diff --git "a/github-advisory-2018.csv" "b/github-advisory-2018.csv"
new file mode 100644--- /dev/null
+++ "b/github-advisory-2018.csv"
@@ -0,0 +1,3821 @@
+schema_version,id,modified,published,withdrawn,aliases,summary,details,severity,affected,references,database_specific
+1.4.0,GHSA-f7ph-p5rv-phw2,2020-08-31T18:12:27Z,2018-11-06T23:13:37Z,,['CVE-2016-10547'],Cross-Site Scripting in nunjucks,"Affected versions of `nunjucks` do not properly escape specially structured user input in template vars when in auto-escape mode, resulting in a cross-site scripting vulnerability.
+
+## Proof of Concept
+
+By using an array for the keys in a template var, escaping is bypassed.
+```javascript
+name[]=
+```
+
+A full PoC is available in the references section.
+
+
+## Recommendation
+
+Update to version 2.4.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'nunjucks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10547'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/nunjucks/issues/835'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f7ph-p5rv-phw2'}, {'type': 'WEB', 'url': 'https://github.com/matt-/nunjucks_test'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/147'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rwg6-3fmj-w4wx,2023-09-08T23:30:49Z,2018-11-01T14:47:21Z,,['CVE-2017-16061'],tkinter is malware,"The `tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tkinter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16061'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/500'}]","{'cwe_ids': ['CWE-433', 'CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xgc9-9w4v-h33h,2021-09-21T22:31:15Z,2018-11-06T23:17:27Z,,['CVE-2018-1321'],High severity vulnerability that affects org.apache.syncope:syncope-core,"An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1321'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xgc9-9w4v-h33h'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45400/'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security.html#CVE-2018-1321:_Remote_code_execution_by_administrators_with_report_and_template_entitlements'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103508'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xvch-r4wf-h8w9,2022-09-14T22:05:10Z,2018-11-21T22:22:21Z,,['CVE-2018-17187'],Improper Certificate Validation in proton-j,"The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options to configure this explicitly or select a certificate verification mode with or without hostname verification being performed. The latter hostname verifying mode was not implemented in Apache Qpid Proton-J versions 0.3 to 0.29.0, with attempts to use it resulting in an exception. This left only the option to verify the certificate is trusted, leaving such a client vulnerable to Man In The Middle (MITM) attack. Uses of the Proton-J protocol engine which do not utilise the optional transport TLS wrapper are not impacted, e.g. usage within Qpid JMS. Uses of Proton-J utilising the optional transport TLS wrapper layer that wish to enable hostname verification must be upgraded to version 0.30.0 or later and utilise the VerifyMode#VERIFY_PEER_NAME configuration, which is now the default for client mode usage unless configured otherwise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:proton-j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3'}, {'fixed': '0.30.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.29.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17187'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xvch-r4wf-h8w9'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/PROTON-1962'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/qpid-users/201811.mbox/%3CCAFitrpQSV73Vz7rJYfLJK7gvEymZSCR5ooWUeU8j4jzRydk-eg%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'https://qpid.apache.org/cves/CVE-2018-17187.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105935'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5xgh-643p-cp2g,2022-09-21T22:28:56Z,2018-11-21T22:19:59Z,,['CVE-2018-17574'],Cross-site Scripting in yapi-vendor,An issue was discovered in YMFE YApi 1.3.23. There is stored XSS in the name field of a project.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'yapi-vendor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.23'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17574'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/520'}, {'type': 'PACKAGE', 'url': 'https://github.com/YMFE/yapi'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5xgh-643p-cp2g'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-26q7-g57v-mxcp,2020-08-31T18:19:13Z,2018-11-07T00:28:11Z,,['CVE-2017-16043'],HTML Injection in shout,"Affected versions of `shout` do not escape the `/topic` command in messages, and are therefore vulnerable to cross-site scripting.
+
+
+## Recommendation
+
+Update to version 0.50.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'shout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.44.0'}, {'fixed': '0.50.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.49.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16043'}, {'type': 'WEB', 'url': 'https://github.com/erming/shout/pull/344'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-26q7-g57v-mxcp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/322'}]","{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7g2w-6r25-2j7p,2023-09-07T18:15:41Z,2018-11-01T14:51:33Z,,['CVE-2018-16461'],Command Injection in libnmap,"Versions of `libnmap` before 0.4.16 are vulnerable to command injection.
+
+Proof of concept
+
+```js
+const nmap = require('libnmap');
+const opts = {
+ range: [
+ 'scanme.nmap.org',
+ ""x.x.$(touch success.txt)""
+ ]
+};
+nmap.scan(opts, function(err, report) {
+ if (err) throw new Error(err);
+
+ for (let item in report) {
+ console.log(JSON.stringify(report[item]));
+ }
+});
+```
+
+
+## Recommendation
+
+Update to version 0.4.16 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'libnmap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16461'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390865'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7g2w-6r25-2j7p'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/474.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/719'}]","{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3hvm-hgpw-rx4j,2023-09-12T20:40:50Z,2018-11-06T23:11:10Z,,['CVE-2018-16475'],Path Traversal in knightjs,"All versions of `knightjs` are vulnerable to Path Traversal.
+
+This vulnerability allows an attacker to read content of arbitrary files on the server due to lack of input validation.
+
+
+## Recommendation
+
+As there is currently no fix for this module we recommend not using this module in production environments. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'knightjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16475'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403707'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3hvm-hgpw-rx4j'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/743'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-23xp-j737-282v,2023-09-07T22:55:00Z,2018-11-06T23:12:30Z,,['CVE-2018-16473'],Path Traversal in takeapeek,"All versions of `takeapeek` are vulnerable to path traversal exposing files and directories.
+
+
+## Recommendation
+
+As no fix is currently available for this vulnerability is it is our recommendation to use another static file server.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'takeapeek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16473'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403736'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-23xp-j737-282v'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/478.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/740'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wv26-rj8c-4r33,2022-09-14T22:00:43Z,2018-11-06T23:15:13Z,,['CVE-2018-6874'],Cross-Site Request Forgery (CSRF) in Auth0,CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6874'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2018-6874'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wv26-rj8c-4r33'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103695'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3p4q-x8f3-p7vq,2023-09-05T19:12:36Z,2018-11-21T22:19:22Z,,['CVE-2018-19352'],Jupyter Notebook XSS via directory name,Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19352'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/288b73e1edbf527740e273fcc69b889460871648'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3p4q-x8f3-p7vq'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst'}, {'type': 'WEB', 'url': 'https://pypi.org/project/notebook/#history'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c2fx-8r76-gh36,2020-06-16T21:29:59Z,2018-11-06T23:14:22Z,,['CVE-2013-7323'],High severity vulnerability that affects python-gnupg,python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.3.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7323'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2fx-8r76-gh36'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/243'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/244'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/294'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56616'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59031'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r3vr-prwv-86g9,2021-09-17T14:15:08Z,2018-11-06T23:14:39Z,,['CVE-2014-1927'],High severity vulnerability that affects python-gnupg,"The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using ""$("" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.6'}]}], 'versions': ['0.3.5']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1927'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/vinay.sajip/python-gnupg'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/issues/detail?id=98'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r3vr-prwv-86g9'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/245'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/294'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56616'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59031'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3rh7-vm4x-q2hp,2023-09-12T18:40:34Z,2018-11-09T17:49:22Z,,['CVE-2017-16055'],sqlserver is malware,"The `sqlserver` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sqlserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3rh7-vm4x-q2hp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/486'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2jc8-4r6g-282j,2020-06-16T20:52:26Z,2018-11-06T23:13:02Z,,['CVE-2014-1928'],Moderate severity vulnerability that affects python-gnupg,"The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using ""\"" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.6'}]}], 'versions': ['0.3.5']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1928'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/issues/detail?id=98'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2jc8-4r6g-282j'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/246'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/294'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56616'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59031'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hg78-4f6x-99wq,2023-08-28T12:46:14Z,2018-11-15T15:58:58Z,,['CVE-2018-16470'],Rack vulnerable to Denial of Service,"There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.4'}, {'fixed': '2.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16470'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3172'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2018-16470.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/Dz4sRl-ktKk'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g68x-vvqq-pvw3,2023-09-08T21:34:45Z,2018-11-21T22:19:50Z,,['CVE-2018-17960'],Ckeditor XSS Vulnerability,"CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste. It was possible to execute XSS inside the CKEditor source area after persuading the victim to: (i) switch CKEditor to source mode, then (ii) paste a specially crafted HTML code, prepared by the attacker, into the opened CKEditor source area, and (iii) switch back to WYSIWYG mode. Although this is an unlikely scenario, it is recommended to upgrade to the latest editor version.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17960'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/CKEditor-4.11-with-emoji-dropdown-and-auto-link-on-typing-released/'}, {'type': 'WEB', 'url': 'https://ckeditor.com/cke4/release/CKEditor-4.11.0'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g68x-vvqq-pvw3'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227030123/http://www.securityfocus.com/bid/109205'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vgrx-w6rg-8fqf,2020-08-31T18:10:20Z,2018-11-06T23:12:07Z,,['CVE-2016-10555'],Forgeable Public/Private Tokens in jwt-simple,"Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort.
