ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-hc9w-4p87-j549
|
Prototype Pollution in cached-path-relative
|
Version of `cached-path-relative` before 1.0.2 are vulnerable to prototype pollution.
## Recommendation
Update to version 1.0.2 or later.
|
{'CVE-2018-16472'}
|
2020-08-31T18:34:03Z
|
2018-11-07T20:46:25Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-hc9w-4p87-j549', 'https://hackerone.com/reports/390847', 'https://www.npmjs.com/advisories/739', 'https://github.com/ashaffer/cached-path-relative/issues/3', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/480.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16472'}
| null |
npm
|
GHSA-h33p-5j96-w8qh
|
OS Command Injection in gulkp-styledocco
|
gulp-styledocco through 0.0.3 allows execution of arbitrary commands. The argument 'options' of the exports function in 'index.js' can be controlled by users without any sanitization.
|
{'CVE-2020-7607'}
|
2021-07-28T21:22:24Z
|
2021-05-07T16:14:48Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7607', 'https://snyk.io/vuln/SNYK-JS-GULPSTYLEDOCCO-560126'}
| null |
npm
|
GHSA-rw53-q8x7-ccx8
|
Malicious Package in buffer-xkr
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:04:00Z
|
2020-09-03T21:55:17Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1245'}
| null |
npm
|
GHSA-mh6f-8j2x-4483
|
Critical severity vulnerability that affects event-stream and flatmap-stream
|
The NPM package `flatmap-stream` is considered malicious. A malicious actor added this package as a dependency to the NPM `event-stream` package in version `3.3.6`. Users of `event-stream` are encouraged to downgrade to the last non-malicious version, `3.3.4`, or upgrade to the latest 4.x version.
Users of `flatmap-stream` are encouraged to remove the dependency entirely.
| null |
2021-09-15T20:08:26Z
|
2018-11-26T23:58:21Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-mh6f-8j2x-4483', 'https://github.com/dominictarr/event-stream', 'https://github.com/dominictarr/event-stream/issues/116'}
| null |
npm
|
GHSA-j8r2-2x94-2q67
|
Cross-Site Scripting in diagram-js-direct-editing
|
Versions of `diagram-js-direct-editing` prior to 1.4.3 are vulnerable to Cross-Site Scripting. The package fails to sanitize input from the clipboard, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 1.4.3 or later.
| null |
2021-09-28T16:59:50Z
|
2020-09-11T21:19:09Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/983', 'https://github.com/bpmn-io/diagram-js-direct-editing'}
| null |
npm
|
GHSA-8m5v-f2wp-wqr9
|
Malicious Package in ali-contributors
|
All versions of `ali-contributors` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T17:50:11Z
|
2020-09-03T17:30:36Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1046'}
| null |
npm
|
GHSA-qcff-ffx3-m25c
|
Command Injection in meta-git
|
All versions of `meta-git` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `clone` command is vulnerable through the branch name.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:59:58Z
|
2020-09-04T17:31:44Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1457', 'https://hackerone.com/reports/728040'}
| null |
npm
|
GHSA-6gg3-pmm7-97xc
|
DOM-based XSS in auth0-lock
|
### Overview
Versions before and including `11.25.1` are using `dangerouslySetInnerHTML` to display an informational message when used with a Passwordless or Enterprise connection.
- For Passwordless connection, the value of the input (email or phone number) is displayed back to the user while waiting for verification code input.
- For Enterprise connection, the value of the input (IdP Domain) from the Enterprise connection setup screen (Auth0 Dashboard) is displayed back to the user when the `lock` widget opens.
When Passwordless or Enterprise connection is used, the application and its users might be exposed to cross-site scripting (XSS) attacks.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using auth0-lock
- You are using Passwordless or Enterprise connection mode
### How to fix that?
Upgrade to version `11.26.3`
### Will this update impact my users?
The fix provided in patch will not affect your users.
### Credit
https://github.com/mvisat
|
{'CVE-2020-15119'}
|
2021-01-07T23:40:43Z
|
2020-08-19T21:05:03Z
|
LOW
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15119', 'https://github.com/auth0/lock/security/advisories/GHSA-6gg3-pmm7-97xc', 'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b'}
| null |
npm
|
GHSA-w9hw-v97w-g5f5
|
Malicious Package in bitconi-ops
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:43:23Z
|
2020-09-04T16:43:14Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1368'}
| null |
npm
|
GHSA-4g53-vp7q-gfjv
|
constructEvent does not verify header
|
### Impact
Anyone verifying a Stripe webhook request via this library's `constructEvent` function.
### Patches
Upgrade to 1.1.4.
### Workarounds
Use `await verifyHeader(...)` directly instead of `constructEvent`.
### References
https://github.com/worker-tools/stripe-webhook/issues/1
| null |
2021-05-27T22:24:49Z
|
2021-05-28T19:18:28Z
|
HIGH
| null | null |
{'https://github.com/worker-tools/stripe-webhook/security/advisories/GHSA-4g53-vp7q-gfjv'}
| null |
npm
|
GHSA-j377-2x76-558h
|
Improper Input Validation in is-email
|
is-email helps validate an email address. A ReDoS (regular expression denial of service) flaw was found in the Segment is-email package before 1.0.1 for Node.js. An attacker that is able to provide crafted input to the isEmail(input) function may cause an application to consume an excessive amount of CPU.
|
{'CVE-2021-36716'}
|
2022-05-04T03:12:57Z
|
2021-12-10T17:25:21Z
|
HIGH
| null |
{'CWE-400', 'CWE-20'}
|
{'https://github.com/segmentio/is-email/releases', 'https://github.com/segmentio/is-email', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36716', 'https://segment.com/docs/release_notes/2021-07-13-cve-2021-36716/'}
| null |
npm
|
GHSA-x7q3-67vc-wvcf
|
Downloads Resources over HTTP in grunt-images
|
Affected versions of `grunt-images` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-images`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10645'}
|
2021-09-16T20:53:24Z
|
2018-08-15T19:05:14Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10645', 'https://github.com/advisories/GHSA-x7q3-67vc-wvcf', 'https://github.com/gcpantazis/grunt-images', 'https://nodesecurity.io/advisories/255', 'https://www.npmjs.com/advisories/255'}
| null |
npm
|
GHSA-v9p9-535w-4285
|
Prototype Pollution in litespeed.js and appwrite/server-ce
|
This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability.
|
{'CVE-2021-23682'}
|
2022-02-25T15:40:33Z
|
2022-02-17T00:00:32Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23682', 'https://github.com/appwrite/appwrite/releases/tag/0.12.2', 'https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820', 'https://github.com/litespeed-js/litespeed.js/pull/18', 'https://github.com/appwrite/appwrite/pull/2778', 'https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250', 'https://github.com/appwrite/appwrite/releases/tag/0.11.1'}
| null |
npm
|
GHSA-9rwj-8mh9-4876
|
Malicious Package in carloprojectdiscord
|
All versions of `carloprojectdiscord` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
| null |
2021-09-30T21:23:53Z
|
2020-09-02T21:19:37Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/874'}
| null |
npm
|
GHSA-9qrg-h9g8-c65q
|
Prototype Pollution in deep-setter
|
All versions of `deep-setter` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:55:28Z
|
2020-09-04T15:14:26Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1333'}
| null |
npm
|
GHSA-23xp-j737-282v
|
Path Traversal in takeapeek
|
All versions of `takeapeek` are vulnerable to path traversal exposing files and directories.
