ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-4449-hg37-77v8
|
Command injection in total.js
|
There is a command injection vulnerability that affects the package total.js before version 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.
|
{'CVE-2020-28494'}
|
2021-07-28T18:57:23Z
|
2021-02-05T20:43:27Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5', 'https://www.npmjs.com/package/total.js', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28494', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672'}
| null |
npm
|
GHSA-qffw-8wg7-h665
|
Command injection in git-interface
|
A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.
|
{'CVE-2022-1440'}
|
2022-04-29T17:22:43Z
|
2022-04-23T00:03:01Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/yarkeev/git-interface', 'https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440', 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}
| null |
npm
|
GHSA-686g-3xr3-x4x6
|
Information Exposure on Case Insensitive File Systems in serve
|
Versions of `serve` before 7.0.0 are vulnerable to information exposure, bypassing the ignore security control, but only on case insensitive file systems.
## Recommendation
Update to version 7.0.0 or later.
|
{'CVE-2018-3809'}
|
2021-09-01T22:46:06Z
|
2018-07-18T18:33:15Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3809', 'https://www.npmjs.com/advisories/672', 'https://github.com/advisories/GHSA-686g-3xr3-x4x6', 'https://hackerone.com/reports/330650'}
| null |
npm
|
GHSA-h3rx-g5c9-8q4x
|
Prototype Pollution in bmoor
|
The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function.
|
{'CVE-2020-7736'}
|
2021-04-22T22:35:49Z
|
2021-05-10T18:37:26Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5', 'https://www.npmjs.com/package/bmoor', 'https://snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7736'}
| null |
npm
|
GHSA-v2jv-33gh-xx29
|
Command Injection in ps-visitor
|
This affects all versions up to and including version 0.0.2 of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23374'}
|
2021-05-06T22:31:21Z
|
2021-05-07T16:06:23Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23374', 'https://github.com/WisdomKwan/ps-visitor/blob/cdfc934a8e4af95aa0473f4b2a4bd091d09faf2f/index.js%23L404', 'https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544'}
| null |
npm
|
GHSA-vpgc-7h78-gx8f
|
Validation bypass vulnerability
|
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev)
### Credits
Niklas Sköldmark (Medborgarskolan)
| null |
2020-09-04T16:24:37Z
|
2020-09-04T18:05:14Z
|
LOW
| null | null |
{'https://github.com/personnummer/js/security/advisories/GHSA-vpgc-7h78-gx8f', 'https://www.npmjs.com/package/personnummer'}
| null |
npm
|
GHSA-722q-3g9x-vp8q
|
Downloads Resources over HTTP in tomita-parser
|
Affected versions of `tomita-parser` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita-parser`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10666'}
|
2021-01-08T19:18:41Z
|
2019-02-18T23:54:41Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/261', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10666', 'https://nodesecurity.io/advisories/261', 'https://github.com/advisories/GHSA-722q-3g9x-vp8q'}
| null |
npm
|
GHSA-m2fp-c79h-rr79
|
Malicious Package in tensorplow
|
All versions of `tensorplow` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:56:28Z
|
2020-09-02T21:42:56Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/910'}
| null |
npm
|
GHSA-qwqc-28w3-fww6
|
Message Signature Bypass in openpgp
|
Versions of `openpgp` prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type `text`. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as `standalone` or `timestamp`). For example, an attacker that captures a `standalone` signature packet from a victim can construct arbitrary signed messages that would be verified correctly.
## Recommendation
Upgrade to version 4.2.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
|
{'CVE-2019-9153'}
|
2021-08-17T22:06:12Z
|
2019-08-23T21:42:20Z
|
HIGH
| null |
{'CWE-347'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9153', 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460248', 'https://github.com/openpgpjs/openpgpjs/pull/816', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.npmjs.com/advisories/1160', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}
| null |
npm
|
GHSA-g8jc-mm3c-cwhj
|
Malicious Package in reques
|
All versions of `reques` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:08:00Z
|
2020-09-02T20:31:06Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/863'}
| null |
npm
|
GHSA-r32x-jhw5-g48p
|
Cross-Site Scripting in eco
|
All versions of `eco` are vulnerable to Cross-Site Scripting (XSS). The package's default `__escape` implementation fails to escape single quotes, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-09-28T21:17:47Z
|
2020-09-03T17:08:20Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/sstephenson/eco', 'https://github.com/sstephenson/eco/pull/67', 'https://www.npmjs.com/advisories/1024'}
| null |
npm
|
GHSA-mm7r-265w-jv6f
|
Server-Side Request Forgery in @uppy/companion
|
Versions of `@uppy/companion` prior to 1.9.3 are vulnerable to Server-Side Request Forgery (SSRF). The `get` route passes the user-controlled variable `req.body.url` to a GET request without sanitizing the value. This allows attackers to inject arbitrary URLs and make GET requests on behalf of the server.
## Recommendation
Upgrade to version 1.9.3 or later.
|
{'CVE-2020-8135'}
|
2020-08-31T19:01:35Z
|
2020-09-03T15:51:19Z
|
HIGH
| null |
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8135', 'https://www.npmjs.com/advisories/1501', 'https://hackerone.com/reports/786956'}
| null |
npm
|
GHSA-mfwh-5m23-j46w
|
Environment Variable Injection in GitHub Actions
|
### Impact
The `@actions/core` npm module `addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author.
### Patches
The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new [Environment File Syntax](https://github.com/actions/toolkit/blob/main/docs/commands.md#environment-files). Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution.
### Workarounds
None, it is strongly suggested that you upgrade as soon as possible.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Actions Toolkit](https://github.com/actions/toolkit/issues)
|
{'CVE-2020-15228'}
|
2021-11-19T15:11:59Z
|
2020-10-01T17:16:20Z
|
LOW
| null |
{'CWE-77', 'CWE-20'}
|
{'https://github.com/actions/toolkit/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15228', 'http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html', 'https://github.com/actions/toolkit/security/advisories/GHSA-mfwh-5m23-j46w'}
| null |
npm
|
GHSA-vvfh-mvjv-w38q
|
Malicious Package in babel-loadre
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:17:42Z
|
2020-09-04T15:28:19Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1349'}
| null |
npm
|
GHSA-xrrg-wfwc-c7r3
|
Malicious Package in bictoin-ops
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:37:47Z
|
2020-09-04T15:33:52Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1354'}
| null |
npm
|
GHSA-vh59-v9r5-4mh4
|
Cross-site scripting in jspdf
|
It's possible to inject JavaScript code via the html method.
|
{'CVE-2020-7690'}
|
2021-05-11T17:38:24Z
|
2021-05-17T21:01:32Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575257', 'https://snyk.io/vuln/SNYK-JS-JSPDF-575256', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575258', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7690', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575260', 'https://github.com/MrRio/jsPDF/issues/2795', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575259'}
| null |
npm
|
GHSA-jf8x-wg7f-p3w8
|
Malicious Package in cage-js
|
All versions of `cage-js` contains malicious code. The malware downloads and runs a script from a remote server as a postinstall script.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T20:05:28Z
|
2020-09-03T18:22:33Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1085'}
| null |
npm
|
GHSA-84fq-6626-w5fg
|
CORS Token Disclosure in crumb
|
When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes as this user.