+
+
+
+## Recommendation
+
+Update to version 0.3.1 or later.
+
+Additionally, be sure to always specify an algorithm in calls to `.decode()`.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jwt-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10555'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97'}, {'type': 'WEB', 'url': 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/87'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c7c7-xm8g-xm36,2022-09-14T21:59:56Z,2018-11-01T14:48:29Z,,['CVE-2018-18830'],Unrestricted Upload of File with Dangerous Type in mingsoft:ms-mcms,"An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In the name parameter, change the suffix to jsp. In the response, the server returns the storage path of the file, which can be accessed to execute arbitrary JSP code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18830'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/IO0IQ'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c7c7-xm8g-xm36'}]","{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2mw7-wggm-m6w3,2022-09-14T22:05:59Z,2018-11-21T22:22:46Z,,['CVE-2018-19183'],Denial of Service in ethereumjs-vm,"ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a ""code: Buffer.from(my_code, 'hex')"" attribute.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ethereumjs-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19183'}, {'type': 'WEB', 'url': 'https://github.com/ethereumjs/ethereumjs-vm/issues/386'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2mw7-wggm-m6w3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereumjs/ethereumjs-vm'}]","{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qfjv-998w-q48f,2021-09-16T19:56:56Z,2018-11-06T23:15:46Z,,['CVE-2018-17186'],High severity vulnerability that affects org.apache.syncope:syncope-core,"An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17186'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qfjv-998w-q48f'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security#CVE-2018-17186:_XXE_on_BPMN_definitions'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jmf4-pq78-f8vj,2021-09-14T19:47:15Z,2018-11-21T22:24:50Z,,['CVE-2018-1314'],Moderate severity vulnerability that affects org.apache.hive:hive-jdbc,"In Apache Hive 2.3.3, 3.1.0 and earlier, Hive ""EXPLAIN"" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do ""EXPLAIN"" on arbitrary table or view and expose table metadata and statistics.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1314'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jmf4-pq78-f8vj'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3da47dbcbf09697387f29d2f1aed970523b6b334d93afd3cced23727@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105884'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q257-vv4p-fg92,2023-09-08T23:24:59Z,2018-11-09T17:49:34Z,,['CVE-2017-16005'],Header Forgery in http-signature,"Affected versions of `http-signature` contain a vulnerability which can allow an attacker in a privileged network position to modify header names and change the meaning of the request, without requiring an updated signature.
+
+This problem occurs because vulnerable versions of `http-signature` sign the contents of headers, but not the header names.
+
+## Proof of Concept
+
+Consider this to be the initial, untampered request:
+```http
+POST /pay HTTP/1.1
+Host: example.com
+Date: Thu, 05 Jan 2012 21:31:40 GMT
+X-Payment-Source: src@money.com
+X-Payment-Destination: dst@money.com
+Authorization: Signature keyId=""Test"",algorithm=""rsa-sha256"",headers=""x-payment-source x-payment-destination"" MDyO5tSvin5...
+```
+
+And the request is intercepted and tampered as follows:
+```http
+X-Payment-Source: dst@money.com // Emails switched
+X-Payment-Destination: src@money.com
+Authorization: Signature keyId=""Test"",algorithm=""rsa-sha256"",headers=""x-payment-destination x-payment-source"" MDyO5tSvin5...
+```
+
+In the resulting responses, both requests would pass signature verification without issue.
+```
+src@money.com\n
+dst@money.com\n
+```
+
+
+
+## Recommendation
+
+Update to version 0.10.0 or higher.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'http-signature'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16005'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-http-signature/issues/10'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q257-vv4p-fg92'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/318'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-38h8-x697-gh8q,2023-09-07T20:13:49Z,2018-11-09T17:45:30Z,,['CVE-2017-16024'],Tmp files readable by other users in sync-exec,"Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user.
+
+
+## Recommendation
+
+There is currently no direct patch for `sync-exec`, as the `child_process.execSync` function provided in Node.js v0.12.0 and later provides the same functionality natively.
+
+The best mitigation currently is to update to Node.js v0.12.0 or later, and migrate all uses of `sync-exec` to `child_process.execSync()`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sync-exec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16024'}, {'type': 'WEB', 'url': 'https://github.com/gvarsanyi/sync-exec/issues/17'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/377.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38h8-x697-gh8q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/310'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Insecure_Temporary_File'}]","{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rxmr-c9jm-7mm8,2022-09-14T22:07:44Z,2018-11-21T22:24:22Z,,['CVE-2018-1284'],Exposure of Sensitive Information to an Unauthorized Actor in Apache hive,"In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1284'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rxmr-c9jm-7mm8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/29184dbce4a37be2af36e539ecb479b1d27868f73ccfdff46c7174b4@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103750'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-32w7-9whp-cjp9,2022-09-14T22:08:57Z,2018-11-29T21:30:56Z,,['CVE-2018-19443'],Session Fixation in Tryton,"The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tryton'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}], 'versions': ['5.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19443'}, {'type': 'WEB', 'url': 'https://bugs.tryton.org/issue7792'}, {'type': 'WEB', 'url': 'https://discuss.tryton.org/t/security-release-for-issue7792/830'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-32w7-9whp-cjp9'}]","{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9xgh-xgw5-p5cw,2023-09-14T17:55:59Z,2018-11-09T17:42:54Z,,['CVE-2017-16057'],nodemssql is malware,"The `nodemssql` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodemssql'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16057'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9xgh-xgw5-p5cw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/484'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x3g3-334f-q6h4,2023-09-08T19:44:37Z,2018-11-09T17:41:15Z,,['CVE-2018-19056'],Pandao editor.md vulnerable to DOM XSS,"pandao Editor.md 1.5.0 has DOM XSS via input starting with a `<<` substring, which is mishandled during construction of an `A` element.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.5.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19056'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/634'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x3g3-334f-q6h4'}, {'type': 'PACKAGE', 'url': 'https://github.com/pandao/editor.md'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g4xq-jx4w-4cjv,2023-01-23T17:08:55Z,2018-11-01T14:46:01Z,,['CVE-2018-16468'],Loofah Cross-site Scripting vulnerability,"In the Loofah gem for Ruby, through version 2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. Users are advised to upgrade to version 2.2.3.