## Recommendation
As no fix is currently available for this vulnerability is it is our recommendation to use another static file server.
|
{'CVE-2018-16473'}
|
2020-08-31T18:34:06Z
|
2018-11-06T23:12:30Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-23xp-j737-282v', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/478.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16473', 'https://hackerone.com/reports/403736', 'https://www.npmjs.com/advisories/740'}
| null |
npm
|
GHSA-f72h-wf57-7xwh
|
Malicious Package in buffer-xo2
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:04:48Z
|
2020-09-03T21:58:34Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1248'}
| null |
npm
|
GHSA-fg5w-w99f-rj6w
|
Command Injection in @ronomon/opened
|
The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input.
|
{'CVE-2021-29300'}
|
2021-05-28T16:56:53Z
|
2021-06-08T23:15:35Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29300', 'https://advisory.checkmarx.net/advisory/CX-2021-4775'}
| null |
npm
|
GHSA-qr4m-jcvc-3382
|
Prototype Pollution in dot-notes
|
All versions of package dot-notes up to and including version 3.2.0 are vulnerable to Prototype Pollution via the create function.
|
{'CVE-2020-7717'}
|
2021-05-05T18:52:45Z
|
2021-05-06T18:12:00Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7717', 'https://snyk.io/vuln/SNYK-JS-DOTNOTES-598668'}
| null |
npm
|
GHSA-chwr-hf3w-c984
|
Regular Expression Denial of Service in dat.gui
|
All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values.
|
{'CVE-2020-7755'}
|
2021-04-21T17:36:43Z
|
2021-05-10T18:44:38Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-DATGUI-1016275', 'https://www.npmjs.com/package/dat.gui', 'https://github.com/dataarts/dat.gui/issues/278', 'https://github.com/dataarts/dat.gui/pull/279', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7755'}
| null |
npm
|
GHSA-wrvr-8mpx-r7pp
|
Regular Expression Denial of Service in mime
|
Affected versions of `mime` are vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
## Recommendation
Update to version 2.0.3 or later.
|
{'CVE-2017-16138'}
|
2020-08-31T18:26:49Z
|
2018-07-20T16:20:52Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-wrvr-8mpx-r7pp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16138', 'https://github.com/broofa/node-mime/issues/167', 'https://www.npmjs.com/advisories/535', 'https://nodesecurity.io/advisories/535'}
| null |
npm
|
GHSA-7p6w-x2gr-rrf8
|
Cross-Site Scripting in ag-grid-community
|
Versions of `ag-grid-community` prior to 14.0.0 are vulnerable to Cross-Site Scripting (XSS). Grid contents are not properly sanitized and may allow attackers to execute arbitrary JavaScript if user input is rendered in the grid.
## Recommendation
Upgrade to version 14.0.0 or later
| null |
2021-09-27T21:42:28Z
|
2020-09-02T21:28:05Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/ag-grid/ag-grid/issues/1961', 'https://github.com/ag-grid/ag-grid', 'https://www.npmjs.com/advisories/894'}
| null |
npm
|
GHSA-6fc8-4gx4-v693
|
ReDoS in Sec-Websocket-Protocol header
|
### Impact
A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server.
### Proof of concept
```js
for (const length of [1000, 2000, 4000, 8000, 16000, 32000]) {
const value = 'b' + ' '.repeat(length) + 'x';
const start = process.hrtime.bigint();
value.trim().split(/ *, */);
const end = process.hrtime.bigint();
console.log('length = %d, time = %f ns', length, end - start);
}
```
### Patches
The vulnerability was fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff) and backported to ws@6.2.2 (https://github.com/websockets/ws/commit/78c676d2a1acefbc05292e9f7ea0a9457704bf1b) and ws@5.2.3 (https://github.com/websockets/ws/commit/76d47c1479002022a3e4357b3c9f0e23a68d4cd2).
### Workarounds
In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size=size`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options.
### Credits
The vulnerability was responsibly disclosed along with a fix in private by [Robert McLaughlin](https://github.com/robmcl4) from University of California, Santa Barbara.
|
{'CVE-2021-32640'}
|
2021-10-06T22:05:51Z
|
2021-05-28T19:19:03Z
|
MODERATE
| null |
{'CWE-345', 'CWE-400'}
|
{'https://github.com/websockets/ws', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32640', 'https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693', 'https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E', 'https://github.com/websockets/ws/issues/1895', 'https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff'}
| null |
npm
|
GHSA-xq98-5rcf-5wqh
|
Directory Traversal in badjs-sourcemap-server
|
Affected versions of `badjs-sourcemap-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16036'}
|
2020-08-31T18:20:13Z
|
2018-07-24T15:43:02Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/349', 'https://github.com/advisories/GHSA-xq98-5rcf-5wqh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16036', 'https://nodesecurity.io/advisories/349', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/badjs-sourcemap-server'}
| null |
npm
|
GHSA-9x64-5r7x-2q53
|
Malicious Package in flatmap-stream
|
Version 0.1.1 of `flatmap-stream` is considered malicious.
This module runs an encrypted payload targeting a very specific application, `copay` and because they shared the same description it would have likely worked for `copay-dash`.
The injected code:
- Read in AES encrypted data from a file disguised as a test fixture
- Grabbed the npm package description of the module that imported it, using an automatically set environment variable
- Used the package description as a key to decrypt a chunk of data pulled in from the disguised file
The decrypted data was part of a module, which was then compiled in memory and executed.
This module performed the following actions:
- Decrypted another chunk of data from the disguised file
- Concatenated a small, commented prefix from the first decrypted chunk to the end of the second decrypted chunk
- Performed minor decoding tasks to transform the concatenated block of code from invalid JS to valid JS (we believe this was done to evade detection by dynamic analysis tools)
- Wrote this processed block of JS out to a file stored in a dependency that would be packaged by the build scripts:
The chunk of code that was written out was the actual malicious code, intended to be run on devices owned by the end users of Copay.
This code would do the following:
- Detect the current environment: Mobile/Cordova/Electron
- Check the Bitcoin and Bitcoin Cash balances on the victim's copay account
- If the current balance was greater than 100 Bitcoin, or 1000 Bitcoin Cash:
- Harvest the victim's account data in full
- Harvest the victim's copay private keys
- Send the victim's account data/private keys off to a collection
## Recommendation
If you find this module in your environment it's best to remove it. The malicious version of event-stream and flatmap-stream have been removed from the npm Registry.
| null |
2021-10-01T13:30:04Z
|
2020-09-01T21:21:32Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/737', 'https://github.com/dominictarr/event-stream/issues/116'}
| null |
npm
|
GHSA-rhvc-x32h-5526
|
No CSRF Validation in droppy
|
Affected versions of `droppy` are vulnerable to cross-site socket forgery. The package does not perform verification for cross-domain websocket requests, and as a result, an attacker can create a web page that opens up a websocket connection on behalf of the user visiting the page. The attacker can then perform any action that the target user could, including adding a new admin account under their control, or deleting others.
## Recommendation
Update to version 3.5.0 or later.
|
{'CVE-2016-10529'}
|
2020-08-31T18:10:30Z
|
2019-02-18T23:39:32Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10529', 'https://github.com/advisories/GHSA-rhvc-x32h-5526', 'https://www.npmjs.com/advisories/91', 'https://nodesecurity.io/advisories/91'}
| null |
npm
|
GHSA-m428-jqc4-2p5j
|
Prototype Pollution in phpjs
|
All versions of phpjs up to and including 1.3.2 are vulnerable to Prototype Pollution via parse_str. phpjs is no longer maintained and users are advised to use Locutus as a replacement (https://github.com/locutusjs/locutus)
|
{'CVE-2020-7700'}
|
2021-05-05T21:46:10Z
|
2021-05-06T17:28:46Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7700', 'https://snyk.io/vuln/SNYK-JS-PHPJS-598681'}
| null |
npm
|
GHSA-46fh-8fc5-xcwx
|
Prototype Pollution in lodash.defaultsdeep
|
Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to Prototype Pollution. The function 'defaultsDeep' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later.
| null |
2020-08-31T18:46:13Z
|
2020-09-03T18:09:16Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1070'}
| null |
npm
|
GHSA-q643-w9jp-q2qg
|
Hardcoded Initialization Vector in parsel
|
All versions of `parsel` have a default hardcoded initialization vector. In cases where the IV is not provided, the package defaults to a hardcoded IV which renders the cipher vulnerable to chosen plaintext attacks.
