ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-4449-hg37-77v8
Command injection in total.js
There is a command injection vulnerability that affects the package total.js before version 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.
{'CVE-2020-28494'}
2021-07-28T18:57:23Z
2021-02-05T20:43:27Z
HIGH
null
{'CWE-78'}
{'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5', 'https://www.npmjs.com/package/total.js', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28494', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672'}
null
npm
GHSA-qffw-8wg7-h665
Command injection in git-interface
A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.
{'CVE-2022-1440'}
2022-04-29T17:22:43Z
2022-04-23T00:03:01Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/yarkeev/git-interface', 'https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440', 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}
null
npm
GHSA-686g-3xr3-x4x6
Information Exposure on Case Insensitive File Systems in serve
Versions of `serve` before 7.0.0 are vulnerable to information exposure, bypassing the ignore security control, but only on case insensitive file systems. ## Recommendation Update to version 7.0.0 or later.
{'CVE-2018-3809'}
2021-09-01T22:46:06Z
2018-07-18T18:33:15Z
MODERATE
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3809', 'https://www.npmjs.com/advisories/672', 'https://github.com/advisories/GHSA-686g-3xr3-x4x6', 'https://hackerone.com/reports/330650'}
null
npm
GHSA-h3rx-g5c9-8q4x
Prototype Pollution in bmoor
The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7736'}
2021-04-22T22:35:49Z
2021-05-10T18:37:26Z
HIGH
null
{'CWE-1321'}
{'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5', 'https://www.npmjs.com/package/bmoor', 'https://snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7736'}
null
npm
GHSA-v2jv-33gh-xx29
Command Injection in ps-visitor
This affects all versions up to and including version 0.0.2 of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23374'}
2021-05-06T22:31:21Z
2021-05-07T16:06:23Z
CRITICAL
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23374', 'https://github.com/WisdomKwan/ps-visitor/blob/cdfc934a8e4af95aa0473f4b2a4bd091d09faf2f/index.js%23L404', 'https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544'}
null
npm
GHSA-vpgc-7h78-gx8f
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2020-09-04T16:24:37Z
2020-09-04T18:05:14Z
LOW
null
null
{'https://github.com/personnummer/js/security/advisories/GHSA-vpgc-7h78-gx8f', 'https://www.npmjs.com/package/personnummer'}
null
npm
GHSA-722q-3g9x-vp8q
Downloads Resources over HTTP in tomita-parser
Affected versions of `tomita-parser` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita-parser`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10666'}
2021-01-08T19:18:41Z
2019-02-18T23:54:41Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/261', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10666', 'https://nodesecurity.io/advisories/261', 'https://github.com/advisories/GHSA-722q-3g9x-vp8q'}
null
npm
GHSA-m2fp-c79h-rr79
Malicious Package in tensorplow
All versions of `tensorplow` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:56:28Z
2020-09-02T21:42:56Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/910'}
null
npm
GHSA-qwqc-28w3-fww6
Message Signature Bypass in openpgp
Versions of `openpgp` prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type `text`. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as `standalone` or `timestamp`). For example, an attacker that captures a `standalone` signature packet from a victim can construct arbitrary signed messages that would be verified correctly. ## Recommendation Upgrade to version 4.2.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
{'CVE-2019-9153'}
2021-08-17T22:06:12Z
2019-08-23T21:42:20Z
HIGH
null
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9153', 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460248', 'https://github.com/openpgpjs/openpgpjs/pull/816', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.npmjs.com/advisories/1160', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}
null
npm
GHSA-g8jc-mm3c-cwhj
Malicious Package in reques
All versions of `reques` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:08:00Z
2020-09-02T20:31:06Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/863'}
null
npm
GHSA-r32x-jhw5-g48p
Cross-Site Scripting in eco
All versions of `eco` are vulnerable to Cross-Site Scripting (XSS). The package's default `__escape` implementation fails to escape single quotes, which may allow attackers to execute arbitrary JavaScript on the victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-28T21:17:47Z
2020-09-03T17:08:20Z
HIGH
null
{'CWE-79'}
{'https://github.com/sstephenson/eco', 'https://github.com/sstephenson/eco/pull/67', 'https://www.npmjs.com/advisories/1024'}
null
npm
GHSA-mm7r-265w-jv6f
Server-Side Request Forgery in @uppy/companion
Versions of `@uppy/companion` prior to 1.9.3 are vulnerable to Server-Side Request Forgery (SSRF). The `get` route passes the user-controlled variable `req.body.url` to a GET request without sanitizing the value. This allows attackers to inject arbitrary URLs and make GET requests on behalf of the server. ## Recommendation Upgrade to version 1.9.3 or later.
{'CVE-2020-8135'}
2020-08-31T19:01:35Z
2020-09-03T15:51:19Z
HIGH
null
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8135', 'https://www.npmjs.com/advisories/1501', 'https://hackerone.com/reports/786956'}
null
npm
GHSA-mfwh-5m23-j46w
Environment Variable Injection in GitHub Actions
### Impact The `@actions/core` npm module `addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. ### Patches The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new [Environment File Syntax](https://github.com/actions/toolkit/blob/main/docs/commands.md#environment-files). Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution. ### Workarounds None, it is strongly suggested that you upgrade as soon as possible. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Actions Toolkit](https://github.com/actions/toolkit/issues)
{'CVE-2020-15228'}
2021-11-19T15:11:59Z
2020-10-01T17:16:20Z
LOW
null
{'CWE-77', 'CWE-20'}
{'https://github.com/actions/toolkit/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15228', 'http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html', 'https://github.com/actions/toolkit/security/advisories/GHSA-mfwh-5m23-j46w'}
null
npm
GHSA-vvfh-mvjv-w38q
Malicious Package in babel-loadre
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:17:42Z
2020-09-04T15:28:19Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1349'}
null
npm
GHSA-xrrg-wfwc-c7r3
Malicious Package in bictoin-ops
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:37:47Z
2020-09-04T15:33:52Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1354'}
null
npm
GHSA-vh59-v9r5-4mh4
Cross-site scripting in jspdf
It's possible to inject JavaScript code via the html method.
{'CVE-2020-7690'}
2021-05-11T17:38:24Z
2021-05-17T21:01:32Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575257', 'https://snyk.io/vuln/SNYK-JS-JSPDF-575256', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575258', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7690', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575260', 'https://github.com/MrRio/jsPDF/issues/2795', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575259'}
null
npm
GHSA-jf8x-wg7f-p3w8
Malicious Package in cage-js
All versions of `cage-js` contains malicious code. The malware downloads and runs a script from a remote server as a postinstall script. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:05:28Z
2020-09-03T18:22:33Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1085'}
null
npm
GHSA-84fq-6626-w5fg
CORS Token Disclosure in crumb
When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes as this user. A configuration and scenario where this would occur is unlikely, as most configurations will set CORS globally (where crumb is not used), or not at all. ## Recommendation Update to version 3.0.0 or greater.