+
+See https://github.com/flavorjones/loofah/issues/154 for more details.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16468'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/154'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4364'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vcr5-xr9h-mvc5,2023-09-01T20:54:16Z,2018-11-06T23:12:48Z,,['CVE-2014-1929'],python-gnupg vulnerable to shell injection,python-gnupg 0.3.5 and 0.3.6 allow for shell injection via a failure to escape backslashes in the `shell_quote()` function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1929'}, {'type': 'WEB', 'url': 'https://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/2014-June/028512.html'}, {'type': 'WEB', 'url': 'https://code.google.com/archive/p/python-gnupg/issues/98'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vcr5-xr9h-mvc5'}, {'type': 'PACKAGE', 'url': 'https://github.com/vsajip/python-gnupg'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228170437/http://www.securityfocus.com/bid/65539'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2014/02/04/3'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2014/02/04/4'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/245'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/335'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jf2m-435m-mxw8,2022-09-14T22:08:10Z,2018-11-21T22:24:34Z,,['CVE-2018-1282'],SQL Injection in hive-jdbc,This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows carefully crafted arguments to be used to bypass the argument escaping/cleanup that JDBC driver does in PreparedStatement implementation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.1'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1282'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jf2m-435m-mxw8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/74bd2bff1827febb348dfb323986fa340d3bb97a315ab93c3ccc8299@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103751'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wg85-p6j7-gp3w,2023-09-07T00:08:31Z,2018-11-21T22:21:25Z,,['CVE-2018-19057'],SimpleMDE XSS Vulnerability,"SimpleMDE 1.11.2 has XSS via an onerror attribute of a crafted IMG element, or via certain input with `[` and `(` characters, which is mishandled during construction of an `A` element.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'simplemde'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19057'}, {'type': 'WEB', 'url': 'https://github.com/sparksuite/simplemde-markdown-editor/issues/721'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg85-p6j7-gp3w'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparksuite/simplemde-markdown-editor'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q3jg-4c82-j4xh,2022-09-14T22:09:19Z,2018-11-29T21:30:30Z,,['CVE-2018-15795'],Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Pivotal CredHub Service Broker,"Pivotal CredHub Service Broker, versions prior to 1.1.0, uses a guessable form of random number generation in creating service broker's UAA client. A remote malicious user may guess the client secret and obtain or modify credentials for users of the CredHub Service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.credhub:spring-credhub-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15795'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q3jg-4c82-j4xh'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-15795'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105915'}]","{'cwe_ids': ['CWE-338'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-phg2-9c5g-m4q7,2022-09-14T22:04:46Z,2018-11-21T22:19:30Z,,['CVE-2018-17190'],Remote Code Execution in spark-core,"In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected.
+
+# Mitigation
+Enable authentication on any Spark standalone cluster that is not otherwise secured from unwanted access, for example by network-level restrictions. Use spark.authenticate and related security properties described at https://spark.apache.org/docs/latest/security.html","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17190'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-phg2-9c5g-m4q7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201903-21'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105976'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xqqr-p362-6rmc,2023-09-12T21:11:28Z,2018-11-09T17:44:20Z,,['CVE-2017-16029'],Directory Traversal in hostr,"Affected versions of `hostr` are vulnerable to directory traversal which allows attackers to read files outside the current directory by sending `../` in the url path for GET requests.
+
+
+## Recommendation
+
+Upgrade to version 2.3.6 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'hostr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16029'}, {'type': 'WEB', 'url': 'https://github.com/henrytseng/hostr/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/henrytseng/hostr/issues/8)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqqr-p362-6rmc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/303'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cfw5-v7cw-69cw,2021-09-09T17:08:40Z,2018-11-09T17:49:49Z,,['CVE-2018-1337'],Critical severity vulnerability that affects org.apache.directory.api:apache-ldap-api,"In Apache LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (including the credentials when sending a BIND request).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.directory.api:apache-ldap-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1337'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfw5-v7cw-69cw'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d66081195e9a02ee7cc20fb243b60467d1419586eed28297d820768f@%3Cdev.directory.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0e645b3f6ca977dc60b7cec231215c59a9471736c2402c1fef5a0616@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1815fb5b0c345f571c740e7a1b48d7477647edd4ffcf9d5321e69446@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1a258430d820a90ff9d4558319296cc517ff2252327d7b3546d16749@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4da40aa50cfdb2158898f2bc6df81feec1d42c6a06db6537d5cc0496@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55e74532e7f9e84ecfa56b4e0a50a5fe0ba6f7a76880520e4400b0d7@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r56b304fb9960c869995efbb31da3b9b7c6d53ee31f7f7048eb80434b@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104744'}]","{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8rhc-48pp-52gr,2021-09-07T20:33:02Z,2018-11-09T17:43:25Z,,['CVE-2017-12612'],High severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11,"In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit or spark-shell. The attacker would be able to execute code as the user that ran the Spark application. Users are encouraged to update to version 2.1.2, 2.2.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12612'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8rhc-48pp-52gr'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/spark-dev/201709.mbox/%3CCAEccTyy-1yYuhdNgkBUg0sr9NeaZSrBKkBePdTNZbxXZNTAR-g%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100823'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jhgp-hvj6-x2p2,2023-09-12T18:44:07Z,2018-11-06T23:12:01Z,,['CVE-2018-16474'],Stored Cross-Site Scripting in tianma-static,"All versions of `tianma-static` are vulnerable to stored cross-site scripting (XSS). The vulnerability is exploitable if a user can control the name of a file that is served by `tianma-static`
+
+
+## Recommendation
+
+As no fix is available for this vulnerability at this time it is our recommendation to use another static file server.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tianma-static'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16474'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403692'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhgp-hvj6-x2p2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/741'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j7c4-2xj8-wm7r,2022-09-14T22:51:45Z,2018-11-01T14:49:30Z,,['CVE-2015-5159'],Improper Input Validation in kdcproxy,python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'kdcproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5159'}, {'type': 'WEB', 'url': 'https://github.com/latchset/kdcproxy/commit/f274aa6787cb8b3ec1cc12c440a56665b7231882'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1245200'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j7c4-2xj8-wm7r'}, {'type': 'PACKAGE', 'url': 'https://github.com/latchset/kdcproxy'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hhrp-qm88-xjr3,2023-09-07T18:23:41Z,2018-11-21T22:19:41Z,,['CVE-2018-19289'],Valine HTML Injection,"An issue was discovered in Valine v1.3.3. It allows HTML injection, which can be exploited for JavaScript execution via an EMBED element in conjunction with a .pdf file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19289'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/127'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/commit/32d4d5e68df804f0eabb1a2bebbbf9459e31c2b7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hhrp-qm88-xjr3'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w4r4-65mg-45x2,2022-12-06T16:40:49Z,2018-11-09T17:41:46Z,,['CVE-2018-11770'],org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 Improper Authentication vulnerability,"From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting 'spark.authenticate.secret' when running the REST APIs, to make this clear. Future 2.4.x versions will also disable the REST API by default in the standalone master by changing the default value of 'spark.master.rest.enabled' to 'false'.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '2.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '2.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11770'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485%40%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485@%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://spark.apache.org/security.html#CVE-2018-11770'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227114942/http://www.securityfocus.com/bid/105097'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:32Z', 'nvd_published_at': '2018-08-13T16:29:00Z'}"
+1.4.0,GHSA-9xw9-pvgv-6p76,2023-09-13T19:36:45Z,2018-11-09T17:47:52Z,,['CVE-2017-16014'],Insufficient Error Handling in http-proxy,"Affected versions of `http-proxy` are vulnerable to a denial of service attack, wherein an attacker can force an error which will cause the server to crash.
+
+
+## Recommendation
+
+Update to version 0.7.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'http-proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.6.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16014'}, {'type': 'WEB', 'url': 'https://github.com/nodejitsu/node-http-proxy/pull/101'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9xw9-pvgv-6p76'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/323'}]","{'cwe_ids': ['CWE-703'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v3vf-2r98-xw8w,2022-09-14T22:51:27Z,2018-11-06T23:17:25Z,,['CVE-2018-1322'],Exposure of Sensitive Information to an Unauthorized Actor in Apache syncope-cope,An administrator with user search entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can recover sensitive security values using the fiql and orderby parameters.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1322'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v3vf-2r98-xw8w'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45400/'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security.html#CVE-2018-1322:_Information_disclosure_via_FIQL_and_ORDER_BY_sorting'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103507'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wg96-3933-j2w5,2023-09-08T23:10:15Z,2018-11-09T17:45:55Z,,['CVE-2017-16017'],Cross-Site Scripting in sanitize-html,"Affected versions of `sanitize-html` are vulnerable to cross-site scripting.
+
+## Proof of Concept:
+
+`
`
+produces the following:
+
+`
`
+This is definitely invalid HTML, but would suggest that it's being interpreted incorrectly by the parser.