## Recommendation
The package is deprecated and will not be updated. Consider using an alternative package.
| null |
2020-08-31T19:00:05Z
|
2020-09-04T17:34:59Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1460'}
| null |
npm
|
GHSA-c2vr-2c89-ph88
|
Downloads Resources over HTTP in node-bsdiff-android
|
Affected versions of `node-bsdiff-android` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10641'}
|
2021-09-16T20:54:14Z
|
2018-09-18T13:49:54Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://nodesecurity.io/advisories/234', 'https://github.com/advisories/GHSA-c2vr-2c89-ph88', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10641', 'https://www.npmjs.com/advisories/234', 'https://github.com/arthur-zhang/node-bsdiff-android'}
| null |
npm
|
GHSA-qfcv-5whw-7pcw
|
Exposure of Sensitive Information to an Unauthorized Actor in AEgir
|
### Impact
`aegir publish` and `aegir build` may leak secrets from environmental variables in the browser bundle published to npm.
### Patches
The code has been patched, users should upgrade to >= 21.10.1
### Workarounds
Run `printenv` to check your environment variables and revoke any secrets.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [aegir](https://github.com/ipfs/aegir)
|
{'CVE-2020-11059'}
|
2021-10-08T19:56:28Z
|
2020-05-27T21:09:15Z
|
CRITICAL
| null |
{'CWE-200'}
|
{'https://github.com/ipfs/aegir', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11059', 'https://github.com/ipfs/aegir/security/advisories/GHSA-qfcv-5whw-7pcw'}
| null |
npm
|
GHSA-72fv-qgj6-2w2p
|
Cross-site Scripting in NodeBB
|
Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS.
|
{'CVE-2015-9286'}
|
2021-08-03T21:27:01Z
|
2019-05-01T18:37:08Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/NodeBB/NodeBB/compare/56b79a9...4de7529', 'https://github.com/NodeBB/NodeBB/pull/3371', 'https://www.vulnerability-lab.com/get_content.php?id=1608', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9286', 'https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625'}
| null |
npm
|
GHSA-9cph-cqqh-36pw
|
Malicious Package in babel-loqder
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:17:59Z
|
2020-09-04T15:29:25Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1350'}
| null |
npm
|
GHSA-rch7-f4h5-x9rj
|
Identity Spoofing in libp2p-secio
|
Affected versions of `libp2p-secio` does not correctly verify that the `PeerId` of `DstPeer` matches the `PeerId` discovered in the crypto handshake, resulting in a high severity identity spoofing vulnerability.
## Recommendation
Update to version 0.9.0 or later.
| null |
2021-08-17T21:32:42Z
|
2019-08-23T00:04:52Z
|
CRITICAL
| null |
{'CWE-290'}
|
{'https://www.npmjs.com/advisories/558', 'https://nodesecurity.io/advisories/558', 'https://github.com/libp2p/js-libp2p-secio/pull/95', 'https://snyk.io/vuln/npm:libp2p-secio:20180115'}
| null |
npm
|
GHSA-mm62-wxc8-cf7m
|
Code Execution Through IIFE in serialize-to-js
|
Affected versions of `serialize-to-js` may be vulnerable to arbitrary code execution through an Immediately Invoked Function Expression (IIFE).
## Proof of Concept
```
var payload = "{e: (function(){ eval('console.log(`exploited`)') })() }"
var serialize = require('serialize-to-js');
serialize.deserialize(payload);
```
## Recommendation
Update to version 1.0.0, or later, and review [this disclaimer](https://www.npmjs.com/package/serialize-to-js#deserialize) from the author.
|
{'CVE-2017-5954'}
|
2021-09-15T20:28:22Z
|
2018-07-18T18:27:41Z
|
CRITICAL
| null |
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-5954', 'https://www.npmjs.com/advisories/313', 'https://github.com/commenthol/serialize-to-js/issues/1', 'http://www.securityfocus.com/bid/96223', 'https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/', 'https://github.com/commenthol/serialize-to-js', 'https://github.com/advisories/GHSA-mm62-wxc8-cf7m', 'https://www.npmjs.com/package/serialize-to-js#deserialize'}
| null |
npm
|
GHSA-9r27-994c-4xch
|
discord-html not escaping HTML code blocks when lacking a language identifier
|
### Impact
Any website using discord-markdown with user-generated markdown is vulnerable to having code injected into the page where the markdown is displayed.
### Patches
This has been patched in version 2.3.1
### Workarounds
Escape the characters `<>&` before sending plain code blocks to discord-markdown.
### References
https://github.com/brussell98/discord-markdown/issues/13
| null |
2020-02-21T20:20:53Z
|
2020-02-24T17:34:02Z
|
HIGH
| null | null |
{'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7', 'https://github.com/brussell98/discord-markdown/issues/13', 'https://github.com/brussell98/discord-markdown/security/advisories/GHSA-9r27-994c-4xch'}
| null |
npm
|
GHSA-h7pc-85cg-wmch
|
Downloads Resources over HTTP in kindlegen
|
Affected versions of `kindlegen` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `kindlegen`.
## Recommendation
Update to version 1.1.0 or greater.
|
{'CVE-2016-10575'}
|
2021-01-08T18:42:35Z
|
2019-02-18T23:35:10Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10575', 'https://github.com/advisories/GHSA-h7pc-85cg-wmch', 'https://www.npmjs.com/advisories/251', 'https://nodesecurity.io/advisories/251'}
| null |
npm
|
GHSA-w222-53c6-c86p
|
Remote Code Execution in electron
|
Affected versions of `electron` may be susceptible to a remote code execution flaw when certain conditions are met:
1. The electron application is running on Windows.
2. The electron application registers as the default handler for a protocol, such as `nodeapp://`.
This vulnerability is caused by a failure to sanitize additional arguments to chromium in the command line handler for Electron.
MacOS and Linux are not vulnerable.
## Recommendation
Update electron to a version that is not vulnerable. If updating is not possible, the electron team has provided the following guidance:
If for some reason you are unable to upgrade your Electron version, you can append `--` as the last argument when calling `app.setAsDefaultProtocolClient`, which prevents Chromium from parsing further options. The double dash `--` signifies the end of command options, after which only positional parameters are accepted.
```
app.setAsDefaultProtocolClient(protocol, process.execPath, [
'--your-switches-here',
'--'
])
```
|
{'CVE-2018-1000006'}
|
2021-06-10T19:55:43Z
|
2018-01-23T03:57:44Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://electronjs.org/blog/protocol-handler-fix', 'https://github.com/advisories/GHSA-w222-53c6-c86p', 'http://www.securityfocus.com/bid/102796', 'https://www.exploit-db.com/exploits/44357/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000006', 'https://github.com/electron/electron/releases/tag/v1.8.2-beta.4', 'https://www.npmjs.com/advisories/563', 'https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374', 'https://www.exploit-db.com/exploits/43899/'}
| null |
npm
|
GHSA-jp27-cwp2-5qqr
|
Hijacked Environment Variables in jquery.js
|
The `jquery.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16045'}
|
2020-08-31T18:25:22Z
|
2018-07-23T20:54:24Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/496', 'https://github.com/advisories/GHSA-jp27-cwp2-5qqr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16045', 'https://www.npmjs.com/advisories/496'}
| null |
npm
|
GHSA-582f-p4pg-xc74
|
Regular Expression Denial of Service in csv-parse
|
Versions of `csv-parse` prior to 4.4.6 are vulnerable to Regular Expression Denial of Service. The `__isInt()` function contains a malformed regular expression that processes large specially-crafted input very slowly, leading to a Denial of Service. This is triggered when using the `cast` option.