{'CVE-2014-7193'}
2020-08-31T18:07:28Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-284'}
{'https://www.npmjs.com/advisories/4', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7193', 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/advisories/GHSA-84fq-6626-w5fg', 'https://nodesecurity.io/advisories/crumb_cors_token_disclosure'}
null
npm
GHSA-rqf8-8c89-mw29
Cross-site Scripting in curly-bracket-parser
This affects all versions of package curly-bracket-parser. When used as a template library, it does not properly sanitize the user input.
{'CVE-2021-23416'}
2021-08-31T21:14:23Z
2021-08-10T16:08:16Z
MODERATE
null
{'CWE-79'}
{'https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js%23L31', 'https://github.com/magynhard/curly-bracket-parser', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23416', 'https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js#23L31', 'https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106'}
null
npm
GHSA-9frq-f867-hgqc
Directory Traversal in fast-http-cli
`fast-http-cli` is the command line interface for `fast-http`, a simple web server. `fast-http-cli` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Example Request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host: localhost ``` and server Response: ``` HTTP/1.1 200 OK Date: Thu, 04 May 2017 23:59:18 GMT Connection: keep-alive Transfer-Encoding: chunked {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16155'}
2020-08-31T18:21:12Z
2018-07-23T20:46:25Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/383', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fast-http-cli', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16155', 'https://github.com/advisories/GHSA-9frq-f867-hgqc', 'https://nodesecurity.io/advisories/383'}
null
npm
GHSA-xcvv-84j5-jw9h
Prototype Pollution in assign-deep
Versions of `assign-deep` before 0.4.7 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 0.4.7 or later.
{'CVE-2018-3720'}
2020-08-31T18:28:34Z
2018-07-26T15:12:31Z
LOW
null
{'CWE-471'}
{'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11', 'https://www.npmjs.com/advisories/579', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3720', 'https://github.com/advisories/GHSA-xcvv-84j5-jw9h', 'https://hackerone.com/reports/310707'}
null
npm
GHSA-c94v-8fff-73ph
Command Injection in @theia/messages
In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run.
{'CVE-2021-28162'}
2021-05-07T17:57:37Z
2021-05-10T15:36:55Z
MODERATE
null
{'CWE-829'}
{'https://github.com/eclipse-theia/theia/blob/master/CHANGELOG.md#v100---26032020', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28162', 'https://github.com/eclipse-theia/theia/pull/7289', 'https://github.com/eclipse-theia/theia/issues/7283'}
null
npm
GHSA-49vv-6q7q-w5cf
OS Command Injection in Strapi
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
{'CVE-2019-19609'}
2021-09-01T19:36:25Z
2021-12-10T17:22:12Z
HIGH
null
{'CWE-20', 'CWE-78'}
{'https://bittherapy.net/post/strapi-framework-remote-code-execution/', 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html', 'https://github.com/strapi/strapi/pull/4636', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19609', 'http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html', 'https://github.com/strapi/strapi'}
null
npm
GHSA-c7pp-g2v2-2766
DOM-based XSS in gmail-js
Affected versions of `gmail-js` are vulnerable to cross-site scripting in the `tools.parse_response`, `helper.get.visible_emails_post`, and `helper.get.email_data_post` functions, which pass user input directly into the Function constructor. ## Recommendation Update to version 0.6.5 or later.
{'CVE-2016-1000228'}
2021-09-23T21:31:53Z
2020-09-01T15:32:04Z
HIGH
null
{'CWE-79'}
{'https://github.com/KartikTalwar/gmail.js/issues/281', 'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1', 'https://github.com/KartikTalwar/gmail.js', 'https://www.npmjs.com/advisories/125', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000228'}
null
npm
GHSA-65m9-m259-7jqw
Improper Authorization in react-oauth-flow
All versions of `react-oauth-flow` fail to properly implement the OAuth protocol. The package stores secrets in the front-end code. Instead of using a public OAuth client, it uses a confidential client on the browser. This may allow attackers to compromise server credentials. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-10-04T21:06:12Z
2020-09-03T15:49:29Z
CRITICAL
null
{'CWE-285'}
{'https://github.com/ethereum/web3.js', 'https://www.npmjs.com/advisories/1487', 'https://github.com/ethereum/web3.js/issues/2739'}
null
npm
GHSA-3q9x-w53p-jg53
OS Command Injection in heroku-addonpool
heroku-addonpool through 0.1.15 is vulnerable to Command Injection.
{'CVE-2020-7634'}
2021-07-28T22:58:36Z
2021-12-09T19:52:03Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428', 'https://github.com/nodef/heroku-addonpool/blob/master/index.js', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7634'}
null
npm
GHSA-gr58-j5wh-m333
Prototype Pollution in nis-utils
All versions of package nis-utils up to and including 0.6.10 are vulnerable to Prototype Pollution via the setValue function.
{'CVE-2020-7703'}
2021-05-05T21:33:21Z
2021-05-06T17:29:08Z
CRITICAL
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-NISUTILS-598799', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7703'}
null
npm
GHSA-4cpg-3vgw-4877
Prototype pollution in Plist
Prototype pollution vulnerability via `.parse()` in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
{'CVE-2022-22912'}
2022-03-23T15:06:35Z
2022-02-18T00:00:33Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/TooTallNate/plist.js/pull/118', 'https://github.com/TooTallNate/plist.js/issues/114', 'https://github.com/TooTallNate/plist.js', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22912', 'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52'}
null
npm
GHSA-36r8-9qq7-mh43
Malicious Package in we3b
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T19:09:44Z
2020-09-03T17:02:40Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1415'}
null
npm
GHSA-8w4h-3cm3-2pm2
Out-of-bounds Read in atob
Versions of `atob` before 2.1.0 uninitialized Buffers when number is passed in input on Node.js 4.x and below. ## Recommendation Update to version 2.1.0 or later.