A configuration and scenario where this would occur is unlikely, as most configurations will set CORS globally (where crumb is not used), or not at all.
## Recommendation
Update to version 3.0.0 or greater.
|
{'CVE-2014-7193'}
|
2020-08-31T18:07:28Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-284'}
|
{'https://www.npmjs.com/advisories/4', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7193', 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/advisories/GHSA-84fq-6626-w5fg', 'https://nodesecurity.io/advisories/crumb_cors_token_disclosure'}
| null |
npm
|
GHSA-rqf8-8c89-mw29
|
Cross-site Scripting in curly-bracket-parser
|
This affects all versions of package curly-bracket-parser.
When used as a template library, it does not properly sanitize the user input.
|
{'CVE-2021-23416'}
|
2021-08-31T21:14:23Z
|
2021-08-10T16:08:16Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js%23L31', 'https://github.com/magynhard/curly-bracket-parser', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23416', 'https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js#23L31', 'https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106'}
| null |
npm
|
GHSA-9frq-f867-hgqc
|
Directory Traversal in fast-http-cli
|
`fast-http-cli` is the command line interface for `fast-http`, a simple web server.
`fast-http-cli` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
Example Request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host: localhost
```
and server Response:
```
HTTP/1.1 200 OK
Date: Thu, 04 May 2017 23:59:18 GMT
Connection: keep-alive
Transfer-Encoding: chunked
{contents of /etc/passwd}
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16155'}
|
2020-08-31T18:21:12Z
|
2018-07-23T20:46:25Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/383', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fast-http-cli', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16155', 'https://github.com/advisories/GHSA-9frq-f867-hgqc', 'https://nodesecurity.io/advisories/383'}
| null |
npm
|
GHSA-xcvv-84j5-jw9h
|
Prototype Pollution in assign-deep
|
Versions of `assign-deep` before 0.4.7 are vulnerable to prototype pollution via merging functions.
## Recommendation
Update to version 0.4.7 or later.
|
{'CVE-2018-3720'}
|
2020-08-31T18:28:34Z
|
2018-07-26T15:12:31Z
|
LOW
| null |
{'CWE-471'}
|
{'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11', 'https://www.npmjs.com/advisories/579', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3720', 'https://github.com/advisories/GHSA-xcvv-84j5-jw9h', 'https://hackerone.com/reports/310707'}
| null |
npm
|
GHSA-c94v-8fff-73ph
|
Command Injection in @theia/messages
|
In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run.
|
{'CVE-2021-28162'}
|
2021-05-07T17:57:37Z
|
2021-05-10T15:36:55Z
|
MODERATE
| null |
{'CWE-829'}
|
{'https://github.com/eclipse-theia/theia/blob/master/CHANGELOG.md#v100---26032020', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28162', 'https://github.com/eclipse-theia/theia/pull/7289', 'https://github.com/eclipse-theia/theia/issues/7283'}
| null |
npm
|
GHSA-49vv-6q7q-w5cf
|
OS Command Injection in Strapi
|
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
|
{'CVE-2019-19609'}
|
2021-09-01T19:36:25Z
|
2021-12-10T17:22:12Z
|
HIGH
| null |
{'CWE-20', 'CWE-78'}
|
{'https://bittherapy.net/post/strapi-framework-remote-code-execution/', 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html', 'https://github.com/strapi/strapi/pull/4636', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19609', 'http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html', 'https://github.com/strapi/strapi'}
| null |
npm
|
GHSA-c7pp-g2v2-2766
|
DOM-based XSS in gmail-js
|
Affected versions of `gmail-js` are vulnerable to cross-site scripting in the `tools.parse_response`, `helper.get.visible_emails_post`, and `helper.get.email_data_post` functions, which pass user input directly into the Function constructor.
## Recommendation
Update to version 0.6.5 or later.
|
{'CVE-2016-1000228'}
|
2021-09-23T21:31:53Z
|
2020-09-01T15:32:04Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/KartikTalwar/gmail.js/issues/281', 'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1', 'https://github.com/KartikTalwar/gmail.js', 'https://www.npmjs.com/advisories/125', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000228'}
| null |
npm
|
GHSA-65m9-m259-7jqw
|
Improper Authorization in react-oauth-flow
|
All versions of `react-oauth-flow` fail to properly implement the OAuth protocol. The package stores secrets in the front-end code. Instead of using a public OAuth client, it uses a confidential client on the browser. This may allow attackers to compromise server credentials.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-10-04T21:06:12Z
|
2020-09-03T15:49:29Z
|
CRITICAL
| null |
{'CWE-285'}
|
{'https://github.com/ethereum/web3.js', 'https://www.npmjs.com/advisories/1487', 'https://github.com/ethereum/web3.js/issues/2739'}
| null |
npm
|
GHSA-3q9x-w53p-jg53
|
OS Command Injection in heroku-addonpool
|
heroku-addonpool through 0.1.15 is vulnerable to Command Injection.
|
{'CVE-2020-7634'}
|
2021-07-28T22:58:36Z
|
2021-12-09T19:52:03Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428', 'https://github.com/nodef/heroku-addonpool/blob/master/index.js', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7634'}
| null |
npm
|
GHSA-gr58-j5wh-m333
|
Prototype Pollution in nis-utils
|
All versions of package nis-utils up to and including 0.6.10 are vulnerable to Prototype Pollution via the setValue function.
|
{'CVE-2020-7703'}
|
2021-05-05T21:33:21Z
|
2021-05-06T17:29:08Z
|
CRITICAL
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-NISUTILS-598799', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7703'}
| null |
npm
|
GHSA-4cpg-3vgw-4877
|
Prototype pollution in Plist
|
Prototype pollution vulnerability via `.parse()` in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
|
{'CVE-2022-22912'}
|
2022-03-23T15:06:35Z
|
2022-02-18T00:00:33Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/TooTallNate/plist.js/pull/118', 'https://github.com/TooTallNate/plist.js/issues/114', 'https://github.com/TooTallNate/plist.js', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22912', 'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52'}
| null |
npm
|
GHSA-36r8-9qq7-mh43
|
Malicious Package in we3b
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T19:09:44Z
|
2020-09-03T17:02:40Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1415'}
| null |
npm
|
GHSA-8w4h-3cm3-2pm2
|
Out-of-bounds Read in atob
|
Versions of `atob` before 2.1.0 uninitialized Buffers when number is passed in input on Node.js 4.x and below.
## Recommendation
Update to version 2.1.0 or later.
|
{'CVE-2018-3745'}
|
2020-08-31T18:31:10Z
|
2018-10-09T00:56:26Z
|
MODERATE
| null |
{'CWE-125'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3745', 'https://www.npmjs.com/advisories/646', 'https://github.com/advisories/GHSA-8w4h-3cm3-2pm2', 'https://hackerone.com/reports/321686'}
| null |
npm
|
GHSA-mg69-6j3m-jvgw
|
HTML Injection in marky-markdown
|
All versions of `marky-markdown` are vulnerable to HTML Injection. The package fails to sanitize `style` attributes in `img` tags of the markdown input. This may allow attackers to affect the size of images in the rendered HTML.