## Recommendation
Upgrade to version 4.4.6 or later.
|
{'CVE-2019-17592'}
|
2022-01-04T19:51:33Z
|
2019-10-15T20:06:16Z
|
HIGH
| null |
{'CWE-400', 'CWE-20'}
|
{'https://www.npmjs.com/advisories/1171', 'https://security.netapp.com/advisory/ntap-20191127-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://github.com/adaltas/node-csv-parse', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17592', 'https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a'}
| null |
npm
|
GHSA-xh8g-j88w-6v59
|
Malicious Package in cionstring
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:57:22Z
|
2020-09-03T19:42:16Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1381'}
| null |
npm
|
GHSA-34r7-q49f-h37c
|
Incorrect Handling of Non-Boolean Comparisons During Minification in uglify-js
|
Versions of `uglify-js` prior to 2.4.24 are affected by a vulnerability which may cause crafted JavaScript to have altered functionality after minification.
## Recommendation
Upgrade UglifyJS to version >= 2.4.24.
|
{'CVE-2015-8857'}
|
2021-10-29T14:15:03Z
|
2017-10-24T18:33:36Z
|
CRITICAL
| null |
{'CWE-1254'}
|
{'https://nodesecurity.io/advisories/39', 'https://github.com/mishoo/UglifyJS2', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8857', 'https://zyan.scripts.mit.edu/blog/backdooring-js/', 'https://github.com/mishoo/UglifyJS2/issues/751', 'https://github.com/advisories/GHSA-34r7-q49f-h37c', 'https://www.npmjs.com/advisories/39', 'http://www.securityfocus.com/bid/96410', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-3cpj-mj3q-82wr
|
Malicious Package in bs58chek
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:49:46Z
|
2020-09-04T16:49:43Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1376'}
| null |
npm
|
GHSA-5635-9mvj-r6hp
|
Malicious Package in vue-backbone
|
Version 0.1.2 of `vue-backbone` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-30T22:08:21Z
|
2020-09-03T02:34:39Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/945'}
| null |
npm
|
GHSA-3wj8-vp9h-rm6m
|
Remote Code Execution (RCE)
|
The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.
|
{'CVE-2021-23344'}
|
2021-03-12T22:42:43Z
|
2021-03-19T21:32:20Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23344', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069'}
| null |
npm
|
GHSA-3fw4-4h3m-892h
|
OS Command Injection in serial-number
|
serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.
|
{'CVE-2019-10804'}
|
2021-04-09T21:39:10Z
|
2021-04-13T15:22:19Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10804', 'https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010', 'https://github.com/es128/serial-number/blob/master/index.js#L106'}
| null |
npm
|
GHSA-mq76-m7gv-xhfm
|
Downloads Resources over HTTP in sauce-connect
|
Affected versions of `sauce-connect` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `sauce-connect`.
## Recommendation
No patch is currently available for this vulnerability, and this package has not been updated since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10599'}
|
2021-01-08T18:26:41Z
|
2019-02-18T23:34:00Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/186', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10599', 'https://nodesecurity.io/advisories/186', 'https://github.com/advisories/GHSA-mq76-m7gv-xhfm'}
| null |
npm
|
GHSA-cr3q-pqgq-m8c2
|
Spoofing attack in swagger-ui
|
Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions.
|
{'CVE-2018-25031'}
|
2022-03-29T19:09:55Z
|
2022-03-12T00:00:36Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/swagger-api/swagger-ui/pull/7697', 'https://security.snyk.io/vuln/SNYK-JS-SWAGGERUI-2314885', 'https://security.netapp.com/advisory/ntap-20220407-0004/', 'https://github.com/swagger-api/swagger-ui', 'https://github.com/swagger-api/swagger-ui/issues/4872', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25031', 'https://github.com/swagger-api/swagger-ui/releases/tag/v4.1.3'}
| null |
npm
|
GHSA-8hrq-9wm7-v3jw
|
Malicious Package in btffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:53:26Z
|
2020-09-03T21:39:41Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1231'}
| null |
npm
|
GHSA-vh5w-fg69-rc8m
|
Improper Input Validation in Google Closure Library
|
A URL parsing issue in goog.uri of the Google Closure Library versions up to and including v20200224 allows an attacker to send malicious URLs to be parsed by the library and return the wrong authority. Mitigation -- update your library to version v20200315.
|
{'CVE-2020-8910'}
|
2021-05-06T20:57:55Z
|
2021-05-07T16:06:34Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8910', 'https://github.com/google/closure-library/releases/tag/v20200315'}
| null |
npm
|
GHSA-5xjx-4xcm-hpcm
|
Prototype Pollution in ts-nodash
|
`ts-nodash` before version 1.2.7 is vulnerable to Prototype Pollution via the Merge() function due to lack of validation input.
|
{'CVE-2021-23403'}
|
2021-12-10T18:53:36Z
|
2021-12-10T18:53:42Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5', 'https://github.com/BadOPCode/NoDash/blob/master/src/Merge.ts', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23403', 'https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009'}
| null |
npm
|
GHSA-c6c4-jmqx-3r33
|
Open Redirect in xdLocalStorage
|
An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends.
|
{'CVE-2020-11611'}
|
2021-05-25T16:23:58Z
|
2021-12-09T19:30:14Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11611', 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client', 'https://github.com/ofirdagan/cross-domain-local-storage'}
| null |
npm
|
GHSA-g7mw-5cq6-fv82
|
Cross-Site Scripting in wangeditor
|
All versions of `wangeditor` are vulnerable to Cross-Site Scripting. The package fails to properly encode output, allowing arbitrary JavaScript to be inserted in links and executed by browsers.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-27T21:00:38Z
|
2020-09-02T21:20:40Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/wangfupeng1988/wangEditor/', 'https://www.npmjs.com/advisories/876', 'https://github.com/wangfupeng1988/wangEditor/issues/1945', 'https://snyk.io/vuln/SNYK-JS-WANGEDITOR-174536'}
| null |
npm
|
GHSA-c6rp-xvqv-mwmf
|
Cross-site Scripting in epubjs
|
managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS.
|
{'CVE-2021-33040'}
|
2022-01-19T14:07:11Z
|
2022-01-21T23:52:17Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/futurepress/epub.js/blob/5c7f21d648d9d20d44c6c365d164b16871847023/src/managers/views/iframe.js#L373', 'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e', 'https://github.com/futurepress/epub.js/compare/v0.3.88...v0.3.89', 'https://github.com/futurepress/epub.js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33040'}
| null |
npm
|
GHSA-rwg6-3fmj-w4wx
|
Hijacked Environment Variables in tkinter
|
The `tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16061'}
|
2021-09-16T20:57:01Z
|
2018-11-01T14:47:21Z
|
CRITICAL
| null |
{'CWE-506', 'CWE-433'}
|
{'https://www.npmjs.com/advisories/500', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16061', 'https://nodesecurity.io/advisories/500'}
| null |
npm
|
GHSA-q26w-wjj2-22vv
|
Cross-site scripting in Joplin
|
Joplin allows XSS via a LINK element in a note.
|
{'CVE-2020-28249'}
|
2021-04-20T19:38:53Z
|
2021-05-10T18:47:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28249', 'https://github.com/fhlip0/JopinXSS', 'https://www.npmjs.com/package/joplin', 'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13', 'https://github.com/laurent22/joplin/releases/tag/v1.3.11'}
| null |
npm
|
GHSA-94m7-w873-6wwf
|
Malicious Package in modlibrary
|
Version 0.1.1 of `modlibrary` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:35Z
|
2020-09-01T20:28:56Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/631'}
| null |
npm
|
GHSA-v3r2-3fp4-rp46
|
Prototype pollution in paypal-adaptive
|
paypal-adaptive through 0.4.2 manipulation of JavaScript objects resulting in Prototype Pollution. The PayPal function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
|
{'CVE-2020-7643'}
|
2021-10-05T17:20:31Z
|
2021-12-10T20:05:57Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7643', 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs', 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs/blob/master/lib/paypal-adaptive.js#L31'}
| null |
npm
|
GHSA-f3pc-c2gf-hvgw
|
Malicious Package in requets
|
All versions of `requets` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:10:10Z
|
2020-09-02T21:13:14Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/868'}
| null |
npm
|
GHSA-v6cj-r88p-92rm
|
Buffer Overflow in centra
|
## Denial of Service
### Impact
Affected Centra versions will, when not in stream mode, buffer responses to requests into memory with no size limit. This issue affects anyone requesting content from untrusted sources.