{'CVE-2018-3745'}
2020-08-31T18:31:10Z
2018-10-09T00:56:26Z
MODERATE
null
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3745', 'https://www.npmjs.com/advisories/646', 'https://github.com/advisories/GHSA-8w4h-3cm3-2pm2', 'https://hackerone.com/reports/321686'}
null
npm
GHSA-mg69-6j3m-jvgw
HTML Injection in marky-markdown
All versions of `marky-markdown` are vulnerable to HTML Injection. The package fails to sanitize `style` attributes in `img` tags of the markdown input. This may allow attackers to affect the size of images in the rendered HTML. ## Recommendation This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown`
null
2021-10-04T20:55:27Z
2020-09-03T15:45:08Z
HIGH
null
{'CWE-79'}
{'https://github.com/npm/marky-markdown', 'https://snyk.io/vuln/SNYK-JS-MARKYMARKDOWN-548871', 'https://www.npmjs.com/advisories/1470'}
null
npm
GHSA-c9g6-9335-x697
Improper Input Validation in SocksJS-Node
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
{'CVE-2020-7693'}
2021-04-06T21:47:25Z
2021-04-13T15:27:51Z
MODERATE
null
{'CWE-20'}
{'https://github.com/sockjs/sockjs-node/pull/265', 'https://github.com/andsnw/sockjs-dos-py', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693', 'https://snyk.io/vuln/SNYK-JS-SOCKJS-575261', 'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16', 'https://www.npmjs.com/package/sockjs', 'https://github.com/sockjs/sockjs-node/issues/252', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448'}
null
npm
GHSA-pg53-56cg-4m8q
Token verification bug in next-auth
### Impact Implementations using the **Prisma database adapter** with the **Email provider** **are impacted**. Implementations using the Prisma database adapter that are not using the Email provider are not impacted. Implementations using the default database adapter (TypeORM) with the Email provider are not impacted. Implementations not using a database are not impacted. ### Patches This issue is fixed in 3.3.0 and newer versions. ### Workarounds Those not able to upgrade can alternatively disable the Email provider as a workaround. ### Description The Prisma database adapter was checking the verification token but not the identifier (the email address associated with the token). This made it possible to use a valid token assigned to one user, to sign in as another user when using the Prima adapter in conjunction with the Email provider. The defect is specific to the community-supported Prisma database adapter in versions <3.3.0 and is not present in the default database adapter (TypeORM). *Note: The current community-supported adapter was not developed by Prisma.* The defect was a problem in the implementation of verification function the adapter and is not directly related to Prisma. The flaw may exist in other third party database adapters that do not check both the identifier and token values. The design of the database adapter API may be revised in future to help reduce the likelyhood of similar defects. ### Timeline On Monday (2021-02-08) we were notified via responsible disclosure by Alessandro Angelino (@AlessandroA) of a flaw in the implementation of the Prisma database adapter included with NextAuth.js. A detailed write up and proof of concept were provided. The following day (2021-02-09) we published a fix in v3.3.0 and confirmed through internal testing, and with Alessandro, that the issue was resolved in the new release and prompted users to upgrade. On 2021-02-10 we received a CVE ID and published this advisory within a few hours of notification. We would like to thank Alessandro for using responsible disclose to allow us to address the issue promptly and publish this advisory once an update was available that resolved the issue and Balázs Orbán (@balazsorban44) for facilitating a timely release of the fix.
{'CVE-2021-21310'}
2021-02-22T20:43:03Z
2021-02-11T21:36:24Z
LOW
null
{'CWE-290'}
{'https://www.npmjs.com/package/next-auth', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21310', 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pg53-56cg-4m8q', 'https://github.com/nextauthjs/next-auth/releases/tag/v3.3.0'}
null
npm
GHSA-pwhf-39xg-4rxw
Script injection
### Impact A malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. ### Patches The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
{'CVE-2021-32660'}
2021-06-04T19:23:33Z
2021-06-04T19:09:35Z
MODERATE
null
{'CWE-77', 'CWE-434'}
{'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32660', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/security/advisories/GHSA-pwhf-39xg-4rxw'}
null
npm
GHSA-766v-7gjx-55hf
Malicious Package in js-shq3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:14:27Z
2020-09-03T23:08:34Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1289'}
null
npm
GHSA-p239-93f7-h6xf
Cross-Site Scripting in swagger-ui
Affected versions of `swagger-ui` contain a cross-site scripting vulnerability in the key names of a specific nested object in the JSON document. ## Proof of Concept The vulnerable object structure is: ``` { "definitions": { "arbitraryVal": { "properties": { "<INJECTABLE_KEY_NAME>": "LoremIpsum" } } } } ``` Malicious JSON documents can be loaded in by providing a URL to them in the `url` query string parameter. ## Recommendation Update to version 2.2.1 or later.
{'CVE-2016-5682'}
2021-09-23T21:32:17Z
2020-09-01T15:30:58Z
CRITICAL
null
{'CWE-79'}
{'https://community.rapid7.com/community/infosec/blog/2016/09/02/r7-2016-19-persistent-xss-via-unescaped-parameters-in-swagger-ui', 'https://www.npmjs.com/advisories/126', 'https://github.com/swagger-api/swagger-ui/issues/1865', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5682', 'https://github.com/swagger-api/swagger-ui'}
null
npm
GHSA-w6v7-w58j-pg5r
Improper Verification of Communication Channel in @theia/plugin-ext
In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().
{'CVE-2021-41038'}
2021-11-15T14:59:59Z
2021-11-15T17:40:51Z
MODERATE
null
{'CWE-940'}
{'https://github.com/eclipse-theia/theia', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41038', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924', 'https://github.com/eclipse-theia/theia/pull/10125'}
null
npm
GHSA-88g8-f5mf-f5rj
Improper Initialization in OpenZeppelin
In OpenZeppelin <=v4.4.0, initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible, breaking the expectation that there is a single execution.
{'CVE-2021-46320'}
2022-02-11T16:20:03Z
2022-02-05T00:00:31Z
HIGH
null
{'CWE-665'}
{'https://github.com/OpenZeppelin/openzeppelin-contracts', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46320', 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx', 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.4.1'}
null
npm
GHSA-rj44-gpjc-29r7
[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values
### Impact Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled) ### Patches [A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0 ### Workarounds By default, EGF parse functions do NOT attempt to decrypt values (since GPG is only available in non-browser env). However, if GPG encrypted values are used/required: 1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\`) chars in the encrypted value string 2. Replace/remove them or skip parsing if present... ### References https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7#advisory-comment-65261 ### For more information If you have any questions or comments about this advisory, please open an issue in the [thi.ng/umbrella repo](https://github.com/thi-ng/umbrella/issues), of which this package is part of.
{'CVE-2021-21412'}
2021-03-30T20:20:04Z
2021-04-06T17:22:41Z
MODERATE
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21412', 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7', 'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243', 'https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27', 'https://www.npmjs.com/package/@thi.ng/egf'}
null
npm
GHSA-92px-q4w8-hrr5
Malicious Package in impala
Version 1.1.7 of `impala` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.1.7 of this module is found installed you will want to replace it with a version before or after 1.1.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T18:30:53Z
2020-09-01T19:56:52Z
CRITICAL
null
{'CWE-506'}
{'https://github.com/shenfw1987/impala', 'https://snyk.io/vuln/SNYK-JS-IMPALA-450989', 'https://www.npmjs.com/advisories/628'}
null
npm
GHSA-p4pj-mg4r-x6v4
Denial of Service in uap-core
## Impact Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. ## Patches Please update uap-core to >= v0.11.0 Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.