## Recommendation
This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown`
| null |
2021-10-04T20:55:27Z
|
2020-09-03T15:45:08Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/npm/marky-markdown', 'https://snyk.io/vuln/SNYK-JS-MARKYMARKDOWN-548871', 'https://www.npmjs.com/advisories/1470'}
| null |
npm
|
GHSA-c9g6-9335-x697
|
Improper Input Validation in SocksJS-Node
|
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
|
{'CVE-2020-7693'}
|
2021-04-06T21:47:25Z
|
2021-04-13T15:27:51Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/sockjs/sockjs-node/pull/265', 'https://github.com/andsnw/sockjs-dos-py', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693', 'https://snyk.io/vuln/SNYK-JS-SOCKJS-575261', 'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16', 'https://www.npmjs.com/package/sockjs', 'https://github.com/sockjs/sockjs-node/issues/252', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448'}
| null |
npm
|
GHSA-pg53-56cg-4m8q
|
Token verification bug in next-auth
|
### Impact
Implementations using the **Prisma database adapter** with the **Email provider** **are impacted**.
Implementations using the Prisma database adapter that are not using the Email provider are not impacted.
Implementations using the default database adapter (TypeORM) with the Email provider are not impacted.
Implementations not using a database are not impacted.
### Patches
This issue is fixed in 3.3.0 and newer versions.
### Workarounds
Those not able to upgrade can alternatively disable the Email provider as a workaround.
### Description
The Prisma database adapter was checking the verification token but not the identifier (the email address associated with the token). This made it possible to use a valid token assigned to one user, to sign in as another user when using the Prima adapter in conjunction with the Email provider. The defect is specific to the community-supported Prisma database adapter in versions <3.3.0 and is not present in the default database adapter (TypeORM).
*Note: The current community-supported adapter was not developed by Prisma.*
The defect was a problem in the implementation of verification function the adapter and is not directly related to Prisma.
The flaw may exist in other third party database adapters that do not check both the identifier and token values.
The design of the database adapter API may be revised in future to help reduce the likelyhood of similar defects.
### Timeline
On Monday (2021-02-08) we were notified via responsible disclosure by Alessandro Angelino (@AlessandroA) of a flaw in the implementation of the Prisma database adapter included with NextAuth.js. A detailed write up and proof of concept were provided.
The following day (2021-02-09) we published a fix in v3.3.0 and confirmed through internal testing, and with Alessandro, that the issue was resolved in the new release and prompted users to upgrade.
On 2021-02-10 we received a CVE ID and published this advisory within a few hours of notification.
We would like to thank Alessandro for using responsible disclose to allow us to address the issue promptly and publish this advisory once an update was available that resolved the issue and Balázs Orbán (@balazsorban44) for facilitating a timely release of the fix.
|
{'CVE-2021-21310'}
|
2021-02-22T20:43:03Z
|
2021-02-11T21:36:24Z
|
LOW
| null |
{'CWE-290'}
|
{'https://www.npmjs.com/package/next-auth', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21310', 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pg53-56cg-4m8q', 'https://github.com/nextauthjs/next-auth/releases/tag/v3.3.0'}
| null |
npm
|
GHSA-pwhf-39xg-4rxw
|
Script injection
|
### Impact
A malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data.
The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store.
### Patches
The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
|
{'CVE-2021-32660'}
|
2021-06-04T19:23:33Z
|
2021-06-04T19:09:35Z
|
MODERATE
| null |
{'CWE-77', 'CWE-434'}
|
{'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32660', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/security/advisories/GHSA-pwhf-39xg-4rxw'}
| null |
npm
|
GHSA-766v-7gjx-55hf
|
Malicious Package in js-shq3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:14:27Z
|
2020-09-03T23:08:34Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1289'}
| null |
npm
|
GHSA-p239-93f7-h6xf
|
Cross-Site Scripting in swagger-ui
|
Affected versions of `swagger-ui` contain a cross-site scripting vulnerability in the key names of a specific nested object in the JSON document.
## Proof of Concept
The vulnerable object structure is:
```
{
"definitions": {
"arbitraryVal": {
"properties": {
"<INJECTABLE_KEY_NAME>": "LoremIpsum"
}
}
}
}
```
Malicious JSON documents can be loaded in by providing a URL to them in the `url` query string parameter.
## Recommendation
Update to version 2.2.1 or later.
|
{'CVE-2016-5682'}
|
2021-09-23T21:32:17Z
|
2020-09-01T15:30:58Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://community.rapid7.com/community/infosec/blog/2016/09/02/r7-2016-19-persistent-xss-via-unescaped-parameters-in-swagger-ui', 'https://www.npmjs.com/advisories/126', 'https://github.com/swagger-api/swagger-ui/issues/1865', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5682', 'https://github.com/swagger-api/swagger-ui'}
| null |
npm
|
GHSA-w6v7-w58j-pg5r
|
Improper Verification of Communication Channel in @theia/plugin-ext
|
In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().
|
{'CVE-2021-41038'}
|
2021-11-15T14:59:59Z
|
2021-11-15T17:40:51Z
|
MODERATE
| null |
{'CWE-940'}
|
{'https://github.com/eclipse-theia/theia', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41038', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924', 'https://github.com/eclipse-theia/theia/pull/10125'}
| null |
npm
|
GHSA-88g8-f5mf-f5rj
|
Improper Initialization in OpenZeppelin
|
In OpenZeppelin <=v4.4.0, initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible, breaking the expectation that there is a single execution.
|
{'CVE-2021-46320'}
|
2022-02-11T16:20:03Z
|
2022-02-05T00:00:31Z
|
HIGH
| null |
{'CWE-665'}
|
{'https://github.com/OpenZeppelin/openzeppelin-contracts', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46320', 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx', 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.4.1'}
| null |
npm
|
GHSA-rj44-gpjc-29r7
|
[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values
|
### Impact
Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled)
### Patches
[A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0
### Workarounds
By default, EGF parse functions do NOT attempt to decrypt values (since GPG is only available in non-browser env).
