set
|
This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821
|
{'CVE-2021-23497'}
|
2022-02-11T16:16:33Z
|
2022-02-05T00:00:26Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/strikeentco/set/commit/b2f942c', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23497', 'https://github.com/strikeentco/set/', 'https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821', 'https://snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-2385945'}
| null |
npm
|
GHSA-wwrj-35w6-77ff
|
CSRF vulnerability in save-server
|
### Impact
Versions prior to version v1.05 are affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version v1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version.
This is patched by implementing [Double submit](https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f).
The CSRF attack would require you to navigate to a malicious site while you have an active session with Save-Server (Session key stored in cookies). The malicious user would then be able to perform some actions, including:
- Upload file
- Delete file
- Add redirect
#### If you are logged in as root, this attack is significantly more severe. They can (in addition to the above):
- Create users
- Delete users
- Update users (change password)
If they updated the password of a user, that user's files would then be available. If the root password is updated, all files would be visible if they logged in with the new password.
Note that due to the same origin policy malicious actors cannot view the gallery or the response of any of the methods, nor be sure they succeeded.
### Patches
This issue has been patched. Update to version v1.0.7 or above to benefit from this fix.
### Workarounds
None. You should upgrade.
### References
What is CSRF: https://owasp.org/www-community/attacks/csrf
Fix type: https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Save-server](https://github.com/Neztore/save-server/)
* Email us at [hi@nezto.re](mailto:hi@nezto.re)
* Join our discord (preferred): [Invite](https://discord.gg/QevWabU)
|
{'CVE-2020-15135'}
|
2021-01-07T23:42:18Z
|
2020-08-04T14:54:08Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15135', 'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f', 'https://www.npmjs.com/package/save-server', 'https://github.com/Neztore/save-server/security/advisories/GHSA-wwrj-35w6-77ff'}
| null |
npm
|
GHSA-qr32-j4j6-3m7r
|
Command Injection in fs-git
|
Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution.
## Recommendation
Update to version 1.0.2 or later.
|
{'CVE-2017-16087'}
|
2020-08-31T18:20:27Z
|
2019-05-29T20:23:00Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16087', 'https://www.npmjs.com/advisories/360', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5'}
| null |
npm
|
GHSA-pvv8-8fx9-h673
|
Path Traversal in @backstage/plugin-scaffolder-backend
|
### Impact
A malicious actor could read sensitive files from the environment where Scaffolder tasks are run. The attack is executed by crafting a custom Scaffolder template with a `publish:github:pull-request` action using a particular source path. When the template is executed the sensitive files would be included in the published pull request.
This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request.
### Patches
The vulnerability is patched in the `0.15.9` release of `@backstage/plugin-scaffolder-backend`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
|
{'CVE-2021-41151'}
|
2021-10-25T20:07:48Z
|
2021-10-19T15:28:03Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/backstage/backstage/security/advisories/GHSA-pvv8-8fx9-h673', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41151', 'https://github.com/backstage/backstage', 'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006', 'https://github.com/backstage/backstage/releases/tag/release-2021-10-16'}
| null |
npm
|
GHSA-353r-3v84-9pjj
|
Malicious Package in nothing-js
|
`nothing-js` contained a malicious script that attempted to delete all files when `npm test` was run.
## Recommendation
This module has been unpublished from the npm Registry. If you find this module in your environment remove it.
| null |
2021-10-01T13:25:56Z
|
2020-09-01T20:40:36Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/650'}
| null |
npm
|
GHSA-wfw3-rgfr-6g67
|
XSS via Angular Expression in ag-grid
|
Affected versions of `ag-grid` are vulnerable to Cross-site Scripting (XSS) via Angular Expressions, if used in combination with AngularJS.
## Recommendation
Avoid using `ag-grid` in combination with AngularJS until a fix is available.
|
{'CVE-2017-16009'}
|
2020-08-31T18:19:26Z
|
2020-09-01T16:40:42Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nodesecurity.io/advisories/327', 'https://github.com/ceolter/ag-grid/issues/1287', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16009', 'https://www.npmjs.com/advisories/327', 'https://spring.io/blog/2016/01/28/angularjs-escaping-the-expression-sandbox-for-xss'}
| null |
npm
|
GHSA-8mgg-5x65-m4m4
|
Command Injection in soletta-dev-app
|
All versions of `soletta-dev-app` are vulnerable to Command Injection. The package does not validate user input on the `/api/service/status` API endpoint, passing contents of the `service` query parameter to an exec call. This may allow attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:41:59Z
|
2020-09-11T21:08:19Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/958'}
| null |
npm
|
GHSA-954c-jjx6-cxv7
|
Reflected XSS from the callback handler's error query parameter
|
### Overview
Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message.
### Am I affected?
You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response.
### How to fix that?
Upgrade to version `1.4.2`.
### Will this update impact my users?
The fix adds basic HTML escaping to the error message and it should not impact your users.
### Credit
https://github.com/inian
https://github.com/git-ishanpatel
|
{'CVE-2021-32702'}
|
2021-06-28T19:06:42Z
|
2021-06-28T16:46:41Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7', 'https://www.npmjs.com/package/@auth0/nextjs-auth0', 'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32702'}
| null |
npm
|
GHSA-5p5w-j3g7-w4wv
|
Authentication bypass via incorrect XML canonicalization and DOM traversal in saml2-js
|
Versions of `saml2-js` prior to 1.12.4 or 2.0.2 are vulnerable to authentication bypass.