### Patches
Version 2.4.0 resolves the issue by limiting the size of buffered response body.
### Workarounds
Attempting workarounds isn't recommended. Updating is preferred.
### For more information
If you have any questions or comments about this advisory, open an issue in [ethanent/centra](https://github.com/ethanent/centra).
| null |
2021-09-20T15:40:54Z
|
2019-09-30T19:31:59Z
|
HIGH
| null |
{'CWE-119'}
|
{'https://github.com/ethanent/centra', 'https://github.com/advisories/GHSA-v6cj-r88p-92rm', 'https://snyk.io/vuln/SNYK-JS-CENTRA-536073', 'https://github.com/ethanent/centra/security/advisories/GHSA-v6cj-r88p-92rm'}
| null |
npm
|
GHSA-788m-pj96-7w2c
|
Cross-Site Scripting in fomantic-ui
|
Versions of `fomantic-ui` are vulnerable to Cross-Site Scripting. Lack of output encoding on the selection dropdowns can lead to user input being executed instead of printed as text.
## Recommendation
Upgrade to version 2.7.0 or later.
| null |
2021-09-27T21:41:40Z
|
2020-09-02T21:23:51Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/885', 'https://github.com/fomantic/Fomantic-UI', 'https://github.com/fomantic/Fomantic-UI/releases/tag/2.7.0'}
| null |
npm
|
GHSA-8f9f-pc5v-9r5h
|
Malicious takeover of previously owned ENS names
|
### Impact
A user who owns an ENS domain can set a "trapdoor", allowing them to transfer ownership to another user, and later regain ownership without the new owner's consent or awareness.
### Patches
A new ENS deployment is being rolled out that fixes this vulnerability in the ENS registry. The registry is newly deployed at [0x00000000000C2E074eC69A0dFb2997BA6C7d2e1e](https://etherscan.io/address/0x00000000000C2E074eC69A0dFb2997BA6C7d2e1e).
### Workarounds
Do not accept transfers of ENS domains from other users on the old registrar.
|
{'CVE-2020-5232'}
|
2021-01-08T20:31:45Z
|
2020-01-30T23:55:04Z
|
CRITICAL
| null |
{'CWE-285'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5232', 'https://github.com/ensdomains/ens/commit/36e10e71fcddcade88646821e0a57cc6c19e1ecf', 'https://github.com/ensdomains/ens/security/advisories/GHSA-8f9f-pc5v-9r5h'}
| null |
npm
|
GHSA-r628-mhmh-qjhw
|
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning
|
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.
This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur.
By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite.
This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.
### Patches
3.2.3 || 4.4.15 || 5.0.7 || 6.1.2
### Workarounds
Users may work around this vulnerability without upgrading by creating a custom `filter` method which prevents the extraction of symbolic links.
```js
const tar = require('tar')
tar.x({
file: 'archive.tgz',
filter: (file, entry) => {
if (entry.type === 'SymbolicLink') {
return false
} else {
return true
}
}
})
```
Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
|
{'CVE-2021-32803'}
|
2021-08-30T23:14:33Z
|
2021-08-03T19:00:40Z
|
HIGH
| null |
{'CWE-23', 'CWE-22'}
|
{'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw', 'https://www.npmjs.com/advisories/1771', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32803', 'https://github.com/npm/node-tar'}
| null |
npm
|
GHSA-563h-697m-j7x5
|
Malicious Package in device-mqtt
|
Version 1.0.11 of `device-mqtt` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:47:35Z
|
2020-09-03T19:18:58Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1109'}
| null |
npm
|
GHSA-62gr-4qp9-h98f
|
Regular Expression Denial of Service in Handlebars
|
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
|
{'CVE-2019-20922'}
|
2021-04-22T23:31:21Z
|
2022-02-10T20:38:22Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1300', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20922', 'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b', 'https://www.npmjs.com/package/handlebars', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388'}
| null |
npm
|
GHSA-g6ww-v8xp-vmwg
|
Prototype pollution in pathval
|
A prototype pollution vulnerability affects all versions of package pathval under 1.1.1.
|
{'CVE-2020-7751'}
|
2022-04-18T21:58:49Z
|
2022-02-10T20:21:24Z
|
HIGH
| null |
{'CWE-20', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7751', 'https://github.com/chaijs/pathval/releases/tag/v1.1.1', 'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a', 'https://github.com/chaijs/pathval', 'https://github.com/chaijs/pathval/pull/58/files', 'https://snyk.io/vuln/SNYK-JS-PATHVAL-596926'}
| null |
npm
|
GHSA-46c4-8wrp-j99v
|
Improper Validation and Sanitization in url-parse
|
Insufficient validation and sanitization of user input exists in url-parse npm package version 1.4.4 and earlier may allow attacker to bypass security checks.
|
{'CVE-2020-8124'}
|
2021-03-22T21:07:36Z
|
2022-01-06T20:30:34Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://hackerone.com/reports/496293', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8124'}
| null |
npm
|
GHSA-rh6c-q938-3r9q
|
Moderate severity vulnerability that affects validator
|
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI.
|
{'CVE-2013-7452'}
|
2021-09-17T18:17:08Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2013-7452', 'https://github.com/advisories/GHSA-rh6c-q938-3r9q'}
| null |
npm
|
GHSA-j3ff-xp6c-6gcc
|
Failure to validate signature during handshake
|
### Impact
`@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 was not correctly validating signatures during the handshake process.
This may allow a man-in-the-middle to pose as other peers and get those peers banned.
### Patches
Users should upgrade to 4.1.2 or 5.0.3
### Workarounds
No workarounds, just patch upgrade
### References
https://github.com/ChainSafe/js-libp2p-noise/pull/130
|
{'CVE-2022-24759'}
|
2022-03-18T18:57:53Z
|
2022-03-18T18:57:53Z
|
HIGH
| null |
{'CWE-347'}
|
{'https://github.com/ChainSafe/js-libp2p-noise/pull/130', 'https://github.com/ChainSafe/js-libp2p-noise/releases/tag/v5.0.3', 'https://github.com/ChainSafe', 'https://github.com/ChainSafe/js-libp2p-noise/security/advisories/GHSA-j3ff-xp6c-6gcc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24759'}
| null |
npm
|
GHSA-c7m7-4257-h698
|
Prototype Pollution in templ8
|
All versions of package templ8 up to and including 0.0.44 are vulnerable to Prototype Pollution via the parse function.
|
{'CVE-2020-7702'}
|
2021-05-05T21:29:36Z
|
2021-05-06T17:29:13Z
|
CRITICAL
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-TEMPL8-598770', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7702'}
| null |
GSD
|
GSD-2022-1000074
|
malicious code in PyPi Humanqueen version all
|
In the PyPi Easyfuncsys package there is malicious code that appears to be stealing Discord tokens allowing it to access Discord as that user, additionally it appears to be stealing leveldb files.
| null |
2022-02-02T18:53:12.653286Z
|
2022-02-02T18:53:12.653286Z
| null | null | null |
{'https://blog.sonatype.com/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository', 'https://pepy.tech/project/humanqueen'}
| null |
GSD
|
GSD-2022-1000075
|
Malicious code in PyPi Humanqueenn version all
|
In the PyPi Easyfuncsys package there is malicious code that appears to be stealing Discord tokens allowing it to access Discord as that user, additionally it appears to be stealing leveldb files.