However, if GPG encrypted values are used/required:
1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\`) chars in the encrypted value string
2. Replace/remove them or skip parsing if present...
### References
https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7#advisory-comment-65261
### For more information
If you have any questions or comments about this advisory, please open an issue in the [thi.ng/umbrella repo](https://github.com/thi-ng/umbrella/issues), of which this package is part of.
|
{'CVE-2021-21412'}
|
2021-03-30T20:20:04Z
|
2021-04-06T17:22:41Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21412', 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7', 'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243', 'https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27', 'https://www.npmjs.com/package/@thi.ng/egf'}
| null |
npm
|
GHSA-92px-q4w8-hrr5
|
Malicious Package in impala
|
Version 1.1.7 of `impala` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.1.7 of this module is found installed you will want to replace it with a version before or after 1.1.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T18:30:53Z
|
2020-09-01T19:56:52Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://github.com/shenfw1987/impala', 'https://snyk.io/vuln/SNYK-JS-IMPALA-450989', 'https://www.npmjs.com/advisories/628'}
| null |
npm
|
GHSA-p4pj-mg4r-x6v4
|
Denial of Service in uap-core
|
## Impact
Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
## Patches
Please update uap-core to >= v0.11.0
Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.
|
{'CVE-2021-21317'}
|
2021-02-16T17:45:27Z
|
2021-02-02T15:46:38Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/ua-parser/uap-core/security/advisories/GHSA-p4pj-mg4r-x6v4', 'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21317', 'https://www.npmjs.com/package/uap-core'}
| null |
npm
|
GHSA-qfc9-x7gv-27jr
|
Malicious Package in deasyncp
|
All versions of `deasyncp ` contain malicious code. The package shuts down the machine upon installation as a preinstall script.
## Recommendation
Remove the package from your environment. There is no further compromise.
| null |
2021-09-30T20:03:51Z
|
2020-09-03T18:12:36Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1073'}
| null |
npm
|
GHSA-2fw4-mgq9-39cx
|
Code Injection in oauth2-server
|
"oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also therefore wouldn't describe this as a "vulnerability" with the library per se.'"
|
{'CVE-2017-18924'}
|
2021-04-21T21:15:38Z
|
2021-04-22T15:53:45Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://github.com/oauthjs/node-oauth2-server/issues/637', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18924', 'https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467', 'https://tools.ietf.org/html/rfc7636', 'https://tools.ietf.org/html/draft-ietf-oauth-security-topics-15', 'https://github.com/oauthjs/node-oauth2-server/pull/452'}
| null |
npm
|
GHSA-426h-24vj-qwxf
|
Command Injection in npm-programmatic
|
All versions of `npm-programmatic ` are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `install`, `uninstall` and `list` functions . This may allow attackers to execute arbitrary code in the system if the package name passed to the function is user-controlled.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2020-7614'}
|
2021-07-29T15:52:29Z
|
2020-04-23T20:09:09Z
|
CRITICAL
| null |
{'CWE-20', 'CWE-78'}
|
{'https://github.com/Manak/npm-programmatic/blob/master/index.js#L18', 'https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115', 'https://www.npmjs.com/advisories/1507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7614'}
| null |
npm
|
GHSA-pfj7-2qfw-vwgm
|
Path traversal in translator module in NodeBB
|
### Impact
Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory.
### Patches
The vulnerability has been patched as of v1.18.5.
### Workarounds
Cherry-pick commit hash `c8b2fc46dc698db687379106b3f01c71b80f495f` to receive this patch in lieu of a full upgrade.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@nodebb.org](mailto:security@nodebb.org)
|
{'CVE-2021-43788'}
|
2021-11-30T14:35:14Z
|
2021-11-30T22:20:43Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/NodeBB/NodeBB', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-pfj7-2qfw-vwgm', 'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43788'}
| null |
npm
|
GHSA-rc8h-3fv6-pxv8
|
Denial of Service in hapi
|
Versions of `hapi` prior to 11.1.3 are affected by a denial of service vulnerability.
The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers.
This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hapi will continue to hold the socket open until timed out (default node timeout is 2 minutes).
## Recommendation
Update to v11.1.3 or later
|
{'CVE-2015-9241'}
|
2020-08-31T18:09:46Z
|
2018-06-07T19:43:15Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2015-9241', 'https://nodesecurity.io/advisories/64', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580', 'https://github.com/advisories/GHSA-rc8h-3fv6-pxv8', 'https://nodesecurity.io/advisories/63', 'https://www.npmjs.com/advisories/63'}
| null |
npm
|
GHSA-fxwf-45c7-4ppr
|
Prototype pollution in object-hierarchy-access
|
Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28270'}
|
2022-01-07T16:07:29Z
|
2021-10-12T16:40:58Z
|
CRITICAL
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270,', 'https://github.com/mjpclab/object-hierarchy-access', 'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28270', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270'}
| null |
npm
|
GHSA-c7pp-x73h-4m2v
|
Cross-Site Scripting in bootstrap-vue
|
Versions of `bootstrap-vue` prior to 2.0.0-rc.12 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization, components may be vulnerable to Cross-Site Scripting through the `options` variable. This may lead to the execution of malicious JavaScript on the user's browser.
## Recommendation
Upgrade to version 2.0.0-rc.12 or later.
| null |
2021-09-27T15:43:19Z
|
2020-09-02T15:53:46Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/770', 'https://github.com/bootstrap-vue/bootstrap-vue/issues/1974', 'https://github.com/bootstrap-vue/bootstrap-vue'}
| null |
npm
|
GHSA-pxq7-4ppw-qp7f
|
Directory Traversal in serverzyy
|
Affected versions of `serverzyy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16135'}
|
2020-08-31T18:22:52Z
|
2020-09-01T18:19:36Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/431', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16135', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverzyy', 'https://nodesecurity.io/advisories/431'}
| null |
npm
|
GHSA-f7gc-6hcj-wc42
|
Malicious Package in path-to-regxep
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:03:55Z
|
2020-09-03T17:05:06Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1401'}
| null |
npm
|
GHSA-h236-g5gh-vq6c
|
Cross-site scripting in Froala Editor
|
Froala Editor before 3.0.6 allows XSS.
|
{'CVE-2019-19935'}
|
2022-02-10T23:32:51Z
|
2022-02-10T23:32:51Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19935', 'https://compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Editor.txt', 'https://github.com/froala/wysiwyg-editor/compare/v3.0.5...v3.0.6', 'https://snyk.io/vuln/npm:froala-editor', 'https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/', 'http://packetstormsecurity.com/files/158300/Froala-WYSIWYG-HTML-Editor-3.1.1-Cross-Site-Scripting.html'}
| null |
npm
|
GHSA-fqw7-8v6m-2f86
|
Malicious Package in hulp
|
All versions of `hulp` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:54:46Z
|
2020-09-02T21:37:39Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/905'}
| null |
npm
|
GHSA-fmf5-j5j9-99pp
|
OS Command Injection in pulverizr
|
pulverizr through 0.7.0 allows execution of arbitrary commands. Within "lib/job.js", the variable "filename" can be controlled by the attacker. This function uses the variable "filename" to construct the argument of the exec call without any sanitization. In order to successfully exploit this vulnerability, an attacker will need to create a new file with the same name as the attack command.
|
{'CVE-2020-7604'}
|
2021-07-28T20:51:44Z
|
2021-05-07T16:20:44Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-PULVERIZR-560122', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7604'}
| null |
npm
|
GHSA-q43m-ffwr-rpcc
|
SSL Validation Defaults to False in electron-packager
|
Affected versions of `electron-packager` configure the generated application to disable SSL certificate verification by default.