{'CVE-2021-21317'}
2021-02-16T17:45:27Z
2021-02-02T15:46:38Z
HIGH
null
{'CWE-400'}
{'https://github.com/ua-parser/uap-core/security/advisories/GHSA-p4pj-mg4r-x6v4', 'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21317', 'https://www.npmjs.com/package/uap-core'}
null
npm
GHSA-qfc9-x7gv-27jr
Malicious Package in deasyncp
All versions of `deasyncp ` contain malicious code. The package shuts down the machine upon installation as a preinstall script. ## Recommendation Remove the package from your environment. There is no further compromise.
null
2021-09-30T20:03:51Z
2020-09-03T18:12:36Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1073'}
null
npm
GHSA-2fw4-mgq9-39cx
Code Injection in oauth2-server
"oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also therefore wouldn't describe this as a "vulnerability" with the library per se.'"
{'CVE-2017-18924'}
2021-04-21T21:15:38Z
2021-04-22T15:53:45Z
HIGH
null
{'CWE-94'}
{'https://github.com/oauthjs/node-oauth2-server/issues/637', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18924', 'https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467', 'https://tools.ietf.org/html/rfc7636', 'https://tools.ietf.org/html/draft-ietf-oauth-security-topics-15', 'https://github.com/oauthjs/node-oauth2-server/pull/452'}
null
npm
GHSA-426h-24vj-qwxf
Command Injection in npm-programmatic
All versions of `npm-programmatic ` are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `install`, `uninstall` and `list` functions . This may allow attackers to execute arbitrary code in the system if the package name passed to the function is user-controlled. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2020-7614'}
2021-07-29T15:52:29Z
2020-04-23T20:09:09Z
CRITICAL
null
{'CWE-20', 'CWE-78'}
{'https://github.com/Manak/npm-programmatic/blob/master/index.js#L18', 'https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115', 'https://www.npmjs.com/advisories/1507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7614'}
null
npm
GHSA-pfj7-2qfw-vwgm
Path traversal in translator module in NodeBB
### Impact Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory. ### Patches The vulnerability has been patched as of v1.18.5. ### Workarounds Cherry-pick commit hash `c8b2fc46dc698db687379106b3f01c71b80f495f` to receive this patch in lieu of a full upgrade. ### For more information If you have any questions or comments about this advisory: * Email us at [security@nodebb.org](mailto:security@nodebb.org)
{'CVE-2021-43788'}
2021-11-30T14:35:14Z
2021-11-30T22:20:43Z
MODERATE
null
{'CWE-22'}
{'https://github.com/NodeBB/NodeBB', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-pfj7-2qfw-vwgm', 'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43788'}
null
npm
GHSA-rc8h-3fv6-pxv8
Denial of Service in hapi
Versions of `hapi` prior to 11.1.3 are affected by a denial of service vulnerability. The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers. This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hapi will continue to hold the socket open until timed out (default node timeout is 2 minutes). ## Recommendation Update to v11.1.3 or later
{'CVE-2015-9241'}
2020-08-31T18:09:46Z
2018-06-07T19:43:15Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-9241', 'https://nodesecurity.io/advisories/64', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580', 'https://github.com/advisories/GHSA-rc8h-3fv6-pxv8', 'https://nodesecurity.io/advisories/63', 'https://www.npmjs.com/advisories/63'}
null
npm
GHSA-fxwf-45c7-4ppr
Prototype pollution in object-hierarchy-access
Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28270'}
2022-01-07T16:07:29Z
2021-10-12T16:40:58Z
CRITICAL
null
{'CWE-915', 'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270,', 'https://github.com/mjpclab/object-hierarchy-access', 'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28270', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270'}
null
npm
GHSA-c7pp-x73h-4m2v
Cross-Site Scripting in bootstrap-vue
Versions of `bootstrap-vue` prior to 2.0.0-rc.12 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization, components may be vulnerable to Cross-Site Scripting through the `options` variable. This may lead to the execution of malicious JavaScript on the user's browser. ## Recommendation Upgrade to version 2.0.0-rc.12 or later.
null
2021-09-27T15:43:19Z
2020-09-02T15:53:46Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/770', 'https://github.com/bootstrap-vue/bootstrap-vue/issues/1974', 'https://github.com/bootstrap-vue/bootstrap-vue'}
null
npm
GHSA-pxq7-4ppw-qp7f
Directory Traversal in serverzyy
Affected versions of `serverzyy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16135'}
2020-08-31T18:22:52Z
2020-09-01T18:19:36Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/431', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16135', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverzyy', 'https://nodesecurity.io/advisories/431'}
null
npm
GHSA-f7gc-6hcj-wc42
Malicious Package in path-to-regxep
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:03:55Z
2020-09-03T17:05:06Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1401'}
null
npm
GHSA-h236-g5gh-vq6c
Cross-site scripting in Froala Editor
Froala Editor before 3.0.6 allows XSS.
{'CVE-2019-19935'}
2022-02-10T23:32:51Z
2022-02-10T23:32:51Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19935', 'https://compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Editor.txt', 'https://github.com/froala/wysiwyg-editor/compare/v3.0.5...v3.0.6', 'https://snyk.io/vuln/npm:froala-editor', 'https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/', 'http://packetstormsecurity.com/files/158300/Froala-WYSIWYG-HTML-Editor-3.1.1-Cross-Site-Scripting.html'}
null
npm
GHSA-fqw7-8v6m-2f86
Malicious Package in hulp
All versions of `hulp` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:54:46Z
2020-09-02T21:37:39Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/905'}
null
npm
GHSA-fmf5-j5j9-99pp
OS Command Injection in pulverizr
pulverizr through 0.7.0 allows execution of arbitrary commands. Within &quot;lib/job.js&quot;, the variable &quot;filename&quot; can be controlled by the attacker. This function uses the variable &quot;filename&quot; to construct the argument of the exec call without any sanitization. In order to successfully exploit this vulnerability, an attacker will need to create a new file with the same name as the attack command.
{'CVE-2020-7604'}
2021-07-28T20:51:44Z
2021-05-07T16:20:44Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-PULVERIZR-560122', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7604'}
null
npm
GHSA-q43m-ffwr-rpcc
SSL Validation Defaults to False in electron-packager
Affected versions of `electron-packager` configure the generated application to disable SSL certificate verification by default. This could allow an attacker with a privileged network position to launch a Man In The Middle (MITM) attack on the install process, intercepting the step where electron-packager downloads Electron for supported target platforms and architectures, and replacing the valid download with a tampered malicious one. This only affects users using the electron-packager CLI. The strict-ssl option defaults to true for the node.js API. ## Recommendation 1. Update to version 7.0.0 or later. 2. Delete the `electron-download` cache folder, which is by default located at `~/.electron`.