| null |
2022-02-02T18:55:16.940754Z
|
2022-02-02T18:55:16.940754Z
| null | null | null |
{'https://blog.sonatype.com/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository', 'https://pepy.tech/project/humanqueenn'}
| null |
GSD
|
GSD-2022-1000072
|
Backdoor in PyPi xss package version all
|
In the PyPi xss package there is malicious code that appears to be stealing Discord tokens allowing it to access Discord as that user.
| null |
2022-02-02T18:47:52.318148Z
|
2022-02-02T18:47:52.318148Z
| null | null | null |
{'https://pepy.tech/project/xss', 'https://blog.sonatype.com/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository'}
| null |
GSD
|
CAN-2022-1000071
|
Default Credentials in XB6 Fibre+ Gateway version XB6_0821
|
In Shaw Communications Inc XB6 Fibre+ Gateway version XB6_0821 a Default Credentials exists in the Router/Modem that can be attacked via local access resulting in Admin access to router
| null |
2022-02-01T19:38:14.238938Z
|
2022-02-01T19:38:14.238938Z
| null | null | null |
{'https://support.shaw.ca/t5/internet-articles/guide-fibre-gateway-xb6-xb7/ta-p/5114'}
| null |
GSD
|
GSD-2022-1000073
|
malicious code in PyPi Easyfuncsys version all
|
In the PyPi Easyfuncsys package there is malicious code that appears to be stealing Discord tokens allowing it to access Discord as that user, additionally it steals leveldb files, and runs a suspicious EXE.
| null |
2022-02-02T18:51:06.691479Z
|
2022-02-02T18:51:06.691479Z
| null | null | null |
{'https://blog.sonatype.com/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository', 'https://pepy.tech/project/Easyfuncsys'}
| null |
GSD
|
CAN-2022-1000284
|
Risk in WISP version general
|
In Netonix WISP version general a Risk exists in the Firmware update frequency/method/stability that can be attacked via N/A resulting in risk of use of older protocols / slower firmware patching speed / rushed instable updates
| null |
2022-02-23T11:57:23.287111Z
|
2022-02-23T11:57:23.287111Z
| null | null | null |
{'https://forum.netonix.com/'}
| null |
GSD
|
GSD-2022-1000069
|
Hardware glitching attack in Trezor One Hardware Wallet version Unknown
|
The Trezor Hardware Wallet One based on the ARM Cortex-M3-based STM32 F2 uses the RDP2 security level by default (in SDP2 RAM cannot be copied), but the security can be downgraded to RDP1 (where the contents of memory can be copied) via glitch injection during device power on. Please note although the timing of the glitch is largely up to chance an attacker with access to the hardware and several hours can recover it through a simple brute force attack (power wallet on, glitch, repeat until it works). The exploitation of this vulnerability has been confirmed and a Youtube video with extensive details is available. As hardware wallets are explicitly designed to prevent physical attacks from recovering seed material this represents a major vulnerability.
| null |
2022-02-01T17:44:59.482663Z
|
2022-02-01T17:44:59.482663Z
| null | null | null |
{'https://www.youtube.com/watch?v=dT9y-KQbqi4', 'https://www.theverge.com/2022/1/24/22898712/crypto-hardware-wallet-hacking-lost-bitcoin-ethereum-nft'}
| null |
GSD
|
GSD-2022-1000284
|
Risk in WISP version general
|
In Netonix WISP version general a Risk exists in the Firmware update frequency/method/stability that can be attacked via N/A resulting in risk of use of older protocols / slower firmware patching speed / rushed instable updates
| null |
2022-02-23T11:57:23.287111Z
|
2022-02-23T11:57:23.287111Z
| null | null | null |
{'https://forum.netonix.com/'}
| null |
GSD
|
GSD-2022-1000070
|
Reliance on improperly secured communications channel (Discord) in Grape Network version unknown
|
In Grape Network Grape Network version unknown a Reliance on improperly secured communications channel (Discord) exists in the Discord community "announcement" channels for multiple NFTs that can be attacked via unknown resulting in access Grape Network tokens was used to send Discord server messages resulting in social engineering of access to crypto wallets resulting in $1.3 Million USD (Monkey Kingdom) and $150,000 USD (Fractal) in stolen funds
| null |
2022-02-01T17:45:15.768503Z
|
2022-02-01T17:45:15.768503Z
| null | null | null |
{'https://twitter.com/MonkeyKingdom_/status/1473312369556213769', 'https://twitter.com/justinkan/status/1473328245030277122', 'https://cointelegraph.com/news/hong-kong-nft-project-monkey-kingdom-loses-1-3m-in-phishing-hack-launches-compensation-fund', 'https://www.theverge.com/2022/1/7/22870912/nft-communities-boom-discord-hackers-cryptocurrency-webhooks', 'https://twitter.com/grapeprotocol/status/1473422238250680320', 'https://it.slashdot.org/story/22/01/07/1957250/discord-hacking-is-the-newest-threat-for-nft-buyers'}
| null |
GSD
|
GSD-2022-1000071
|
Default Credentials in XB6 Fibre+ Gateway version XB6_0821
|
In Shaw Communications Inc XB6 Fibre+ Gateway version XB6_0821 a Default Credentials exists in the Router/Modem that can be attacked via local access resulting in Admin access to router
| null |
2022-02-01T19:38:14.238938Z
|
2022-02-01T19:38:14.238938Z
| null | null | null |
{'https://support.shaw.ca/t5/internet-articles/guide-fibre-gateway-xb6-xb7/ta-p/5114'}
| null |
GSD
|
GSD-2022-1000285
|
Unsafe default configuration values in Nginx version all version
|
# INFORMATIONAL
In Nginx, all versions, a number of unsafe default configuration values exists in the web server that can be attacked via the network resulting in disclosure of information and availability. These include but are not limited to:
1. Not enough file descriptors per worker
2. The error_log off directive
3. Not enabling keepalive connections to upstream servers
4. Forgetting how directive inheritance works
5. The proxy_buffering off directive
6. Improper use of the if directive
7. Excessive health checks
8. Unsecured access to metrics
9. Using ip_hash when all traffic comes from the same /24 CIDR block
10. Not taking advantage of upstream groups
| null |
2022-02-23T19:01:53.222611Z
|
2022-02-23T19:01:53.222611Z
| null | null | null |
{'https://news.ycombinator.com/item?id=30435282', 'https://www.nginx.com/blog/avoiding-top-10-nginx-configuration-mistakes/#unsecured-metrics'}
| null |
GSD
|
GSD-2022-1000076
|
Unknown vulnerability in Wormhole on 2022-02-02 resulting in 120K ETH on Solana by an attacker.
|
An attacker was able to exploit a bug in Wormhole allowing them to mint 120K ETH on Solana worth approximately $300 Million USD. This has been confirmed with an on-chain message from Wormhole offering a $10 Million USD bug bounty if the newly minted tokens are returned to Wormhole. Wormhole has also stated that the vulnertability has been patched.
| null |
2022-02-02T23:13:19.928218Z
|
2022-02-02T23:13:19.928218Z
| null | null | null |
{'https://twitter.com/wormholecrypto/status/1489001949881978883', 'https://twitter.com/RektHQ/status/1488994599318208512', 'https://www.notifi.xyz/messages/1497', 'https://decrypt.co/91899/hacker-steals-250-million-solana-ethereum-bridge-wormhole', 'https://twitter.com/VitalikButerin/status/1479501366192132099', 'https://twitter.com/samczsun/status/1489044939732406275', 'https://twitter.com/0xB07DAD/status/1488982652174540802', 'https://twitter.com/samczsun/status/1488974372756987906', 'https://thedefiant.io/wormhole-exploit-320m/', 'https://twitter.com/wormholecrypto/status/1489036273012682753', 'https://twitter.com/wormholecrypto/status/1488976115750383626', 'https://twitter.com/DefiantNews/status/1489012237683486721', 'https://twitter.com/wormholecrypto/status/1488997053631971331', 'https://twitter.com/tony_intern/status/1488979589602840581', 'https://old.reddit.com/r/ethereum/comments/rwojtk/ama_we_are_the_efs_research_team_pt_7_07_january/hrngyk8/', 'https://etherscan.io/tx/0x24c7d855a0a931561e412d809e2596c3fd861cc7385566fd1cb528f9e93e5f14'}
| null |
GSD
|
GSD-2022-1000955
|
Access control check in Elementor WordPress plugin version =<3.6.2
|
In Elementor WordPress plugin version 3.6.2 and earlier an access control check vulnerability exists. To quote Bill Toulas from BleepingComputer: "The problem lies in the absence of a crucial access check on one of the plugin's files, "module.php", which is loaded on every request during the admin_init action, even for users that are not logged in, the researchers explain." This can be attacked via the network using standard web requests, resulting in remote code execution. This is fixed in version 3.6.3.