+
+
+## Recommendation
+
+Update to version 1.2.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16017'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/pull/20'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg96-3933-j2w5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/155'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5r2p-j47h-mhpg,2023-08-28T12:48:11Z,2018-11-15T15:59:08Z,,['CVE-2018-16471'],Rack vulnerable to Cross-site Scripting,"There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16471'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2018-16471.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/NAalCee8n6o'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4089-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ghgj-3xqr-6jfm,2022-09-14T01:06:27Z,2018-11-09T17:50:00Z,,['CVE-2015-2080'],Jetty vulnerable to exposure of sensitive information to unauthenticated remote users,"The exception handling code in Eclipse Jetty prior to 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.9.v20150224'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.8.v20150217'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2080'}, {'type': 'WEB', 'url': 'https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ghgj-3xqr-6jfm'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190307-0005/'}, {'type': 'WEB', 'url': 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html'}, {'type': 'WEB', 'url': 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00075.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151804.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2015/Mar/12'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/534755/100/1600/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/72768'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1031800'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p639-xxv5-j383,2022-09-14T22:07:19Z,2018-11-21T22:24:08Z,,['CVE-2018-1315'],Incorrect Permission Assignment for Critical Resource in Apache hive,"In Apache Hive 2.1.0 to 2.3.2, when 'COPY FROM FTP' statement is run using HPL/SQL extension to Hive, a compromised/malicious FTP server can cause the file to be written to an arbitrary location on the cluster where the command is run from. This is because FTP client code in HPL/SQL does not verify the destination location of the downloaded file. This does not affect hive cli user and hiveserver2 user as hplsql is a separate command line script and needs to be invoked differently.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1315'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p639-xxv5-j383'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d5da94ef60312c01a8d2348466680d1b5fb70702c71a3e84e94f7933@%3Cdev.hive.apache.org%3E'}]","{'cwe_ids': ['CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9jm3-5835-537m,2023-09-13T19:36:05Z,2018-11-01T14:48:50Z,,['CVE-2018-16462'],Command Injection in apex-publish-static-files,"Versions of `apex-publish-static-files` before 2.0.1 are vulnerable to command injection. This is exploitable if user input is passed into the `connectString` option in the `publish` method.
+
+
+## Recommendation
+
+Update to version 2.0.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'apex-publish-static-files'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16462'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/405694'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9jm3-5835-537m'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/475.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/718'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qw3g-35hc-fcrh,2023-09-12T21:05:41Z,2018-11-09T17:45:38Z,,['CVE-2017-16018'],Cross-Site Scripting (XSS) in restify,"Affected versions of `restify` are susceptible to a cross-site scripting vulnerability when using URL encoded script tags in a non-existent URL.
+
+## Proof of Concept:
+
+Request
+```
+https://localhost:3000/no5_such3_file7.pl?%22%3E%3Cscript%3Ealert(73541);%3C/script%3E
+```
+
+Will be included in response:
+
+``````
+
+
+## Recommendation
+
+Update to version 4.1.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'restify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16018'}, {'type': 'WEB', 'url': 'https://github.com/restify/node-restify/issues/1018'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qw3g-35hc-fcrh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/314'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7xfp-9c55-5vqj,2023-09-12T18:48:46Z,2018-11-09T17:44:01Z,,['CVE-2017-16026'],Remote Memory Exposure in request,"Affected versions of `request` will disclose local system memory to remote systems in certain circumstances. When a multipart request is made, and the type of `body` is `number`, then a buffer of that size will be allocated and sent to the remote server as the body.
+
+## Proof of Concept
+
+```js
+var request = require('request');
+var http = require('http');
+
+var serveFunction = function (req, res){
+ req.on('data', function (data) {
+ console.log(data)
+ });
+ res.end();
+};
+var server = http.createServer(serveFunction);
+server.listen(8000);
+
+request({
+ method: ""POST"",
+ uri: 'http://localhost:8000',
+ multipart: [{body:500}]
+},function(err,res,body){});
+```
+
+
+## Recommendation
+
+Update to version 2.68.0 or later","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.49.0'}, {'fixed': '2.68.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.6'}, {'fixed': '2.68.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.47.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16026'}, {'type': 'WEB', 'url': 'https://github.com/request/request/issues/1904'}, {'type': 'WEB', 'url': 'https://github.com/request/request/pull/2018'}, {'type': 'WEB', 'url': 'https://github.com/request/request/pull/2022'}, {'type': 'WEB', 'url': 'https://github.com/request/request/commit/29d81814bc16bc79cb112b4face8be6fc00061dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/request/request'}]","{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fwx5-5fqj-jv98,2020-08-31T18:18:39Z,2018-11-09T17:46:30Z,,['CVE-2017-16022'],Cross-Site Scripting in morris.js,"Affected versions of `morris.js` are vulnerable to cross-site scripting attacks in labels that appear when hovering over a particular point on a generated graph. The text content of these labels is not escaped, so if control over the labels is obtained, script can be injected. The script will run on the client side whenever that specific graph is loaded.
+
+
+## Recommendation
+
+A patch for this vulnerability was created in 2014, but has still not been published to npm. In order to mitigate this issue effectively, install the library from github via:
+```
+npm i morrisjs/morris.js -s
+```",[],"[{'package': {'ecosystem': 'npm', 'name': 'morris.js'}, 'versions': ['0.5.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16022'}, {'type': 'WEB', 'url': 'https://github.com/morrisjs/morris.js/pull/464'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fwx5-5fqj-jv98'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/307'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mh6f-8j2x-4483,2021-09-15T20:08:26Z,2018-11-26T23:58:21Z,,[],Critical severity vulnerability that affects event-stream and flatmap-stream,"The NPM package `flatmap-stream` is considered malicious. A malicious actor added this package as a dependency to the NPM `event-stream` package in version `3.3.6`. Users of `event-stream` are encouraged to downgrade to the last non-malicious version, `3.3.4`, or upgrade to the latest 4.x version.
+
+Users of `flatmap-stream` are encouraged to remove the dependency entirely.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'event-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.6'}, {'fixed': '4.0.0'}]}], 'versions': ['3.3.6']}, {'package': {'ecosystem': 'npm', 'name': 'flatmap-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dominictarr/event-stream/issues/116'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mh6f-8j2x-4483'}, {'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/event-stream'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vwjj-2852-3765,2023-09-07T18:28:05Z,2018-11-09T17:46:27Z,,['CVE-2017-16015'],Cross-Site Scripting in forms,"Affected versions of `forms` do not properly escape HTML in generated forms, which may result in cross-site scripting.
+
+
+## Recommendation
+
+Update to version 1.3.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'forms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16015'}, {'type': 'WEB', 'url': 'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vwjj-2852-3765'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/158'}]","{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rrfq-g5fq-fc9c,2022-09-14T22:08:31Z,2018-11-21T22:25:04Z,,['CVE-2018-11777'],Improper Authentication in hive:hive-exec,"In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11777'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrfq-g5fq-fc9c'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/963c8e2516405c9b532b4add16c03b2c5db621e0c83e80f45049cbbb@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105886'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f9cm-qmx5-m98h,2023-09-07T20:34:10Z,2018-11-01T14:45:42Z,,['CVE-2018-16469'],Prototype Pollution in merge,"Versions of `merge` before 1.2.1 are vulnerable to prototype pollution. The `merge.recursive` function can be tricked into adding or modifying properties of the Object prototype.
+
+
+## Recommendation
+
+Update to version 1.2.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'merge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16469'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/381194'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f9cm-qmx5-m98h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/722'}]","{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:14Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qr28-7j6p-9hmv,2023-03-27T22:21:10Z,2018-11-09T17:47:45Z,,['CVE-2017-1000042'],Content Injection via TileJSON attribute in mapbox.js,"Versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios.
+
+If `L.mapbox.map` or `L.mapbox.tileLayer` are used to load untrusted TileJSON content from a non-Mapbox URL, it is possible for a malicious user with control over the TileJSON content to inject script content into the ""attribution"" value of the TileJSON which will be executed in the context of the page using Mapbox.js.
+
+
+
+## Recommendation
+
+Version 2.x: Update to version 2.1.7 or later.
+Version 1.x: Update to version 1.6.5 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mapbox-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mapbox-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000042'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/54327'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qr28-7j6p-9hmv'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mapbox-rails/CVE-2017-1000042.yml'}, {'type': 'WEB', 'url': 'https://nodesecurity.io/advisories/49'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/49'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:39Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}"
+1.4.0,GHSA-mwcv-m549-5cm8,2023-09-11T18:23:24Z,2018-11-01T14:47:43Z,,['CVE-2017-16062'],node-tkinter is malware,"The `node-tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-tkinter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16062'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mwcv-m549-5cm8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/501'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mrmf-qwxg-7c3h,2023-09-08T19:51:45Z,2018-11-09T17:48:20Z,,['CVE-2017-16006'],XSS in Data URI in remarkable,"Affected versions of `remarkable` are vulnerable to cross-site scripting. Vulnerable versions of the package allow the use of `data:` URIs in links, and can therefore execute javascript.