{'CVE-2016-10534'}
2021-01-08T18:18:07Z
2019-02-18T23:58:24Z
LOW
null
{'CWE-295'}
{'https://www.npmjs.com/advisories/104', 'https://nodesecurity.io/advisories/104', 'https://github.com/electron-userland/electron-packager/issues/333', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10534', 'https://github.com/advisories/GHSA-q43m-ffwr-rpcc'}
null
npm
GHSA-57cf-349j-352g
Out-of-bounds Read in npmconf
Versions of `npmconf` before 2.1.3 allocate and write to disk uninitialized memory contents when a typed number is passed as input on Node.js 4.x. ## Recommendation Update to version 2.1.3 or later. Consider switching to another config storage mechanism, as npmconf is deprecated and should not be used.
null
2020-08-31T18:31:27Z
2019-06-12T16:37:00Z
MODERATE
null
{'CWE-125'}
{'https://hackerone.com/reports/320269', 'https://nodesecurity.io/advisories/653', 'https://www.npmjs.com/advisories/653'}
null
npm
GHSA-vjvw-wcmw-pr26
Insufficient Entropy in parsel
All versions of `parsel` use an insecure key derivation function. The package runs keys of arbitrary lengths through one round of SHA256 hashing for key stretching. This allows for the use of keys of insufficient entropy with inappropriate key stretching. ## Recommendation The package is deprecated and will not be updated. Consider using an alternative package.
null
2020-08-31T19:00:10Z
2020-09-04T17:37:08Z
CRITICAL
null
{'CWE-331'}
{'https://www.npmjs.com/advisories/1462'}
null
npm
GHSA-rg3q-jxmp-pvjj
Low severity vulnerability that affects materialize-css
In Materialize through 1.0.0, XSS is possible via the Toast feature.
{'CVE-2019-11004'}
2021-09-17T17:47:05Z
2019-04-09T19:44:37Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11004', 'https://github.com/Dogfalo/materialize', 'https://github.com/Dogfalo/materialize/issues/6286', 'https://github.com/advisories/GHSA-rg3q-jxmp-pvjj'}
null
npm
GHSA-qv78-398w-cxp7
Malicious Package in shrugging-logging
All versions of `shrugging-logging` contain malicious code as a postinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking, ## Recommendation Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain.
null
2021-09-30T22:00:05Z
2020-09-11T21:08:19Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/920'}
null
npm
GHSA-87g3-x896-w798
Downloads Resources over HTTP in atom-node-module-installer
Affected versions of `atom-node-module-installer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `atom-node-module-installer`. ## Recommendation No patch is currently available for this vulnerability, and the package has not been updated since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10620'}
2021-01-08T19:11:36Z
2019-02-18T23:56:53Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-87g3-x896-w798', 'https://www.npmjs.com/advisories/216', 'https://nodesecurity.io/advisories/216', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10620'}
null
npm
GHSA-wxj7-97fp-j53j
Exposure of Resource to Wrong Sphere in Zip-Local
The package zip-local before 0.3.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) which can lead to an extraction of a crafted file outside the intended extraction directory.
{'CVE-2021-23484'}
2022-02-07T21:20:28Z
2022-02-01T00:46:01Z
CRITICAL
null
{'CWE-668', 'CWE-29'}
{'https://github.com/Mostafa-Samir/zip-local', 'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085', 'https://github.com/Mostafa-Samir/zip-local/blob/master/main.js%23L365', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23484', 'https://snyk.io/vuln/SNYK-JS-ZIPLOCAL-2327477'}
null
npm
GHSA-wqr3-24xm-fxhq
Directory Traversal in wffserve
Affected versions of `wffserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16168'}
2021-08-09T22:32:21Z
2020-09-01T17:31:22Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16168', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/city-weather-abe', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wffserve', 'https://www.npmjs.com/advisories/407'}
null
npm
GHSA-j8qr-rvcv-crhv
Malicious Package in electron-native-notify
All versions of `electron-native-notify` contain malicious code. The package was part of a targeted attack to steal cryptocurrency wallet seeds and upload them to a remote server, effectively giving attackers access to users wallets. ## Recommendation Remove the package from your environment and [follow the recommendations by Komodo](https://komodoplatform.com/vulnerability-discovered-in-komodos-agama-wallet-this-is-what-you-need-to-do/)
null
2020-08-31T18:40:50Z
2020-09-11T21:18:05Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/927', 'https://komodoplatform.com/vulnerability-discovered-in-komodos-agama-wallet-this-is-what-you-need-to-do/', 'https://blog.npmjs.org/post/185397814280/plot-to-steal-cryptocurrency-foiled-by-the-npm'}
null
npm
GHSA-4jfq-q299-g4cr
Malicious Package in reqquest
All versions of `reqquest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:06:36Z
2020-09-02T20:28:57Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/860'}
null
npm
GHSA-cxwc-8pqp-2whw
Directory Traversal in qinserve
Affected versions of `qinserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16197'}
2020-08-31T18:22:59Z
2020-09-01T18:20:40Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/434', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/qinserve', 'https://www.npmjs.com/advisories/434', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16197'}
null
npm
GHSA-rvj9-8cvx-3vq9
Invalid Curve Attack in node-jose
Affected versions of `node-jose` are vulnerable to an invalid curve attack. This allows an attacker to recover the private secret key when JWE with Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES) is used. [Proof of Concept](https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae) ## Recommendation Update to version 0.9.3 or later.