This could allow an attacker with a privileged network position to launch a Man In The Middle (MITM) attack on the install process, intercepting the step where electron-packager downloads Electron for supported target platforms and architectures, and replacing the valid download with a tampered malicious one.
This only affects users using the electron-packager CLI. The strict-ssl option defaults to true for the node.js API.
## Recommendation
1. Update to version 7.0.0 or later.
2. Delete the `electron-download` cache folder, which is by default located at `~/.electron`.
|
{'CVE-2016-10534'}
|
2021-01-08T18:18:07Z
|
2019-02-18T23:58:24Z
|
LOW
| null |
{'CWE-295'}
|
{'https://www.npmjs.com/advisories/104', 'https://nodesecurity.io/advisories/104', 'https://github.com/electron-userland/electron-packager/issues/333', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10534', 'https://github.com/advisories/GHSA-q43m-ffwr-rpcc'}
| null |
npm
|
GHSA-57cf-349j-352g
|
Out-of-bounds Read in npmconf
|
Versions of `npmconf` before 2.1.3 allocate and write to disk uninitialized memory contents when a typed number is passed as input on Node.js 4.x.
## Recommendation
Update to version 2.1.3 or later. Consider switching to another config storage mechanism, as npmconf is deprecated and should not be used.
| null |
2020-08-31T18:31:27Z
|
2019-06-12T16:37:00Z
|
MODERATE
| null |
{'CWE-125'}
|
{'https://hackerone.com/reports/320269', 'https://nodesecurity.io/advisories/653', 'https://www.npmjs.com/advisories/653'}
| null |
npm
|
GHSA-vjvw-wcmw-pr26
|
Insufficient Entropy in parsel
|
All versions of `parsel` use an insecure key derivation function. The package runs keys of arbitrary lengths through one round of SHA256 hashing for key stretching. This allows for the use of keys of insufficient entropy with inappropriate key stretching.
## Recommendation
The package is deprecated and will not be updated. Consider using an alternative package.
| null |
2020-08-31T19:00:10Z
|
2020-09-04T17:37:08Z
|
CRITICAL
| null |
{'CWE-331'}
|
{'https://www.npmjs.com/advisories/1462'}
| null |
npm
|
GHSA-rg3q-jxmp-pvjj
|
Low severity vulnerability that affects materialize-css
|
In Materialize through 1.0.0, XSS is possible via the Toast feature.
|
{'CVE-2019-11004'}
|
2021-09-17T17:47:05Z
|
2019-04-09T19:44:37Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11004', 'https://github.com/Dogfalo/materialize', 'https://github.com/Dogfalo/materialize/issues/6286', 'https://github.com/advisories/GHSA-rg3q-jxmp-pvjj'}
| null |
npm
|
GHSA-qv78-398w-cxp7
|
Malicious Package in shrugging-logging
|
All versions of `shrugging-logging` contain malicious code as a postinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking,
## Recommendation
Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain.
| null |
2021-09-30T22:00:05Z
|
2020-09-11T21:08:19Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/920'}
| null |
npm
|
GHSA-87g3-x896-w798
|
Downloads Resources over HTTP in atom-node-module-installer
|
Affected versions of `atom-node-module-installer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `atom-node-module-installer`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not been updated since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10620'}
|
2021-01-08T19:11:36Z
|
2019-02-18T23:56:53Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-87g3-x896-w798', 'https://www.npmjs.com/advisories/216', 'https://nodesecurity.io/advisories/216', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10620'}
| null |
npm
|
GHSA-wxj7-97fp-j53j
|
Exposure of Resource to Wrong Sphere in Zip-Local
|
The package zip-local before 0.3.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) which can lead to an extraction of a crafted file outside the intended extraction directory.
|
{'CVE-2021-23484'}
|
2022-02-07T21:20:28Z
|
2022-02-01T00:46:01Z
|
CRITICAL
| null |
{'CWE-668', 'CWE-29'}
|
{'https://github.com/Mostafa-Samir/zip-local', 'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085', 'https://github.com/Mostafa-Samir/zip-local/blob/master/main.js%23L365', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23484', 'https://snyk.io/vuln/SNYK-JS-ZIPLOCAL-2327477'}
| null |
npm
|
GHSA-wqr3-24xm-fxhq
|
Directory Traversal in wffserve
|
Affected versions of `wffserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16168'}
|
2021-08-09T22:32:21Z
|
2020-09-01T17:31:22Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16168', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/city-weather-abe', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wffserve', 'https://www.npmjs.com/advisories/407'}
| null |
npm
|
GHSA-j8qr-rvcv-crhv
|
Malicious Package in electron-native-notify
|
All versions of `electron-native-notify` contain malicious code. The package was part of a targeted attack to steal cryptocurrency wallet seeds and upload them to a remote server, effectively giving attackers access to users wallets.
## Recommendation
Remove the package from your environment and [follow the recommendations by Komodo](https://komodoplatform.com/vulnerability-discovered-in-komodos-agama-wallet-this-is-what-you-need-to-do/)
| null |
2020-08-31T18:40:50Z
|
2020-09-11T21:18:05Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/927', 'https://komodoplatform.com/vulnerability-discovered-in-komodos-agama-wallet-this-is-what-you-need-to-do/', 'https://blog.npmjs.org/post/185397814280/plot-to-steal-cryptocurrency-foiled-by-the-npm'}
| null |
npm
|
GHSA-4jfq-q299-g4cr
|
Malicious Package in reqquest
|
All versions of `reqquest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:06:36Z
|
2020-09-02T20:28:57Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/860'}
| null |
npm
|
GHSA-cxwc-8pqp-2whw
|
Directory Traversal in qinserve
|
Affected versions of `qinserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16197'}
|
2020-08-31T18:22:59Z
|
2020-09-01T18:20:40Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/434', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/qinserve', 'https://www.npmjs.com/advisories/434', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16197'}
| null |
npm
|
GHSA-rvj9-8cvx-3vq9
|
Invalid Curve Attack in node-jose
|
Affected versions of `node-jose` are vulnerable to an invalid curve attack. This allows an attacker to recover the private secret key when JWE with Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES) is used.
[Proof of Concept](https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae)
## Recommendation
Update to version 0.9.3 or later.
|
{'CVE-2017-16007'}
|
2020-08-31T18:19:18Z
|
2018-07-20T21:10:14Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://nodesecurity.io/advisories/324', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16007', 'http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html', 'https://github.com/cisco/node-jose', 'https://www.npmjs.com/advisories/324', 'https://github.com/advisories/GHSA-rvj9-8cvx-3vq9', 'https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae'}
| null |
npm
|
GHSA-3hjg-vc7r-rcrw
|
Denial of Service vulnerability in @podium/layout and @podium/proxy
|
### Impact
An attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server.
All Podium layouts that include podlets with proxy endpoints are affected.
### Patches
`@podium/layout` which is the main way developers/users are vulnerable to this exploit, has been patched in version `4.6.110`. All earlier versions are vulnerable.