| null |
2022-04-13T16:18:45.179126Z
|
2022-04-13T16:18:45.179126Z
| null | null | null |
{'https://www.pluginvulnerabilities.com/2022/04/12/5-million-install-wordpress-plugin-elementor-contains-authenticated-remote-code-execution-rce-vulnerability/', 'https://www.bleepingcomputer.com/news/security/critical-flaw-in-elementor-wordpress-plugin-may-affect-500k-sites/'}
| null |
GSD
|
GSD-2021-1001147
|
CWE-89 in Secure Remote Access (SRA) version 8.x, 9.0.0.9-26sv and earlier
|
SonicWall is aware of improper neutralization of a SQL Command leading to SQL Injection vulnerability, reported by CrowdStrike, impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware or an old version of firmware 9.x (9.0.0.9-26sv or earlier). In February 2021, SonicWall released SMA firmware 10.2.0.7 and 9.0.0.10 to fix a zero-day vulnerability, along with additional comprehensive code-strengthening. This strengthening proactively prevented this newly reported vulnerability in 9.0.0.10. Organizations that already upgraded to the 9.0.0.10 firmware are already protected against this newly reported issue and don’t need to take any action. Organizations with any 10.x version is not subject to this vulnerability as the vulnerable feature was deprecated in the 10.x release. Organizations running any firmware versions of 8.x or older than 9.0.0.10 or 10.2.0.7 should, per our earlier instructions, upgrade immediately. These older versions may potentially be exploited if not patched immediately. SMA 1000 Series products are not affected by this vulnerability.
| null |
2021-07-17T15:03:52.309482Z
|
2021-07-17T15:03:52.309482Z
| null | null | null |
{'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0017'}
| null |
GSD
|
GSD-2022-1000283
|
Multiple vulnerabilities in NFT version All
|
A phishing attack was conducted against users of the Opensea.io NFT platform, resulting in 17 users losing approx. $1.7 Million USD in NFTs. This incident appears to include email phishing, a fake website, bad wallet UI that make it difficult for users to know exactly what is going on and use of the Wyvern 2.2 version Smart Contract which is being deprecated. Please note that this issue may be split into multiple GSD IDs at some point, e.g. for the bad wallet UI (you are selling something for 0 ETH which should generate a warning), lack of EIP-712 support in the Smart Contract which makes signing things more dangerous and so on.
| null |
2022-02-23T01:55:19.527375Z
|
2022-02-23T01:55:19.527375Z
| null | null | null |
{'https://twitter.com/onbjerg/status/1495209661645131777', 'https://threatpost.com/nft-investors-lose-1-7m-in-opensea-phishing-attack/178558/', 'https://www.theverge.com/2022/2/20/22943228/opensea-phishing-hack-smart-contract-bug-stolen-nft', 'https://twitter.com/isotile/status/1495234649970421760?s=21', 'https://www.reddit.com/r/CryptoCurrency/comments/swshf5/opensea_nft_hack_explain_thread/', 'https://www.coindesk.com/business/2022/02/20/opensea-investigating-exploit-rumors-as-users-complain-of-missing-nfts/', 'https://twitter.com/YannickCrypto/status/1495228939287113734', 'https://twitter.com/NadavAHollander/status/1495509511179755530', 'https://www.zdnet.com/article/opensea-scam-artists-swindle-nfts-worth-millions-in-phishing-attack/', 'https://cryptodeadline.com/opensea-has-been-attacked-by-phishing-with-its-new-upgrade/', 'https://twitter.com/NFTDrops/status/1495479006396833793', 'https://twitter.com/125Citizen/status/1495209637712388098', 'https://twitter.com/opensea/status/1495211277097996290', 'https://twitter.com/opensea/status/1495625768713469954', 'https://ca.finance.yahoo.com/news/opensea-investigating-exploit-rumors-users-033216712.html', 'https://twitter.com/TheAlexAlbi/status/1495236036875763716', 'https://twitter.com/dev_allo/status/1495211980902313989', 'https://etherscan.io/address/0x3e0defb880cd8e163bad68abe66437f99a7a8a74'}
| null |
GSD
|
GSD-2022-1000077
|
CWE-749 in Dragos version all versions
|
In RigoBlock Dragos, all versions as of 2022-02-17 and later (until a major protocol update is accomplished) contain an exposed function (CWE-749), specifically setMultipleAllowances() which was not set to onlyOwner. The setMultipleAllowances() function can be to manipulate tokens with the contract.
| null |
2022-02-18T03:50:18.115366Z
|
2022-02-18T03:50:18.115366Z
| null | null | null |
{'https://etherscan.io/contractdiffchecker?a1=0x876b9ebd725d1fa0b879fcee12560a6453b51dc8', 'https://twitter.com/danielvf/status/1494317265835147272', 'https://twitter.com/RigoBlock/status/1494351180713050116', 'https://etherscan.io/tx/0x5a6c108d5a729be2011cd47590583a04444d4e7c85cd0427071b968edc3bfc1f'}
| null |
Hex
|
GHSA-qpmc-wprv-x746
|
Inline DTD allows XML bomb attack
|
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
|
{'CVE-2019-15160'}
|
2022-04-12T21:31:26Z
|
2022-04-12T21:31:26Z
|
HIGH
| null |
{'CWE-611', 'CWE-776'}
|
{'https://hex.pm/packages/sweet_xml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15160', 'https://github.com/kbrw/sweet_xml', 'https://github.com/kbrw/sweet_xml/issues/71'}
| null |
Hex
|
GHSA-5653-437f-5hmc
|
Denial of service
|
The use of `String.to_atom/1` in PowAssent is susceptible to denial of service attacks. In `PowAssent.Phoenix.AuthorizationController` a value is fetched from the user provided params, and `String.to_atom/1` is used to convert the binary value to an atom so it can be used to fetch the provider configuration value. This is unsafe as it is user provided data, and can be used to fill up the whole atom table of ~1M which will cause the app to crash.
|
{'CVE-2019-16764'}
|
2022-04-12T21:29:30Z
|
2022-04-12T21:29:30Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf', 'https://hex.pm/packages/pow_assent', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16764', 'https://github.com/pow-auth/pow_assent', 'https://github.com/pow-auth/pow_assent/security/advisories/GHSA-368c-xvrv-x986', 'http://erlang.org/doc/efficiency_guide/commoncaveats.html#list_to_atom-1'}
| null |
Hex
|
GHSA-2xxx-fhc8-9qvq
|
Missing `is_nil` requirement
|
Ecto will not raise on queries with non-explicit nil comparisons (ie if they aren't checked with `is_nil`).
| null |
2022-04-12T19:42:45Z
|
2022-04-12T19:42:45Z
|
MODERATE
| null | null |
{'https://github.com/elixir-ecto/ecto/commit/db55b0cba6525c24ebddc88ef9ae0c1c00620250', 'https://github.com/elixir-ecto/ecto', 'https://groups.google.com/forum/#!topic/elixir-ecto/0m4NPfg_MMU', 'https://github.com/elixir-ecto/ecto/pull/2125'}
| null |
Hex
|
GHSA-5chx-gg25-v37m
|
Cross-site Scripting in xain
|
XSS is possible via the use of the order query parameter. An example request
would look like:
```
http://host/ressources?order=%27><script>alert(1);</script>
```
|
{'CVE-2018-20302'}
|
2022-04-12T21:17:38Z
|
2022-04-12T21:17:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/dependabot/elixir-security-advisories/blob/master/packages/xain/2018-09-03.yml', 'https://github.com/smpallen99/xain', 'https://github.com/smpallen99/xain/issues/18', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20302'}
| null |
Hex
|
GHSA-w98m-2xqg-9cvj
|
Remote Code Execution in paginator
|
There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function.