{'CVE-2017-16007'}
2020-08-31T18:19:18Z
2018-07-20T21:10:14Z
HIGH
null
{'CWE-200'}
{'https://nodesecurity.io/advisories/324', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16007', 'http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html', 'https://github.com/cisco/node-jose', 'https://www.npmjs.com/advisories/324', 'https://github.com/advisories/GHSA-rvj9-8cvx-3vq9', 'https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae'}
null
npm
GHSA-3hjg-vc7r-rcrw
Denial of Service vulnerability in @podium/layout and @podium/proxy
### Impact An attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. ### Patches `@podium/layout` which is the main way developers/users are vulnerable to this exploit, has been patched in version `4.6.110`. All earlier versions are vulnerable. `@podium/proxy` which is the source of the vulnerability and is used by `@podium/layout` has been patched in version `4.2.74`. All earlier versions are vulnerable. ### Workarounds It is not easily possible to work around this issue without upgrading. We recommend upgrading `@podium/layout` and/or `@podium/proxy` as soon as possible. ### For more information If you have any questions or comments about this advisory: * Open an issue in [podium-lib/issues](https://github.com/podium-lib/issues) ### Credits The vulnerability was reported by [krynos](https://hackerone.com/krynos) from [Ercoli Consulting](https://www.ercoliconsulting.eu/) via FINN.no's private bug bounty program
{'CVE-2022-24822'}
2022-04-07T15:20:23Z
2022-04-07T15:20:23Z
HIGH
null
{'CWE-248'}
{'https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw', 'https://github.com/podium-lib/proxy/releases/tag/v4.2.74', 'https://github.com/podium-lib/layout/releases/tag/v4.6.110', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24822', 'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf', 'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039'}
null
npm
GHSA-6cpc-mj5c-m9rq
Arbitrary File Write in cli
Affected versions of `cli` use predictable temporary file names. If an attacker can create a symbolic link at the location of one of these temporarly file names, the attacker can arbitrarily write to any file that the user which owns the `cli` process has permission to write to. ## Proof of Concept By creating Symbolic Links at the following locations, the target of the link can be written to. ``` lock_file = '/tmp/' + cli.app + '.pid', log_file = '/tmp/' + cli.app + '.log'; ``` ## Recommendation Update to version 1.0.0 or later.
{'CVE-2016-10538'}
2020-08-31T18:10:40Z
2019-02-18T23:40:03Z
LOW
null
{'CWE-22'}
{'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809252', 'https://www.npmjs.com/advisories/95', 'https://github.com/advisories/GHSA-6cpc-mj5c-m9rq', 'https://github.com/node-js-libs/cli/issues/81', 'https://nodesecurity.io/advisories/95', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10538'}
null
npm
GHSA-crpm-fm48-chj7
SQL Injection in resquel
All versions of `resquel` are vulnerable to SQL Injection. Query parameters are not properly sanitized, allowing attackers to inject SQL statements and execute arbitrary SQL queries ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:42:11Z
2020-09-11T21:13:44Z
HIGH
null
{'CWE-89'}
{'https://www.npmjs.com/advisories/963'}
null
npm
GHSA-fwvq-x4j9-hr5f
Malicious Package in bs58chekc
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:50:01Z
2020-09-03T19:43:09Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1377'}
null
npm
GHSA-x67x-98x7-wv26
OS Command Injection in gulp-tape
gulp-tape through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands as part of &#39;gulp-tape&#39; options.
{'CVE-2020-7605'}
2021-07-28T21:17:56Z
2021-05-07T16:14:56Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7605', 'https://snyk.io/vuln/SNYK-JS-GULPTAPE-560124'}
null
npm
GHSA-934w-hvj4-7fr6
Path Traversal in jsreport-chrome-pdf
This affects the package jsreport-chrome-pdf before 1.10.0.
{'CVE-2020-7762'}
2021-08-02T15:38:02Z
2021-04-13T15:25:15Z
MODERATE
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310', 'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7762'}
null
npm
GHSA-vxfp-qmpq-6826
Malicious Package in hpmm
All versions of `hpmm` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:46:35Z
2020-09-03T17:38:09Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1053'}
null
npm
GHSA-m489-xr35-fjxr
Regular Expression Denial of Service in millisecond
Versions of `millisecond` prior to 0.1.2 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. ## Proof of concept ``` var ms = require('millisecond'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } ms(genstr(process.argv[2], "5") + " minutea"); ``` ## Recommendation Update to version 0.1.2 or later.
null
2021-09-22T20:34:42Z
2021-09-22T20:35:08Z
MODERATE
null
{'CWE-400', 'CWE-1333'}
{'https://www.npmjs.com/advisories/59', 'https://github.com/unshiftio/millisecond/pull/4'}
null
npm
GHSA-4vvg-x86p-mvqc
Leaking of user information on Cross-Domain communication in sysend
### Impact Users that use Cross-Origin communication and send sensitive information make it possible for this data to be intercepted. This is not a big impact because it happens only on the same browser. ### Patches It has been patched in version 1.10.0 ### Workarounds The only workaround is to not send sensitive information with sysend messages.
{'CVE-2022-24762'}
2022-03-28T17:26:41Z
2022-03-14T22:43:23Z
MODERATE
null
{'CWE-200'}
{'https://github.com/jcubic/sysend.js/', 'https://github.com/jcubic/sysend.js/releases/tag/1.10.0', 'https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24762', 'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a', 'https://github.com/jcubic/sysend.js/issues/33'}
null
npm
GHSA-3f95-w5h5-fq86
Prototype Pollution in mergify
All versions of `mergify` are vulnerable to Prototype Pollution. The `mergify()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative module as the package is deprecated.
null
2020-08-31T18:43:27Z
2020-09-11T21:22:24Z
MODERATE
null
{'CWE-1321'}
{'https://hackerone.com/reports/439098', 'https://www.npmjs.com/advisories/995'}
null
npm
GHSA-926x-m6m5-3mmp
OS Command Injection
push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable &quot;opt.branch&quot; is not validated before being provided to the &quot;git&quot; command within &quot;index.js#L139&quot;. This could be abused by an attacker to inject arbitrary commands.
{'CVE-2019-10803'}
2021-04-09T21:01:28Z
2022-02-09T22:50:06Z
HIGH
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-PUSHDIR-559009', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10803', 'https://github.com/L33T-KR3W/push-dir/blob/master/index.js#L139'}
null
npm
GHSA-c497-v8pv-ch6x
Prototype pollution in nested-object-assign
The package nested-object-assign before 1.0.4 is vulnerable to Prototype Pollution via the default function.
{'CVE-2021-23329'}
2021-02-01T06:29:54Z
2021-02-01T15:01:14Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23329', 'https://www.npmjs.com/package/nested-object-assign', 'https://snyk.io/vuln/SNYK-JS-NESTEDOBJECTASSIGN-1065977', 'https://github.com/Geta/NestedObjectAssign/pull/11'}
null
npm
GHSA-5g4r-87v2-jqvx
Downloads Resources over HTTP in apk-parser
apk-parser is a tool to extract Android Manifest info from an APK file. apk-parser versions below 0.1.6 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. ## Recommendation Update to version 0.1.6 or later.