`@podium/proxy` which is the source of the vulnerability and is used by `@podium/layout` has been patched in version `4.2.74`. All earlier versions are vulnerable.
### Workarounds
It is not easily possible to work around this issue without upgrading. We recommend upgrading `@podium/layout` and/or `@podium/proxy` as soon as possible.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [podium-lib/issues](https://github.com/podium-lib/issues)
### Credits
The vulnerability was reported by [krynos](https://hackerone.com/krynos) from [Ercoli Consulting](https://www.ercoliconsulting.eu/) via FINN.no's private bug bounty program
|
{'CVE-2022-24822'}
|
2022-04-07T15:20:23Z
|
2022-04-07T15:20:23Z
|
HIGH
| null |
{'CWE-248'}
|
{'https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw', 'https://github.com/podium-lib/proxy/releases/tag/v4.2.74', 'https://github.com/podium-lib/layout/releases/tag/v4.6.110', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24822', 'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf', 'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039'}
| null |
npm
|
GHSA-6cpc-mj5c-m9rq
|
Arbitrary File Write in cli
|
Affected versions of `cli` use predictable temporary file names. If an attacker can create a symbolic link at the location of one of these temporarly file names, the attacker can arbitrarily write to any file that the user which owns the `cli` process has permission to write to.
## Proof of Concept
By creating Symbolic Links at the following locations, the target of the link can be written to.
```
lock_file = '/tmp/' + cli.app + '.pid',
log_file = '/tmp/' + cli.app + '.log';
```
## Recommendation
Update to version 1.0.0 or later.
|
{'CVE-2016-10538'}
|
2020-08-31T18:10:40Z
|
2019-02-18T23:40:03Z
|
LOW
| null |
{'CWE-22'}
|
{'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809252', 'https://www.npmjs.com/advisories/95', 'https://github.com/advisories/GHSA-6cpc-mj5c-m9rq', 'https://github.com/node-js-libs/cli/issues/81', 'https://nodesecurity.io/advisories/95', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10538'}
| null |
npm
|
GHSA-crpm-fm48-chj7
|
SQL Injection in resquel
|
All versions of `resquel` are vulnerable to SQL Injection. Query parameters are not properly sanitized, allowing attackers to inject SQL statements and execute arbitrary SQL queries
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:42:11Z
|
2020-09-11T21:13:44Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://www.npmjs.com/advisories/963'}
| null |
npm
|
GHSA-fwvq-x4j9-hr5f
|
Malicious Package in bs58chekc
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:50:01Z
|
2020-09-03T19:43:09Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1377'}
| null |
npm
|
GHSA-x67x-98x7-wv26
|
OS Command Injection in gulp-tape
|
gulp-tape through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands as part of 'gulp-tape' options.
|
{'CVE-2020-7605'}
|
2021-07-28T21:17:56Z
|
2021-05-07T16:14:56Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7605', 'https://snyk.io/vuln/SNYK-JS-GULPTAPE-560124'}
| null |
npm
|
GHSA-934w-hvj4-7fr6
|
Path Traversal in jsreport-chrome-pdf
|
This affects the package jsreport-chrome-pdf before 1.10.0.
|
{'CVE-2020-7762'}
|
2021-08-02T15:38:02Z
|
2021-04-13T15:25:15Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310', 'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7762'}
| null |
npm
|
GHSA-vxfp-qmpq-6826
|
Malicious Package in hpmm
|
All versions of `hpmm` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:46:35Z
|
2020-09-03T17:38:09Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1053'}
| null |
npm
|
GHSA-m489-xr35-fjxr
|
Regular Expression Denial of Service in millisecond
|
Versions of `millisecond` prior to 0.1.2 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed.
## Proof of concept
```
var ms = require('millisecond');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
ms(genstr(process.argv[2], "5") + " minutea");
```
## Recommendation
Update to version 0.1.2 or later.
| null |
2021-09-22T20:34:42Z
|
2021-09-22T20:35:08Z
|
MODERATE
| null |
{'CWE-400', 'CWE-1333'}
|
{'https://www.npmjs.com/advisories/59', 'https://github.com/unshiftio/millisecond/pull/4'}
| null |
npm
|
GHSA-4vvg-x86p-mvqc
|
Leaking of user information on Cross-Domain communication in sysend
|
### Impact
Users that use Cross-Origin communication and send sensitive information make it possible for this data to be intercepted.
This is not a big impact because it happens only on the same browser.
### Patches
It has been patched in version 1.10.0
### Workarounds
The only workaround is to not send sensitive information with sysend messages.
|
{'CVE-2022-24762'}
|
2022-03-28T17:26:41Z
|
2022-03-14T22:43:23Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/jcubic/sysend.js/', 'https://github.com/jcubic/sysend.js/releases/tag/1.10.0', 'https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24762', 'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a', 'https://github.com/jcubic/sysend.js/issues/33'}
| null |
npm
|
GHSA-3f95-w5h5-fq86
|
Prototype Pollution in mergify
|
All versions of `mergify` are vulnerable to Prototype Pollution. The `mergify()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative module as the package is deprecated.
| null |
2020-08-31T18:43:27Z
|
2020-09-11T21:22:24Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://hackerone.com/reports/439098', 'https://www.npmjs.com/advisories/995'}
| null |
npm
|
GHSA-926x-m6m5-3mmp
|
OS Command Injection
|
push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable "opt.branch" is not validated before being provided to the "git" command within "index.js#L139". This could be abused by an attacker to inject arbitrary commands.
|
{'CVE-2019-10803'}
|
2021-04-09T21:01:28Z
|
2022-02-09T22:50:06Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-PUSHDIR-559009', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10803', 'https://github.com/L33T-KR3W/push-dir/blob/master/index.js#L139'}
| null |
npm
|
GHSA-c497-v8pv-ch6x
|
Prototype pollution in nested-object-assign
|
The package nested-object-assign before 1.0.4 is vulnerable to Prototype Pollution via the default function.
|
{'CVE-2021-23329'}
|
2021-02-01T06:29:54Z
|
2021-02-01T15:01:14Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23329', 'https://www.npmjs.com/package/nested-object-assign', 'https://snyk.io/vuln/SNYK-JS-NESTEDOBJECTASSIGN-1065977', 'https://github.com/Geta/NestedObjectAssign/pull/11'}
| null |
npm
|
GHSA-5g4r-87v2-jqvx
|
Downloads Resources over HTTP in apk-parser
|
apk-parser is a tool to extract Android Manifest info from an APK file.
apk-parser versions below 0.1.6 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
## Recommendation
Update to version 0.1.6 or later.
|
{'CVE-2016-10564'}
|
2020-08-31T18:14:17Z
|
2020-09-01T16:05:44Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/195', 'https://nodesecurity.io/advisories/195', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10564'}
| null |
npm
|
GHSA-vp8g-53fw-r9f2
|
Malicious Package in dynamo-schema
|
Version 0.0.3 of `dynamo-schema` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.3 of this module is found installed you will want to replace it with a version before or after 0.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T17:28:16Z
|
2020-09-01T19:54:44Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://snyk.io/vuln/SNYK-JS-DYNAMOSCHEMA-450992', 'https://github.com/andrewjstone/dynamo-schema', 'https://www.npmjs.com/advisories/626'}
| null |
npm
|
GHSA-xp4x-j9vh-c3wf
|
OS Command Injection and Command Injection in kill-port-process
|
The kill-port-process package version < 2.2.0 is vulnerable to a Command Injection vulnerability.
|
{'CVE-2019-15609'}
|
2021-04-19T16:43:07Z
|
2022-02-10T20:20:31Z
|
HIGH
| null |
{'CWE-77', 'CWE-78'}
|
{'https://hackerone.com/reports/661959', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15609'}
| null |
npm
|
GHSA-9gj3-hwp5-pmwc
|
XSS in the `altField` option of the Datepicker widget in jquery-ui
|
### Impact
Accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:
```js
$( "#datepicker" ).datepicker( {
altField: "<img onerror='doEvilThing()' src='/404' />",
} );
```
will call the `doEvilThing` function.