### Impact
There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. This will potentially affect all current users of `Paginator` prior to version >= 1.0.0.
### Patches
The vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version >=1.5.
### Credits
Thank you to Peter Stöckli.
|
{'CVE-2020-15150'}
|
2022-04-12T19:36:39Z
|
2022-04-12T19:36:39Z
|
CRITICAL
| null | null |
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15150', 'https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8', 'https://hex.pm/packages/paginator', 'https://github.com/duffelhq/paginator', 'https://github.com/duffelhq/paginator/blob/ccf0f37fa96347cc8c8a7e9eb2c64462cec4b2dc/README.md#security-considerations', 'https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj'}
| null |
Hex
|
GHSA-2q6v-32mr-8p8x
|
Null Byte Injection in Plug.Static
|
Plug.Static is used for serving static assets, and is vulnerable to null
byte injection. If file upload functionality is provided, this can allow
users to bypass filetype restrictions.
We recommend all applications that provide file upload functionality and
serve those uploaded files locally with Plug.Static to upgrade immediately
or include the fix below. If uploaded files are rather stored and served
from S3 or any other cloud storage, you are not affected.
|
{'CVE-2017-1000052'}
|
2022-04-12T21:20:20Z
|
2022-04-12T21:20:20Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://github.com/elixir-plug/plug', 'https://elixirforum.com/t/security-releases-for-plug/3913', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000052'}
| null |
Hex
|
GHSA-5v4m-c73v-c7gq
|
Arbitrary Code Execution in Cookie Serialization
|
The default serialization used by Plug session may result in code execution
in certain situations. Keep in mind, however, the session cookie is signed
and this attack can only be exploited if the attacker has access to your
secret key as well as your signing/encryption salts. We recommend users to
change their secret key base and salts if they suspect they have been leaked,
regardless of this vulnerability.
|
{'CVE-2017-1000053'}
|
2022-04-12T21:23:43Z
|
2022-04-12T21:23:43Z
|
HIGH
| null |
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000053', 'https://elixirforum.com/t/security-releases-for-plug/3913', 'https://github.com/elixir-plug/plug'}
| null |
Hex
|
GHSA-j3gg-r6gp-95q2
|
XSS in HEEx class attributes
|
The `class` attribute was not protected against XSS attacks when using HEEx.
| null |
2022-04-12T20:22:57Z
|
2022-04-12T20:22:57Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/phoenixframework/phoenix_html/commit/62a0139fb716bcdce697f6221244bd81d321d620', 'https://github.com/phoenixframework/phoenix_html'}
| null |
Hex
|
GHSA-v2wf-c3j6-wpvw
|
Session fixation
|
### Impact
The use of `Plug.Session` in `Pow.Plug.Session` is susceptible to session fixation attacks if a persistent session store is used for `Plug.Session`, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability.
### Workarounds
Call `Plug.Conn.configure_session(conn, renew: true)` periodically and after privilege change. A custom authorization plug can be written where the `create/3` method should return the `conn` only after `Plug.Conn.configure_session/2` have been called on it.
### References
https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f
https://www.owasp.org/index.php/Session_fixation
|
{'CVE-2020-5205'}
|
2022-04-12T21:27:49Z
|
2022-04-12T21:27:49Z
|
MODERATE
| null |
{'CWE-384'}
|
{'https://github.com/danschultzer/pow/security/advisories/GHSA-v2wf-c3j6-wpvw', 'https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f', 'https://github.com/danschultzer/pow', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5205', 'https://github.com/danschultzer/pow/blob/master/CHANGELOG.md#v1016-2020-01-07'}
| null |
Hex
|
GHSA-cmfh-8f8r-fj96
|
Arbitrary URL Redirect
|
The Phoenix team designed Phoenix.Controller.redirect/2 to protect against
redirects allowing user input to redirect to an external URL where your
application code otherwise assumes a local path redirect. This is why the
:to option is used for “local” URL redirects and why you must pass the
:external option to intentionally allow external URLs to be redirected to.
It has been disclosed that carefully crafted user input may be treated by some
browsers as an external URL. An attacker can use this vulnerability to aid in
social engineering attacks. The most common use would be to create highly
believable phishing attacks.
For example, the following user input would pass local URL validation,
but be treated by Chrome and Firefox as external URLs:
http://localhost:4000/?redirect=/\nexample.com
Not all browsers are affected, but latest Chrome and Firefox will issue a get
request for example.com and successfully redirect externally
|
{'CVE-2017-1000163'}
|
2022-04-12T21:16:09Z
|
2022-04-12T21:16:09Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000163', 'https://github.com/phoenixframework/phoenix', 'https://elixirforum.com/t/security-releases-for-phoenix/4143'}
| null |
Hex
|
GHSA-9h73-w7ch-rh73
|
Header Injection
|
Elixir Plug Plug version All contains a Header Injection vulnerability in Connection that can result in Given a cookie value, Headers can be added. This attack appear to be exploitable via Crafting a value to be sent as a cookie. This vulnerability appears to have been fixed in >= 1.3.5 or ~> 1.2.5 or ~> 1.1.9 or ~> 1.0.6.
|
{'CVE-2018-1000883'}
|
2022-04-12T21:26:27Z
|
2022-04-12T21:26:27Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/elixir-plug/plug', 'https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000883', 'https://github.com/dependabot/elixir-security-advisories/blob/master/packages/plug/2017-04-17.yml'}
| null |
Hex
|
GHSA-mrq8-53r4-3j5m
|
Permissive parameters and privilege escalation
|
An issue was discovered in Steve Pallen Coherence before 0.5.2 that is similar to a Mass Assignment vulnerability. In particular, "registration" endpoints (e.g., creating, editing, updating) allow users to update any coherence_fields data. For example, users can automatically confirm their accounts by sending the confirmed_at parameter with their registration request.
|
{'CVE-2018-20301'}
|
2022-01-27T20:15:58Z
|
2022-02-10T22:35:39Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/smpallen99/coherence', 'https://github.com/smpallen99/coherence/issues/270', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20301'}
| null |
Packagist
|
GHSA-rh5w-82wh-jhr8
|
XSS vulnerability on asset view
|
### Impact
Mautic versions before 3.3.4 / 4.0.0 are vulnerable to an inline JS XSS attack when viewing Mautic assets by utilizing inline JS in the title and adding a broken image URL as a remote asset. This can only be leveraged by an authenticated user with permission to create or edit assets.
### Patches
Upgrade to 3.3.4 or 4.0.0
### Workarounds
No
### References
https://github.com/mautic/mautic/releases/tag/3.3.4
https://github.com/mautic/mautic/releases/tag/4.0.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2021-27912'}
|
2021-08-30T18:05:54Z
|
2021-09-01T18:40:31Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27912', 'https://github.com/mautic/mautic', 'https://github.com/mautic/mautic/security/advisories/GHSA-rh5w-82wh-jhr8'}
| null |
Packagist
|
GHSA-qpxw-6473-ppww
|
Session Fixation in Subrion CMS
|
Subrion CMS 4.2.1 allows session fixation via an alphanumeric value in a session cookie.
|
{'CVE-2020-12467'}
|
2021-05-25T20:45:01Z
|
2021-06-22T15:23:04Z
|
MODERATE
| null |
{'CWE-384'}
|
{'https://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/Session%20Fixation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12467'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.