{'CVE-2016-10564'}
2020-08-31T18:14:17Z
2020-09-01T16:05:44Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/195', 'https://nodesecurity.io/advisories/195', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10564'}
null
npm
GHSA-vp8g-53fw-r9f2
Malicious Package in dynamo-schema
Version 0.0.3 of `dynamo-schema` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.0.3 of this module is found installed you will want to replace it with a version before or after 0.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T17:28:16Z
2020-09-01T19:54:44Z
CRITICAL
null
{'CWE-506'}
{'https://snyk.io/vuln/SNYK-JS-DYNAMOSCHEMA-450992', 'https://github.com/andrewjstone/dynamo-schema', 'https://www.npmjs.com/advisories/626'}
null
npm
GHSA-xp4x-j9vh-c3wf
OS Command Injection and Command Injection in kill-port-process
The kill-port-process package version &lt; 2.2.0 is vulnerable to a Command Injection vulnerability.
{'CVE-2019-15609'}
2021-04-19T16:43:07Z
2022-02-10T20:20:31Z
HIGH
null
{'CWE-77', 'CWE-78'}
{'https://hackerone.com/reports/661959', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15609'}
null
npm
GHSA-9gj3-hwp5-pmwc
XSS in the `altField` option of the Datepicker widget in jquery-ui
### Impact Accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way: ```js $( "#datepicker" ).datepicker( { altField: "<img onerror='doEvilThing()' src='/404' />", } ); ``` will call the `doEvilThing` function. ### Patches The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. ### Workarounds A workaround is to not accept the value of the `altField` option from untrusted sources. ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
{'CVE-2021-41182'}
2021-10-27T17:00:10Z
2021-10-26T14:55:02Z
MODERATE
null
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/', 'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/', 'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://www.drupal.org/sa-contrib-2022-004', 'https://www.tenable.com/security/tns-2022-09', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/jquery/jquery-ui', 'https://www.drupal.org/sa-core-2022-002', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41182', 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}
null
npm
GHSA-r2qc-w64x-6j54
XSS in Vega
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. Vega in an npm package. In Vega before version 5.17.3 there is an XSS vulnerability in Vega expressions. Through a specially crafted Vega expression, an attacker could execute arbitrary javascript on a victim's machine. This is fixed in version 5.17.3
{'CVE-2020-26296'}
2021-01-07T22:32:50Z
2020-12-30T23:09:21Z
LOW
null
{'CWE-79'}
{'https://github.com/vega/vega/issues/3018', 'https://github.com/vega/vega/security/advisories/GHSA-r2qc-w64x-6j54', 'https://www.npmjs.com/package/vega', 'https://github.com/vega/vega/pull/3019', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26296', 'https://github.com/vega/vega/releases/tag/v5.17.3'}
null
npm
GHSA-9qj9-36jm-prpv
Regular Expression Denial of Service in fresh
Affected versions of `fresh` are vulnerable to regular expression denial of service when parsing specially crafted user input. ## Recommendation Update to version 0.5.2 or later.
{'CVE-2017-16119'}
2020-08-31T18:26:27Z
2018-07-24T20:16:57Z
HIGH
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/526', 'https://github.com/advisories/GHSA-9qj9-36jm-prpv', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16119', 'https://nodesecurity.io/advisories/526'}
null
npm
GHSA-cc2p-4jhr-xhhx
False-positive validity for NFT1 genesis transactions in SLPJS
### Impact In the npm package named "slpjs", versions prior to 0.27.4 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification. ### Patches npm package "slpjs" has been patched and is published and tagged as version 0.27.4. ### Workarounds Upgrade to slpjs 0.27.4. ### References * Package location: https://www.npmjs.com/package/slpjs * SLP NFT1 spec: https://slp.dev/specs/slp-nft-1/#nft1-protocol-requirements * Git commit hash fixing this issue: https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c * Unit tests have been added to assist validator implementations in avoiding this bug: https://github.com/simpleledger/slp-unit-test-data/commit/8c942eacfae12686dcf1f3366321445a4fba73e7 ### For more information If you have any questions or comments about this advisory please open an issue in the [slp-validate](https://github.com/simpleledger/slpjs/issues) repository.
{'CVE-2020-15130'}
2021-01-07T23:43:05Z
2020-07-30T14:58:42Z
CRITICAL
null
{'CWE-697'}
{'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c', 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-cc2p-4jhr-xhhx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15130'}
null
npm
GHSA-7r2x-3qcm-8vfw
Downloads Resources over HTTP in herbivore
Affected versions of `herbivore` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `herbivore`. ## Recommendation The module author has rewritten much of the package, and in that process, patched the vulnerability, but has not published any of the new code to npm. In order to get an updated version, it is necessary to install the package from github. This can be done using the following command: ``` npm i samatt/herbivore ```
{'CVE-2016-10665'}
2021-01-08T19:14:20Z
2019-02-18T23:44:36Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/258', 'https://github.com/samatt/herbivore', 'https://github.com/advisories/GHSA-7r2x-3qcm-8vfw', 'https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3', 'https://nodesecurity.io/advisories/258', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10665'}
null
npm
GHSA-cph5-m8f7-6c5x
Incorrect Comparison in axios
axios is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3749'}
2021-09-09T13:39:38Z
2021-09-01T18:23:02Z
HIGH
null
{'CWE-400', 'CWE-697'}
{'https://www.npmjs.com/package/axios', 'https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E', 'https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31', 'https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929', 'https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E', 'https://github.com/axios/axios', 'https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3749', 'https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E'}
null
npm
GHSA-q9wr-gcjc-hq52
Prototype Pollution in reggae
All versions of `reggae` are vulnerable to prototype pollution. The function `set` does not restrict the modification of an Object's prototype, which may allow a malicious to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:55:23Z
2020-09-04T15:12:13Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1331'}
null
npm
GHSA-fx7m-j728-mjw3
Moderate severity vulnerability that affects uap-core
An issue was discovered in regex.yaml (aka regexes.yaml) in UA-Parser UAP-Core before 0.6.0. A Regular Expression Denial of Service (ReDoS) issue allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to a value containing a long digit string. (The UAP-Core project contains the vulnerability, propagating to all implementations.)