+
+
+## Proof of Concept
+
+```markdown
+[link](data:text/html,)
+```
+
+
+## Recommendation
+
+Update to v1.7.0 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16006'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/227'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mrmf-qwxg-7c3h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/319'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-79mx-88w7-8f7q,2021-09-02T21:06:02Z,2018-11-06T23:12:49Z,,['CVE-2014-9772'],XSS Filter Bypass via Encoded URL in validator,"Versions of `validator` prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability.
+
+
+## Proof of Concept
+The xss() function removes the word ""javascript"" when contained inside an attribute.
+
+However, it does not properly handle cases where characters have been hex-encoded.
+
+As a result, it is possible to build an input that bypasses the filter but which the browser will accept as valid JavaScript.
+
+For example:
+```abc```
+will render as:
+```abc```
+
+
+## Recommendation
+
+The package author has decided to remove the xss filter functionality in the latest version of this module. If this feature is not currently being used, you are not affected by the vulnerability. If it is being used, updating to the latest version of the module will break your application.
+
+In order for affected users to mitigate this vulnerability, it is necessary to use an [alternative package](https://www.npmjs.com/search?q=xss%20filter&page=1&ranking=optimal) that provides similar functionality.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772'}, {'type': 'WEB', 'url': 'https://github.com/chriso/validator.js/issues/181'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-79mx-88w7-8f7q'}, {'type': 'PACKAGE', 'url': 'https://github.com/chriso/validator.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/43'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97102'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xc6g-ggrc-qq4r,2023-09-08T23:04:54Z,2018-11-09T17:47:23Z,,['CVE-2017-16016'],Cross-Site Scripting in sanitize-html,"Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`.
+
+## Proof of Concept
+
+```js
+var sanitizeHtml = require('sanitize-html');
+
+var dirty = '!!
+```
+
+
+## Recommendation
+
+Update to version 1.11.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16016'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/issues/100'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xc6g-ggrc-qq4r'}, {'type': 'WEB', 'url': 'https://npmjs.com/package/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/154'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9h9c-f287-c6vp,2022-09-14T22:02:16Z,2018-11-06T23:16:18Z,,['CVE-2018-17184'],Improper Control of Interaction Frequency in Apache syncope-core,"A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected JavaScript code is executed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17184'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9h9c-f287-c6vp'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security#CVE-2018-17184:_Stored_XSS'}]","{'cwe_ids': ['CWE-799'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f89g-whpf-6q9m,2023-09-08T23:59:04Z,2018-11-09T17:46:56Z,,['CVE-2017-16008'],Cross-Site Scripting in i18next,"Affected versions of `i18next` allow untrusted user input to be injected into dictionary key names, resulting in a cross-site scripting vulnerability.
+
+## Proof of Concept
+```js
+var init = i18n.init({debug: true}, function(){
+ var test = i18n.t('__firstName__ __lastName__', {
+ escapeInterpolation: true,
+ firstName: '__lastNameHTML__',
+ lastName: ' Johnson
+```
+
+
+## Recommendation
+
+Update to version 3.4.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'i18next'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16010'}, {'type': 'WEB', 'url': 'https://github.com/i18next/i18next/pull/826'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cmh5-qc8w-xvcq'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/326'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gcr6-rf47-jrgf,2022-04-26T18:14:42Z,2018-07-13T16:01:25Z,,['CVE-2017-2810'],Loaded Databook of Tablib prone to python insertion resulting in command execution,An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tablib'}, 'ecosystem_specific': {'affected_functions': ['tablib.formats.yaml.import_book']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2810'}, {'type': 'WEB', 'url': 'https://github.com/jazzband/tablib/commit/69abfc3ada5d754cb152119c0b4777043657cb6e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jazzband/tablib'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201811-18'}, {'type': 'WEB', 'url': 'https://talosintelligence.com/vulnerability_reports/TALOS-2017-0307'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99076'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:54Z', 'nvd_published_at': '2017-06-14T13:29:00Z'}"
+1.4.0,GHSA-4rvg-955w-h68q,2023-03-01T01:19:07Z,2018-07-26T14:47:40Z,,['CVE-2018-3713'],Path Traversal in angular-http-server,"Affected versions of `angular-http-server` are vulnerable to path traversal allowing a remote attacker to read files from the server that uses `angular-http-server`.
+
+## Recommendation
+
+Update to version 1.6.0 or later.
+
+:exclamation: Note: This was originally thought to be fixed in version 1.4.3, though according to [this issue](https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/issues/117#issuecomment-803872454) the vulnerability was not completely fixed until version 1.6.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'angular-http-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3713'}, {'type': 'WEB', 'url': 'https://github.com/simonh1000/angular-http-server/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/simonh1000/angular-http-server/commit/34d4bd0cd0f00c46db30855a8c4aabae27eb0ac8'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/309120'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4rvg-955w-h68q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/589'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:07Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}"
+1.4.0,GHSA-xcvv-84j5-jw9h,2023-03-01T01:46:49Z,2018-07-26T15:12:31Z,,['CVE-2018-3720'],Prototype Pollution in assign-deep,"Versions of `assign-deep` before 0.4.7 are vulnerable to prototype pollution via merging functions.
+
+
+## Recommendation
+
+Update to version 0.4.7 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'assign-deep'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3720'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310707'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xcvv-84j5-jw9h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/579'}]","{'cwe_ids': ['CWE-1321', 'CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:01Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}"
+1.4.0,GHSA-xq98-5rcf-5wqh,2023-09-14T17:59:38Z,2018-07-24T15:43:02Z,,['CVE-2017-16036'],Directory Traversal in badjs-sourcemap-server,"Affected versions of `badjs-sourcemap-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'badjs-sourcemap-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16036'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/badjs-sourcemap-server'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xq98-5rcf-5wqh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/349'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-488m-6gh8-9j36,2023-09-11T22:24:31Z,2018-07-27T17:05:06Z,,['CVE-2018-3735'],bracket-template vulnerable to reflected XSS,bracket-template suffers from reflected XSS possible when variable passed via GET parameter is used in template,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bracket-template'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3735'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/317125'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-488m-6gh8-9j36'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:50Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}"
+1.4.0,GHSA-q4v7-4rhw-9hqm,2021-06-23T15:41:17Z,2018-07-18T18:27:56Z,,['CVE-2017-5941'],Code Execution through IIFE in node-serialize,"Affected versions of `node-serialize` can be abused to execute arbitrary code via an [immediately invoked function expression](https://en.wikipedia.org/wiki/Immediately-invoked_function_expression) (IIFE) if untrusted user input is passed into `unserialize()`.
+
+
+## Recommendation
+
+There is no direct patch for this issue. The package author has reviewed this advisory, and provided the following recommendation:
+
+```
+To avoid the security issues, at least one of the following methods should be taken:
+
+1. Make sure to send serialized strings internally, isolating them from potential hackers. For example, only sending the strings from backend to fronend and always using HTTPS instead of HTTP.
+
+2. Introduce public-key cryptosystems (e.g. RSA) to ensure the strings not being tampered with.
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-serialize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5941'}, {'type': 'WEB', 'url': 'https://github.com/luin/serialize/issues/4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q4v7-4rhw-9hqm'}, {'type': 'WEB', 'url': 'https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/311'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/161356/Node.JS-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163222/Node.JS-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96225'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:00Z', 'nvd_published_at': '2017-02-09T19:59:00Z'}"
+1.4.0,GHSA-3r8f-gphx-9m2c,2023-01-31T01:38:47Z,2018-07-27T17:04:16Z,,['CVE-2018-3730'],Path Traversal in mcstatic,"All versions of `mcstatic` are vulnerable to path traversal.