### Patches
The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector.
### Workarounds
A workaround is to not accept the value of the `altField` option from untrusted sources.
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
|
{'CVE-2021-41182'}
|
2021-10-27T17:00:10Z
|
2021-10-26T14:55:02Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/', 'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/', 'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://www.drupal.org/sa-contrib-2022-004', 'https://www.tenable.com/security/tns-2022-09', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/jquery/jquery-ui', 'https://www.drupal.org/sa-core-2022-002', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41182', 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}
| null |
npm
|
GHSA-r2qc-w64x-6j54
|
XSS in Vega
|
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. Vega in an npm package.
In Vega before version 5.17.3 there is an XSS vulnerability in Vega expressions. Through a specially crafted Vega expression, an attacker could
execute arbitrary javascript on a victim's machine.
This is fixed in version 5.17.3
|
{'CVE-2020-26296'}
|
2021-01-07T22:32:50Z
|
2020-12-30T23:09:21Z
|
LOW
| null |
{'CWE-79'}
|
{'https://github.com/vega/vega/issues/3018', 'https://github.com/vega/vega/security/advisories/GHSA-r2qc-w64x-6j54', 'https://www.npmjs.com/package/vega', 'https://github.com/vega/vega/pull/3019', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26296', 'https://github.com/vega/vega/releases/tag/v5.17.3'}
| null |
npm
|
GHSA-9qj9-36jm-prpv
|
Regular Expression Denial of Service in fresh
|
Affected versions of `fresh` are vulnerable to regular expression denial of service when parsing specially crafted user input.
## Recommendation
Update to version 0.5.2 or later.
|
{'CVE-2017-16119'}
|
2020-08-31T18:26:27Z
|
2018-07-24T20:16:57Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/526', 'https://github.com/advisories/GHSA-9qj9-36jm-prpv', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16119', 'https://nodesecurity.io/advisories/526'}
| null |
npm
|
GHSA-cc2p-4jhr-xhhx
|
False-positive validity for NFT1 genesis transactions in SLPJS
|
### Impact
In the npm package named "slpjs", versions prior to 0.27.4 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification.
### Patches
npm package "slpjs" has been patched and is published and tagged as version 0.27.4.
### Workarounds
Upgrade to slpjs 0.27.4.
### References
* Package location: https://www.npmjs.com/package/slpjs
* SLP NFT1 spec: https://slp.dev/specs/slp-nft-1/#nft1-protocol-requirements
* Git commit hash fixing this issue: https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c
* Unit tests have been added to assist validator implementations in avoiding this bug: https://github.com/simpleledger/slp-unit-test-data/commit/8c942eacfae12686dcf1f3366321445a4fba73e7
### For more information
If you have any questions or comments about this advisory please open an issue in the [slp-validate](https://github.com/simpleledger/slpjs/issues) repository.
|
{'CVE-2020-15130'}
|
2021-01-07T23:43:05Z
|
2020-07-30T14:58:42Z
|
CRITICAL
| null |
{'CWE-697'}
|
{'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c', 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-cc2p-4jhr-xhhx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15130'}
| null |
npm
|
GHSA-7r2x-3qcm-8vfw
|
Downloads Resources over HTTP in herbivore
|
Affected versions of `herbivore` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `herbivore`.
## Recommendation
The module author has rewritten much of the package, and in that process, patched the vulnerability, but has not published any of the new code to npm.
In order to get an updated version, it is necessary to install the package from github. This can be done using the following command:
```
npm i samatt/herbivore
```
|
{'CVE-2016-10665'}
|
2021-01-08T19:14:20Z
|
2019-02-18T23:44:36Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/258', 'https://github.com/samatt/herbivore', 'https://github.com/advisories/GHSA-7r2x-3qcm-8vfw', 'https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3', 'https://nodesecurity.io/advisories/258', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10665'}
| null |
npm
|
GHSA-cph5-m8f7-6c5x
|
Incorrect Comparison in axios
|
axios is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3749'}
|
2021-09-09T13:39:38Z
|
2021-09-01T18:23:02Z
|
HIGH
| null |
{'CWE-400', 'CWE-697'}
|
{'https://www.npmjs.com/package/axios', 'https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E', 'https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31', 'https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929', 'https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E', 'https://github.com/axios/axios', 'https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3749', 'https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E'}
| null |
npm
|
GHSA-q9wr-gcjc-hq52
|
Prototype Pollution in reggae
|
All versions of `reggae` are vulnerable to prototype pollution. The function `set` does not restrict the modification of an Object's prototype, which may allow a malicious to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:55:23Z
|
2020-09-04T15:12:13Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1331'}
| null |
npm
|
GHSA-fx7m-j728-mjw3
|
Moderate severity vulnerability that affects uap-core
|
An issue was discovered in regex.yaml (aka regexes.yaml) in UA-Parser UAP-Core before 0.6.0. A Regular Expression Denial of Service (ReDoS) issue allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to a value containing a long digit string. (The UAP-Core project contains the vulnerability, propagating to all implementations.)
|
{'CVE-2018-20164'}
|
2021-09-10T20:12:01Z
|
2019-03-06T17:35:47Z
|
MODERATE
| null |
{'CWE-185'}
|
{'https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014', 'https://github.com/ua-parser/uap-core', 'https://www.x41-dsec.de/lab/advisories/x41-2018-009-uaparser/', 'https://github.com/ua-parser/uap-core/issues/332', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20164', 'https://github.com/ua-parser/uap-core/commit/156f7e12b215bddbaf3df4514c399d683e6cdadc', 'https://github.com/advisories/GHSA-fx7m-j728-mjw3'}
| null |
npm
|
GHSA-jqjg-v355-hr9q
|
Malicious Package in buffer-xop
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:12:22Z
|
2020-09-03T22:11:02Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1250'}
| null |
npm
|
GHSA-cv3v-7846-6pxm
|
Unauthorized File Access in node-git-server
|
Versions of `node-git-server` prior to 0.6.1 are vulnerable to Unauthorized File Access. It is possible to access any git repository by using absolute paths, which may allow attackers to access private repositories.