The `saml2-js` library may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Security Assertion Markup Language (SAML) is an XML-based markup language for security assertions regarding authentication and permissions, most commonly used for single sign-on (SSO) services.
Some XML DOM traversal and canonicalization APIs may be inconsistent in handling of comments within XML nodes. Incorrect use of these APIs by some SAML libraries results in incorrect parsing of the inner text of XML nodes such that any inner text after the comment is lost prior to cryptographically signing the SAML message. Text after the comment therefore has no impact on the signature on the SAML message.
A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider
## Recommendation
If you use 1.x upgrade to version 1.12.4 or greater
If you use 2.x upgrade to version 2.02 or greater
|
{'CVE-2017-11429'}
|
2021-06-11T14:24:18Z
|
2019-07-05T21:11:18Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-11429', 'https://www.npmjs.com/advisories/567', 'https://github.com/advisories/GHSA-5p5w-j3g7-w4wv', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://www.kb.cert.org/vuls/id/475445'}
| null |
npm
|
GHSA-97gv-3p2c-xw7j
|
Denial of Service and Content Injection in i18n-node-angular
|
Versions of `i18n-node-angular` prior to 1.4.0 are affected by denial of service and cross-site scripting vulnerabilities. The vulnerabilities exist in a REST endpoint that was created for development purposes, but was not disabled in production in affected versions.
## Recommendation
Update to version 1.4.0 or later.
|
{'CVE-2016-10524'}
|
2022-02-11T17:08:46Z
|
2019-02-18T23:39:06Z
|
HIGH
| null |
{'CWE-74', 'CWE-400'}
|
{'https://github.com/advisories/GHSA-97gv-3p2c-xw7j', 'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8', 'https://nodesecurity.io/advisories/80', 'https://github.com/oliversalzburg/i18n-node-angular', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10524', 'https://www.npmjs.com/advisories/80'}
| null |
npm
|
GHSA-w7jg-972m-rphv
|
Directory Traversal in susu-sum
|
Affected versions of `susu-sum` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16199'}
|
2020-08-31T18:22:48Z
|
2020-09-01T18:17:28Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/429', 'https://www.npmjs.com/advisories/429', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16199', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/susu-sum'}
| null |
npm
|
GHSA-h2jv-5v3f-7m7j
|
Downloads Resources over HTTP in adamvr-geoip-lite
|
Affected versions of `adamvr-geoip-lite` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10680'}
|
2021-01-14T15:57:07Z
|
2020-09-01T16:10:03Z
|
MODERATE
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/283', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10680', 'https://www.npmjs.com/advisories/283'}
| null |
npm
|
GHSA-4g7x-7vgq-3j28
|
Vulnerability in list function leads to arbitrary code execution via filePath parameters
|
aaptjs is a node wraper for aapt. An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
|
{'CVE-2020-36376'}
|
2022-05-04T03:46:28Z
|
2021-11-02T15:42:16Z
|
CRITICAL
| null |
{'CWE-77', 'CWE-78'}
|
{'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36376', 'https://github.com/shenzhim/aaptjs'}
| null |
npm
|
GHSA-gr4j-r575-g665
|
Cross-Site Scripting in highcharts
|
Versions of `highcharts` prior to 7.2.2 or 8.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize `href` values and does not restrict URL schemes, allowing attackers to execute arbitrary JavaScript in a victim's browser if they click the link.
| null |
2021-09-23T19:06:33Z
|
2020-08-25T14:04:47Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/highcharts/highcharts/issues/13559', 'https://www.npmjs.com/advisories/1227', 'https://snyk.io/vuln/SNYK-JS-HIGHCHARTS-571995', 'https://github.com/highcharts/highcharts'}
| null |
npm
|
GHSA-fvqr-27wr-82fm
|
Prototype Pollution in lodash
|
Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.17.5 or later.
|
{'CVE-2018-3721'}
|
2020-08-31T18:28:28Z
|
2018-07-26T15:14:52Z
|
LOW
| null |
{'CWE-471'}
|
{'https://hackerone.com/reports/310443', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3721', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a', 'https://www.npmjs.com/advisories/577', 'https://github.com/advisories/GHSA-fvqr-27wr-82fm'}
| null |
npm
|
GHSA-8mm3-2mcj-cx6r
|
Malicious Package in angluar-cli
|
Version 0.0.3 of `angluar-cli` contains malicious code as a postinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed the package attempts to remove files and stop processes related to McAfee antivirus on macOS.
## Recommendation
Remove the package from your environment and verify whether files were deleted and if processes were stopped.
| null |
2021-09-30T21:57:57Z
|
2020-09-11T21:09:24Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/918'}
| null |
npm
|
GHSA-j5jc-jf8f-86q7
|
Malicious Package in dictum.js
|
Version 1.0.5 of `dictum.js` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.5 of this module is found installed you will want to replace it with a version before or after 1.0.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:56Z
|
2020-09-01T20:38:30Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/640'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.