+
+
+## Recommendation
+
+No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mcstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3730'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/312907'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3r8f-gphx-9m2c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/641'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:02Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}"
+1.4.0,GHSA-7pgq-hhq9-9r27,2023-09-12T19:33:19Z,2018-07-23T20:48:38Z,,['CVE-2017-16141'],Directory Traversal in lab6drewfusbyu,"Affected versions of `lab6drewfusbyu` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'lab6drewfusbyu'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16141'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6drewfusbyu'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7pgq-hhq9-9r27'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/474'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7vq3-wcjw-3fxh,2023-09-11T16:35:29Z,2018-07-23T20:48:53Z,,['CVE-2017-16140'],Directory Traversal in lab6.brit95,"Affected versions of `lab6.brit95` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'lab6.brit95'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16140'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6.brit95'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7vq3-wcjw-3fxh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/475'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hqw4-8893-j4h7,2023-09-11T16:36:04Z,2018-07-23T20:49:28Z,,['CVE-2017-16132'],Directory Traversal in simple-npm-registry,"Affected versions of `simple-npm-registry` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'simple-npm-registry'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16132'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hqw4-8893-j4h7'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/452'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-79p8-4cwq-rhqh,2023-09-05T23:24:25Z,2018-07-23T20:40:07Z,,['CVE-2017-16210'],Directory Traversal in jn_jj_server,"Affected versions of `jn_jj_server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jn_jj_server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16210'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jn_jj_server'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-79p8-4cwq-rhqh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/424'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hxxf-q3w9-4xgw,2021-09-14T17:35:41Z,2018-07-12T19:52:02Z,,[],Malicious Package in eslint-scope,"Version 3.7.2 of `eslint-scope` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to 2 remote servers.
+
+
+## Recommendation
+
+The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'eslint-scope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.2'}, {'fixed': '3.7.3'}]}], 'versions': ['3.7.2']}, {'package': {'ecosystem': 'npm', 'name': 'eslint-config-eslint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.2'}, {'fixed': '6.0.0'}]}], 'versions': ['5.0.2']}]","[{'type': 'WEB', 'url': 'https://github.com/eslint/eslint-scope/issues/39'}, {'type': 'WEB', 'url': 'https://eslint.org/blog/2018/07/postmortem-for-malicious-package-publishes'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hxxf-q3w9-4xgw'}, {'type': 'PACKAGE', 'url': 'https://github.com/eslint/eslint-scope'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ESLINTSCOPE-11120'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/673'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xcp8-hh74-f6mc,2023-08-08T10:16:55Z,2018-07-13T15:16:45Z,,['CVE-2017-2592'],oslo.middleware Information Disclosure vulnerability,"python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'oslo.middleware'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.19.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'oslo.middleware'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'oslo.middleware'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.20.0'}, {'fixed': '3.23.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2592'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0300'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0435'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystonemiddleware/+bug/1628031'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2592'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xcp8-hh74-f6mc'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/oslo-middleware/PYSEC-2018-104.yaml'}, {'type': 'WEB', 'url': 'https://review.openstack.org/#/c/425730/'}, {'type': 'WEB', 'url': 'https://review.openstack.org/#/c/425732/'}, {'type': 'WEB', 'url': 'https://review.openstack.org/#/c/425734/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3666-1/'}, {'type': 'WEB', 'url': 'http://lists.openstack.org/pipermail/openstack-announce/2017-January/002002.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0300.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0435.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95827'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:55Z', 'nvd_published_at': '2018-05-08T17:29:00Z'}"
+1.4.0,GHSA-p7xc-35m8-57pr,2022-04-26T18:14:01Z,2018-07-13T15:17:14Z,,['CVE-2017-1000001'],FedMsg not properly completing message validation,FedMsg 0.18.1 and older is vulnerable to a message validation flaw resulting in message validation not being enabled if configured to be on.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'FedMsg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000001'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p7xc-35m8-57pr'}, {'type': 'PACKAGE', 'url': 'https://github.com/fedora-infra/fedmsg'}, {'type': 'WEB', 'url': 'https://github.com/fedora-infra/fedmsg/blob/0.18.2/CHANGELOG.rst'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-23vf-5g53-hm9q,2023-09-06T20:10:43Z,2018-07-24T14:57:31Z,,['CVE-2017-16084'],Directory Traversal in list-n-stream,"Affected versions of `list-n-stream` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+Update to version 0.0.11 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'list-n-stream'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16084'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/list-n-stream'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-23vf-5g53-hm9q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/344'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f7jg-mcvw-9gwv,2023-09-11T23:12:52Z,2018-07-23T20:40:40Z,,['CVE-2017-16188'],Directory Traversal in reecerver,"Affected versions of `reecerver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'reecerver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16188'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/reecerver'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f7jg-mcvw-9gwv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/443'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qmjg-g86h-6rc9,2023-09-11T18:24:05Z,2018-07-23T21:00:28Z,,['CVE-2017-16044'],d3.js is malware,"The `d3.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'd3.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16044'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qmjg-g86h-6rc9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/497'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pq3x-96c3-xgjg,2020-06-16T21:49:46Z,2018-07-23T19:50:29Z,,['CVE-2009-0662'],Moderate severity vulnerability that affects Products.PlonePAS,"The PlonePAS product 3.x before 3.9 and 3.2.x before 3.2.2, a product for Plone, does not properly handle the login form, which allows remote authenticated users to acquire the identity of an arbitrary user via unspecified vectors.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Products.PlonePAS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3'}, {'fixed': '3.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-0662'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/50061'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pq3x-96c3-xgjg'}, {'type': 'WEB', 'url': 'http://osvdb.org/53975'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone/security/advisories/cve-2009-0662'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/34840'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/34664'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g7j3-p357-cw8p,2023-09-13T20:24:14Z,2018-07-24T16:29:12Z,,['CVE-2017-16038'],Directory Traversal in f2e-server,"Affected versions of `f2e-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+Update to version 1.12.12 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'f2e-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.12.11'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16038'}, {'type': 'WEB', 'url': 'https://github.com/shy2850/node-server/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/shy2850/node-server/pull/12/files'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g7j3-p357-cw8p'}, {'type': 'PACKAGE', 'url': 'https://github.com/shy2850/node-server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/346'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8hj4-w233-g35q,2021-01-08T19:09:27Z,2018-07-31T22:47:16Z,,['CVE-2016-10697'],Downloads Resources over HTTP in react-native-baidu-voice-synthesizer,"Affected versions of `react-native-baidu-voice-synthesizer` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `react-native-baidu-voice-synthesizer`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'react-native-baidu-voice-synthesizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10697'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8hj4-w233-g35q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/302'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9g9w-hmvj-5h57,2023-09-07T18:19:34Z,2018-07-26T15:17:15Z,,['CVE-2018-3722'],Prototype Pollution in merge-deep,"Versions of `merge-deep` before 3.0.1 are vulnerable to prototype pollution via merging functions.
+
+
+## Recommendation
+
+Update to version 3.0.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'merge-deep'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3722'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310708'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9g9w-hmvj-5h57'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/580'}]","{'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6fcq-3cm2-j3j5,2023-07-31T20:51:51Z,2018-07-23T19:50:11Z,,['CVE-2014-5001'],Kcapifony gem for Ruby places database user passwords on the command line,"`lib/ksymfony1.rb` in the kcapifony gem 2.1.6 for Ruby places database user passwords on the (1) `mysqldump`, (2) `pg_dump`, (3) `mysql`, and (4) `psql` command lines, which allows local users to obtain sensitive information by listing the processes.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'kcapifony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5001'}, {'type': 'PACKAGE', 'url': 'https://github.com/Kunstmaan/kCapifony'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kcapifony/CVE-2014-5001.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/21'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/kcapifony-2.1.6.html'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jrhj-2j3q-xf3v,2023-01-31T01:51:10Z,2018-07-26T15:03:30Z,,['CVE-2018-3716'],Stored Cross-Site Scripting in simplehttpserver,Simplehttpserver prior to version 0.1.0 are vulnerable to stored cross-site scripting (XSS). To be exploited an attacker needs to control the filename of a file that is used in the directory listing output. This version is patched in 0.1.0,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'simplehttpserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3716'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/309648'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jrhj-2j3q-xf3v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/585'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:08Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}"
+1.4.0,GHSA-wv2f-3rxv-jqhp,2023-09-07T22:28:13Z,2018-07-26T15:21:04Z,,['CVE-2018-3724'],Path Traversal in general-file-server,"All versions of `general-file-server` are vulnerable to path traversal.