## Recommendation
Upgrade to version 0.6.1 or later.
| null |
2021-09-29T19:59:01Z
|
2020-09-03T21:15:19Z
|
HIGH
| null |
{'CWE-552'}
|
{'https://snyk.io/vuln/SNYK-JS-NODEGITSERVER-474343', 'https://github.com/gabrielcsapo/node-git-server', 'https://www.npmjs.com/advisories/1214', 'https://github.com/gabrielcsapo/node-git-server/commit/ac26650f69bc445d71e4f2c55328676d10a4be43', 'https://github.com/gabrielcsapo/node-git-server/pull/62'}
| null |
npm
|
GHSA-q324-q795-2q5p
|
Path traversal when using `preview-docs` when working dir contains files with question mark `?` in name
|
### Impact
`preview-docs` command allows path traversal if current working dir contains files with question mark `?` in name and attacker knows the name.
### Patches
It was patched starting from 1.0.0-beta.59
### Workarounds
Do not run openapi-cli preview-docs command in the folder which contains files with question mark `?` in name.
### References
https://github.com/Redocly/openapi-cli/pull/347
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [@redocly/openapi-cli](https://github.com/Redocly/openapi-cli)
* Email us at [security@redocly.com](mailto:security@redocly.com)
| null |
2021-10-11T18:40:44Z
|
2021-10-12T16:05:11Z
|
LOW
| null | null |
{'https://github.com/Redocly/openapi-cli/security/advisories/GHSA-q324-q795-2q5p', 'https://github.com/Redocly/openapi-cli/pull/347', 'https://github.com/Redocly/openapi-cli'}
| null |
npm
|
GHSA-j636-crp3-m584
|
Cross-site Scripting in tableexport.jquery.plugin
|
There is a cross-site scripting vulnerability with default `onCellHtmlData` function in GitHub repository hhurz/tableexport.jquery.plugin prior to 1.25.0. This can result in transmitting cookies to third-party servers and/or sending data from secure sessions to third-party servers.
|
{'CVE-2022-1291'}
|
2022-04-22T20:17:22Z
|
2022-04-11T00:00:22Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1291', 'https://github.com/hhurz/tableexport.jquery.plugin', 'https://github.com/hhurz/tableexport.jquery.plugin/commit/dcbaee23cf98328397a153e71556f75202988ec9', 'https://huntr.dev/bounties/49a14371-6058-47dd-9801-ec38a7459fc5'}
| null |
npm
|
GHSA-j3wh-5m26-2pf7
|
Downloads Resources over HTTP in mystem-fix
|
Affected versions of `mystem-fix` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem-fix`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10698'}
|
2021-01-08T18:36:58Z
|
2018-07-27T14:34:11Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/301', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10698', 'https://github.com/advisories/GHSA-j3wh-5m26-2pf7', 'https://nodesecurity.io/advisories/301'}
| null |
npm
|
GHSA-h4hr-7fg3-h35w
|
Denial of service in prismjs
|
The package prismjs before 1.23.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the prism-asciidoc, prism-rest, prism-tap and prism-eiffel components.
|
{'CVE-2021-23341'}
|
2021-02-24T07:34:23Z
|
2021-03-01T19:52:33Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-PRISMJS-1076581', 'https://www.npmjs.com/package/prismjs', 'https://github.com/PrismJS/prism/issues/2583', 'https://github.com/PrismJS/prism/pull/2584', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1076583', 'https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23341', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076582'}
| null |
npm
|
GHSA-p3hc-fv2j-rp68
|
Prototype Pollution in swiper
|
Versions of the package swiper before 6.5.1 are susceptible to prototype pollution.
|
{'CVE-2021-23370'}
|
2021-05-07T17:34:38Z
|
2021-05-10T15:36:30Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/nolimits4web/swiper/blob/master/CHANGELOG.md#651-2021-03-29', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23370', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696', 'https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad', 'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697', 'https://snyk.io/vuln/SNYK-JS-SWIPER-1088062', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698'}
| null |
npm
|
GHSA-r5fx-8r73-v86c
|
Cross-Site Scripting in angular
|
Versions of `angular` prior to 1.5.0-beta.1 are vulnerable to Cross-Site Scripting. The package fails to sanitize `xlink:href` attributes, which may allow attackers to execute arbitrary JavaScript in a victim's browser if the value is user-controlled.
## Recommendation
Upgrade to version 1.5.0-beta.1 or later.
|
{'CVE-2019-14863'}
|
2021-08-19T17:14:00Z
|
2020-02-14T23:08:49Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/angular/angular.js/pull/12524', 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a', 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82', 'https://snyk.io/vuln/npm:angular:20150807', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14863', 'https://www.npmjs.com/advisories/1453', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14863'}
| null |
npm
|
GHSA-468q-v4jj-485h
|
Inefficient Regular Expression Complexity in taro
|
taro is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3804'}
|
2021-09-20T20:00:02Z
|
2021-09-20T20:09:59Z
|
HIGH
| null |
{'CWE-1333'}
|
{'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5', 'https://github.com/nervjs/taro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3804', 'https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414'}
| null |
npm
|
GHSA-rjmf-p882-645m
|
Improper Certificate Validation
|
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering client-side field level encryption (CSFLE) ineffective. This issue was discovered during internal testing and affects mongodb-client-encryption module version 1.2.0, which was available from 2021-Jan-29 and deprecated in the NPM Registry on 2021-Feb-04. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services from applications residing inside the AWS, GCP, and Azure nework fabrics due to compensating controls in these environments. This issue does not impact driver workloads that don’t use Field Level Encryption.
|
{'CVE-2021-20327'}
|
2021-04-12T18:51:10Z
|
2021-04-12T18:51:17Z
|
MODERATE
| null |
{'CWE-295'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20327', 'https://jira.mongodb.org/browse/NODE-3125', 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b', 'https://www.npmjs.com/advisories/1660'}
| null |
npm
|
GHSA-4cj8-g9cp-v5wr
|
High severity vulnerability that affects blueimp-file-upload
|
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
|
{'CVE-2018-9206'}
|
2021-09-01T14:43:45Z
|
2018-10-22T18:53:56Z
|
CRITICAL
| null |
{'CWE-434'}
|
{'http://www.securityfocus.com/bid/105679', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.exploit-db.com/exploits/46182/', 'https://wpvulndb.com/vulnerabilities/9136', 'http://www.securityfocus.com/bid/106629', 'https://nvd.nist.gov/vuln/detail/CVE-2018-9206', 'http://www.vapidlabs.com/advisory.php?v=204', 'https://www.exploit-db.com/exploits/45790/', 'https://github.com/advisories/GHSA-4cj8-g9cp-v5wr'}
| null |
npm
|
GHSA-m7xv-7p93-g6q8
|
Malicious Package in libubx
|
Version 1.0.3 of `libubx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:13Z
|
2020-09-03T00:35:35Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/938'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.