{'CVE-2018-20164'}
2021-09-10T20:12:01Z
2019-03-06T17:35:47Z
MODERATE
null
{'CWE-185'}
{'https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014', 'https://github.com/ua-parser/uap-core', 'https://www.x41-dsec.de/lab/advisories/x41-2018-009-uaparser/', 'https://github.com/ua-parser/uap-core/issues/332', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20164', 'https://github.com/ua-parser/uap-core/commit/156f7e12b215bddbaf3df4514c399d683e6cdadc', 'https://github.com/advisories/GHSA-fx7m-j728-mjw3'}
null
npm
GHSA-jqjg-v355-hr9q
Malicious Package in buffer-xop
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:12:22Z
2020-09-03T22:11:02Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1250'}
null
npm
GHSA-cv3v-7846-6pxm
Unauthorized File Access in node-git-server
Versions of `node-git-server` prior to 0.6.1 are vulnerable to Unauthorized File Access. It is possible to access any git repository by using absolute paths, which may allow attackers to access private repositories. ## Recommendation Upgrade to version 0.6.1 or later.
null
2021-09-29T19:59:01Z
2020-09-03T21:15:19Z
HIGH
null
{'CWE-552'}
{'https://snyk.io/vuln/SNYK-JS-NODEGITSERVER-474343', 'https://github.com/gabrielcsapo/node-git-server', 'https://www.npmjs.com/advisories/1214', 'https://github.com/gabrielcsapo/node-git-server/commit/ac26650f69bc445d71e4f2c55328676d10a4be43', 'https://github.com/gabrielcsapo/node-git-server/pull/62'}
null
npm
GHSA-q324-q795-2q5p
Path traversal when using `preview-docs` when working dir contains files with question mark `?` in name
### Impact `preview-docs` command allows path traversal if current working dir contains files with question mark `?` in name and attacker knows the name. ### Patches It was patched starting from 1.0.0-beta.59 ### Workarounds Do not run openapi-cli preview-docs command in the folder which contains files with question mark `?` in name. ### References https://github.com/Redocly/openapi-cli/pull/347 ### For more information If you have any questions or comments about this advisory: * Open an issue in [@redocly/openapi-cli](https://github.com/Redocly/openapi-cli) * Email us at [security@redocly.com](mailto:security@redocly.com)
null
2021-10-11T18:40:44Z
2021-10-12T16:05:11Z
LOW
null
null
{'https://github.com/Redocly/openapi-cli/security/advisories/GHSA-q324-q795-2q5p', 'https://github.com/Redocly/openapi-cli/pull/347', 'https://github.com/Redocly/openapi-cli'}
null
npm
GHSA-j636-crp3-m584
Cross-site Scripting in tableexport.jquery.plugin
There is a cross-site scripting vulnerability with default `onCellHtmlData` function in GitHub repository hhurz/tableexport.jquery.plugin prior to 1.25.0. This can result in transmitting cookies to third-party servers and/or sending data from secure sessions to third-party servers.
{'CVE-2022-1291'}
2022-04-22T20:17:22Z
2022-04-11T00:00:22Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1291', 'https://github.com/hhurz/tableexport.jquery.plugin', 'https://github.com/hhurz/tableexport.jquery.plugin/commit/dcbaee23cf98328397a153e71556f75202988ec9', 'https://huntr.dev/bounties/49a14371-6058-47dd-9801-ec38a7459fc5'}
null
npm
GHSA-j3wh-5m26-2pf7
Downloads Resources over HTTP in mystem-fix
Affected versions of `mystem-fix` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem-fix`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10698'}
2021-01-08T18:36:58Z
2018-07-27T14:34:11Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/301', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10698', 'https://github.com/advisories/GHSA-j3wh-5m26-2pf7', 'https://nodesecurity.io/advisories/301'}
null
npm
GHSA-h4hr-7fg3-h35w
Denial of service in prismjs
The package prismjs before 1.23.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the prism-asciidoc, prism-rest, prism-tap and prism-eiffel components.
{'CVE-2021-23341'}
2021-02-24T07:34:23Z
2021-03-01T19:52:33Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-PRISMJS-1076581', 'https://www.npmjs.com/package/prismjs', 'https://github.com/PrismJS/prism/issues/2583', 'https://github.com/PrismJS/prism/pull/2584', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1076583', 'https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23341', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076582'}
null
npm
GHSA-p3hc-fv2j-rp68
Prototype Pollution in swiper
Versions of the package swiper before 6.5.1 are susceptible to prototype pollution.
{'CVE-2021-23370'}
2021-05-07T17:34:38Z
2021-05-10T15:36:30Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/nolimits4web/swiper/blob/master/CHANGELOG.md#651-2021-03-29', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23370', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696', 'https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad', 'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697', 'https://snyk.io/vuln/SNYK-JS-SWIPER-1088062', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698'}
null
npm
GHSA-r5fx-8r73-v86c
Cross-Site Scripting in angular
Versions of `angular` prior to 1.5.0-beta.1 are vulnerable to Cross-Site Scripting. The package fails to sanitize `xlink:href` attributes, which may allow attackers to execute arbitrary JavaScript in a victim's browser if the value is user-controlled. ## Recommendation Upgrade to version 1.5.0-beta.1 or later.
{'CVE-2019-14863'}
2021-08-19T17:14:00Z
2020-02-14T23:08:49Z
MODERATE
null
{'CWE-79'}
{'https://github.com/angular/angular.js/pull/12524', 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a', 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82', 'https://snyk.io/vuln/npm:angular:20150807', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14863', 'https://www.npmjs.com/advisories/1453', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14863'}
null
npm
GHSA-468q-v4jj-485h
Inefficient Regular Expression Complexity in taro
taro is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3804'}
2021-09-20T20:00:02Z
2021-09-20T20:09:59Z
HIGH
null
{'CWE-1333'}
{'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5', 'https://github.com/nervjs/taro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3804', 'https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414'}
null
npm
GHSA-rjmf-p882-645m
Improper Certificate Validation
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering client-side field level encryption (CSFLE) ineffective. This issue was discovered during internal testing and affects mongodb-client-encryption module version 1.2.0, which was available from 2021-Jan-29 and deprecated in the NPM Registry on 2021-Feb-04. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services from applications residing inside the AWS, GCP, and Azure nework fabrics due to compensating controls in these environments. This issue does not impact driver workloads that don’t use Field Level Encryption.
{'CVE-2021-20327'}
2021-04-12T18:51:10Z
2021-04-12T18:51:17Z
MODERATE
null
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20327', 'https://jira.mongodb.org/browse/NODE-3125', 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b', 'https://www.npmjs.com/advisories/1660'}
null
npm
GHSA-4cj8-g9cp-v5wr
High severity vulnerability that affects blueimp-file-upload
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
{'CVE-2018-9206'}
2021-09-01T14:43:45Z
2018-10-22T18:53:56Z
CRITICAL
null
{'CWE-434'}
{'http://www.securityfocus.com/bid/105679', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.exploit-db.com/exploits/46182/', 'https://wpvulndb.com/vulnerabilities/9136', 'http://www.securityfocus.com/bid/106629', 'https://nvd.nist.gov/vuln/detail/CVE-2018-9206', 'http://www.vapidlabs.com/advisory.php?v=204', 'https://www.exploit-db.com/exploits/45790/', 'https://github.com/advisories/GHSA-4cj8-g9cp-v5wr'}
null
npm
GHSA-m7xv-7p93-g6q8
Malicious Package in libubx
Version 1.0.3 of `libubx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:13Z
2020-09-03T00:35:35Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/938'}
null