+
+
+## Recommendation
+
+No fix is currently available for this vulnerability. It is our recommendation to not use this module until a fix has been provided.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'general-file-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3724'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310943'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wv2f-3rxv-jqhp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/592'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ccmq-qvcp-5mrm,2023-08-23T21:53:02Z,2018-07-13T16:01:12Z,,['CVE-2017-16618'],Unsafe deserialization in owlmixin,"An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A ""Load YAML"" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'owlmixin'}, 'ecosystem_specific': {'affected_functions': ['owlmixin.util.load_yaml', 'owlmixin.util.load_yamlf']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16618'}, {'type': 'WEB', 'url': 'https://github.com/tadashi-aikawa/owlmixin/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/tadashi-aikawa/owlmixin/commit/5d0575303f6df869a515ced4285f24ba721e0d4e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ccmq-qvcp-5mrm'}, {'type': 'PACKAGE', 'url': 'https://github.com/tadashi-aikawa/owlmixin'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16618-convert-through-owlmixin/'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pf6m-fxpq-fg8v,2023-07-03T23:57:14Z,2018-07-31T18:21:29Z,,['CVE-2017-5029'],Nokogiri implementation of libxslt lacks integer overflow checks,"The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Nokogiri prior to 1.7.2, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5029'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1634'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pf6m-fxpq-fg8v'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-5029.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://ubuntu.com/security/CVE-2017-5029'}, {'type': 'WEB', 'url': 'https://ubuntu.com/security/notices/USN-3271-1'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:58Z', 'nvd_published_at': '2017-04-24T23:59:00Z'}"
+1.4.0,GHSA-776r-w3v9-96mv,2023-09-11T19:01:01Z,2018-07-23T20:46:16Z,,['CVE-2017-16157'],Directory Traversal in censorify.tanisjr,"Affected versions of `censorify.tanisjr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'censorify.tanisjr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16157'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/censorify.tanisjr'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-776r-w3v9-96mv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/392'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j38m-7q52-fgfh,2023-09-05T23:28:26Z,2018-07-23T23:33:42Z,,['CVE-2017-16124'],Directory Traversal in node-server-forfront,"Affected versions of `node-server-forfront` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'node-server-forfront'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16124'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-server-forfront'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j38m-7q52-fgfh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/382'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6m53-c78q-7qmg,2022-04-26T18:21:25Z,2018-07-31T18:18:19Z,,['CVE-2018-14505'],Mitmweb in mitmproxy allows DNS Rebinding attacks,"mitmweb in mitmproxy before v4.0.4 allows DNS Rebinding attacks, related to tools/web/app.py.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mitmproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14505'}, {'type': 'WEB', 'url': 'https://github.com/mitmproxy/mitmproxy/issues/3234'}, {'type': 'WEB', 'url': 'https://github.com/mitmproxy/mitmproxy/pull/3243'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6m53-c78q-7qmg'}, {'type': 'PACKAGE', 'url': 'https://github.com/mitmproxy/mitmproxy'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x6wp-rfwh-hcx7,2023-09-08T19:20:36Z,2018-07-24T19:55:05Z,,['CVE-2017-16111'],Regular Expression Denial of Service in content,"Affected versions of `content` are vulnerable to a regular expression denial of service when parsing malicious `Content-Type` and `Content-Disposition` headers.
+
+
+## Recommendation
+
+Update to version 3.0.6 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'content'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16111'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x6wp-rfwh-hcx7'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/530'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gfv4-2vhm-486m,2023-09-07T18:21:29Z,2018-07-23T20:50:10Z,,['CVE-2017-16052'],node-fabric is malware,"The `node-fabric` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-fabric'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16052'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gfv4-2vhm-486m'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/489'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q5c4-39f5-m68j,2023-09-08T20:01:42Z,2018-07-24T20:00:17Z,,['CVE-2017-16023'],Regular Expression Denial of Service in decamelize,"Affected versions of `decamelize` are susceptible to a denial of service vulnerability when user input is passed directly into `decamelize`.
+
+
+
+
+## Recommendation
+
+Update to version 1.1.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'decamelize'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16023'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/decamelize/issues/5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q5c4-39f5-m68j'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/308'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r38r-qp28-2m63,2023-08-23T22:21:00Z,2018-07-26T16:08:49Z,,['CVE-2014-3539'],Code injection in rope,base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'rope'}, 'ecosystem_specific': {'affected_functions': ['rope.base.oi.doa._SocketReceiver.__init__', 'rope.base.oi.doa._SocketReceiver.get_send_info', 'rope.base.oi.doa._SocketReceiver.receive_data', 'rope.base.oi.runmod._SocketSender.__init__', 'rope.base.oi.runmod._SocketSender.send_data', 'rope.base.oi.runmod._FunctionCallDataSender.__init__']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3539'}, {'type': 'WEB', 'url': 'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1116485'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-rope/rope'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/02/07/1'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rwv8-jvff-jq28,2023-01-31T01:37:12Z,2018-07-18T21:20:30Z,,['CVE-2018-3731'],Path Traversal in public,"Versions of `public` before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user.
+
+
+## Recommendation
+
+Update to version 0.1.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'public'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3731'}, {'type': 'WEB', 'url': 'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/312918'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rwv8-jvff-jq28'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/571'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:15Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}"
+1.4.0,GHSA-6w83-22gj-5pv9,2023-09-11T23:13:33Z,2018-07-27T14:06:00Z,,['CVE-2017-16093'],Directory Traversal in cyber-js,"Affected versions of `cyber-js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'cyber-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16093'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cyber-js'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6w83-22gj-5pv9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/347'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cgqv-x5cx-xvqh,2020-08-31T18:12:18Z,2018-07-26T16:22:08Z,,['CVE-2016-10546'],Arbitrary Code Injection in pouchdb,"Affected versions of `pouchdb` do not properly sandbox the code execution engine which executes the map/reduce functions for temporary views and design documents. Under certain circumstances, an attacker could uses this to run arbitrary code on the server.
+
+
+## Recommendation
+
+Update to version 6.0.5 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'pouchdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10546'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cgqv-x5cx-xvqh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/143'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jcw8-r9xm-32c6,2020-08-31T18:26:20Z,2018-07-18T18:28:02Z,,['CVE-2017-16100'],Command Injection in dns-sync,"Affected versions of `dns-sync` have an arbitrary command execution vulnerability in the `resolve()` method.
+
+
+
+## Recommendation
+
+- Use an alternative dns resolver
+- Do not allow untrusted input into `dns-sync.resolve()`",[],"[{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16100'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/issues/1)'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)))'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jcw8-r9xm-32c6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/153'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/523'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2xvj-j3qh-x8c3,2023-08-25T21:42:19Z,2018-07-31T18:13:05Z,,['CVE-2018-3759'],private_address_check contains race condition,The private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'private_address_check'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3759'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2xvj-j3qh-x8c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/jtdowney/private_address_check'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/private_address_check/CVE-2018-3759.yml'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qx2f-477c-35rq,2023-09-11T18:24:36Z,2018-07-24T20:06:04Z,,['CVE-2017-16136'],method-override ReDoS when untrusted user input passed into X-HTTP-Method-Override header,"Affected versions of `method-override` are vulnerable to a regular expression denial of service vulnerability when untrusted user input is passed into the `X-HTTP-Method-Override` header.
+
+
+## Recommendation
+
+Update to version 2.3.10 or later","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'method-override'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.2'}, {'fixed': '2.3.10'}]}], 'versions': ['1.0.2']}, {'package': {'ecosystem': 'npm', 'name': 'method-override'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16136'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/method-override/commit/4c58835a61fdf7a8e070d6f8ecd5379a961d0987'}, {'type': 'PACKAGE', 'url': 'https://github.com/expressjs/method-override'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/538'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wrvr-8mpx-r7pp,2023-09-12T18:28:52Z,2018-07-20T16:20:52Z,,['CVE-2017-16138'],mime Regular Expression Denial of Service when MIME lookup performed on untrusted user input,"Affected versions of `mime` are vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
+
+
+## Recommendation
+
+Update to version 2.0.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mime'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mime'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16138'}, {'type': 'WEB', 'url': 'https://github.com/broofa/node-mime/issues/167'}, {'type': 'WEB', 'url': 'https://github.com/broofa/mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0'}, {'type': 'WEB', 'url': 'https://github.com/broofa/mime/commit/855d0c4b8b22e4a80b9401a81f2872058eae274d'}, {'type': 'PACKAGE', 'url': 'https://github.com/broofa/mime'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3grc-fgh6-g5gp,2023-09-07T18:36:24Z,2018-07-23T22:08:39Z,,['CVE-2017-16134'],Directory Traversal in http_static_simple,"Affected versions of `http_static_simple` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'http_static_simple'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16134'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/http_static_simple'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3grc-fgh6-g5gp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/472'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5mc5-5j6c-qmf9,2021-09-01T22:16:38Z,2018-07-13T16:01:01Z,,['CVE-2017-7235'],High severity vulnerability that affects cfscrape,An issue was discovered in cloudflare-scrape 1.6.6 through 1.7.1. A malicious website owner could craft a page that executes arbitrary Python code against any cfscrape user who scrapes that website. This is fixed in 1.8.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'cfscrape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.6'}, {'fixed': '1.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7235'}, {'type': 'WEB', 'url': 'https://github.com/Anorov/cloudflare-scrape/issues/97'}, {'type': 'PACKAGE', 'url': 'https://github.com/Anorov/cloudflare-scrape'}, {'type': 'WEB', 'url': 'https://github.com/Anorov/cloudflare-scrape/releases/tag/1.8.0'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5mc5-5j6c-qmf9'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97191'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4vfj-c2xf-8r48,2023-09-05T22:26:53Z,2018-07-23T20:45:20Z,,['CVE-2017-16169'],Directory Traversal in looppake,"Affected versions of `looppake` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'looppake'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16169'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/looppake'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4vfj-c2xf-8r48'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/412'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5j2h-h5hg-3wf8,2020-06-16T21:16:24Z,2018-07-23T19:51:10Z,,['CVE-2011-0696'],Moderate severity vulnerability that affects django,"Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a ""combination of browser plugins and redirects,"" a related issue to CVE-2011-0447.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0696'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=676357'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5j2h-h5hg-3wf8'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/02/09/6'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43230'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43297'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43382'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43426'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2163'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2011/feb/08/security/'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/46296'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1066-1'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0372'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0388'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0429'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0439'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0441'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cr6c-85fh-cqpg,2021-09-09T20:49:32Z,2018-07-31T22:27:04Z,,['CVE-2016-10692'],Downloads Resources over HTTP in haxeshim,"Affected versions of `haxeshim` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxeshim`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'haxeshim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10692'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cr6c-85fh-cqpg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/300'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ff6r-5jwm-8292,2023-09-11T21:52:22Z,2018-07-24T19:51:16Z,,['CVE-2017-16099'],Regular Expression Denial of Service in no-case,"Affected versions of `no-case` are vulnerable to a regular expression denial of service when parsing untrusted user input.
+
+
+## Recommendation
+
+Update to version 2.3.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'no-case'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16099'}, {'type': 'WEB', 'url': 'https://github.com/blakeembrey/no-case/issues/17'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ff6r-5jwm-8292'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/529'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7wph-fc4w-wqp2,2021-09-03T21:46:38Z,2018-07-23T19:51:59Z,,['CVE-2010-4535'],Moderate severity vulnerability that affects django,"The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-4535'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=665373'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7wph-fc4w-wqp2'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'http://code.djangoproject.com/changeset/15032'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42715'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42827'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42913'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2010/dec/22/security/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2010/12/23/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/01/03/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/45563'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1040-1'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0048'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0098'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p6h9-gw49-rqm4,2022-05-25T13:56:11Z,2018-07-12T20:29:21Z,,['CVE-2018-5773'],markdown2 is vulnerable to cross-site scripting,"An issue was discovered in `markdown2` (aka python-markdown2) through 2.3.5. The `safe_mode` feature, which is supposed to sanitize user input against XSS, is flawed and does not escape the input properly. With a crafted payload, XSS can be triggered, as demonstrated by omitting the final `>` character from an IMG tag.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5773'}, {'type': 'WEB', 'url': 'https://github.com/google/osv/issues/430'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/issues/285'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/pull/303'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p6h9-gw49-rqm4'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/python-markdown2'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/blob/master/CHANGES.md#python-markdown2-236'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-924m-4pmx-c67h,2023-03-31T14:51:18Z,2018-07-13T16:01:17Z,,['CVE-2017-1000433'],pysaml2 Improper Authentication vulnerability,pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000433'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/issues/451'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/pull/454'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/6312a41e037954850867f29d329e5007df1424a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rohe/pysaml2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201801-11'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:01Z', 'nvd_published_at': '2018-01-02T23:29:00Z'}"
+1.4.0,GHSA-mpcf-4gmh-23w8,2023-09-11T22:05:14Z,2018-07-24T20:16:30Z,,['CVE-2017-16118'],Regular Expression Denial of Service in forwarded,"Affected versions of `forwarded` are vulnerable to regular expression denial of service when parsing specially crafted user input.
+
+
+## Recommendation
+
+Update to version 0.1.2 or later","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'forwarded'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16118'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mpcf-4gmh-23w8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/527'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104427'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wc9v-mj63-m9g5,2023-09-11T18:31:10Z,2018-07-24T19:44:42Z,,['CVE-2017-16082'],Remote Code Execution in pg,"Affected versions of `pg` contain a remote code execution vulnerability that occurs when the remote database or query specifies a crafted column name.
+
+There are two specific scenarios in which it is likely for an application to be vulnerable:
+1. The application executes unsafe, user-supplied sql which contains malicious column names.
+2. The application connects to an untrusted database and executes a query returning results which contain a malicious column name.
+
+## Proof of Concept
+```
+const { Client } = require('pg')
+const client = new Client()
+client.connect()
+
+const sql = `SELECT 1 AS ""\\'/*"", 2 AS ""\\'*/\n + console.log(process.env)] = null;\n//""`
+
+client.query(sql, (err, res) => {
+ client.end()
+})
+```
+
+
+## Recommendation
+
+* Version 2.x.x: Update to version 2.11.2 or later.
+* Version 3.x.x: Update to version 3.6.4 or later.
+* Version 4.x.x: Update to version 4.5.7 or later.
+* Version 5.x.x: Update to version 5.2.1 or later.
+* Version 6.x.x: Update to version 6.4.2 or later. ( Note that versions 6.1.6, 6.2.5, and 6.3.3 are also patched. )
+* Version 7.x.x: Update to version 7.1.2 or later. ( Note that version 7.0.2 is also patched. )","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.6.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16082'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wc9v-mj63-m9g5'}, {'type': 'WEB', 'url': 'https://node-postgres.com/announcements#2017-08-12-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/521'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6cwv-x26c-w2q4,2022-04-26T18:05:03Z,2018-07-12T12:00:00Z,,['CVE-2018-8768'],"Jupyter Notebook file bypasses sanitization, executes JavaScript","In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8768'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2018/03/15/2'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p7c9-jqhq-vr3v,2023-03-01T01:36:36Z,2018-07-27T17:03:46Z,,['CVE-2018-3770'],Remote Code Execution in markdown-pdf,"Versions of `markdown-pdf` prior to 9.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize HTML code in markdown files. If markdown files with malicious HTML are converted to PDF, the resulting PDF file will execute any JavaScript code in the original markdown file. This may allow attackers to execute Remote Code.
+
+
+## Recommendation
+
+Upgrade to version 9.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'markdown-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3770'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/360727'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p7c9-jqhq-vr3v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/991'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:26Z', 'nvd_published_at': '2018-07-20T22:29:00Z'}"
+1.4.0,GHSA-fxpg-gg9g-76gj,2021-09-10T20:17:17Z,2018-07-23T19:52:42Z,,['CVE-2010-3082'],Moderate severity vulnerability that affects django,Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3082'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/7f84657b6b2243cc787bdb9f296710c8d13ad0bd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=632239'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/61729'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fxpg-gg9g-76gj'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'http://marc.info/?l=oss-security&m=128403961700444&w=2'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2010/sep/08/security-release/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/43116'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1004-1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j5mg-fpq8-vvxv,2023-09-07T18:25:38Z,2018-07-23T20:48:14Z,,['CVE-2017-16143'],Directory Traversal in commentapp.stetsonwood,"Affected versions of `commentapp.stetsonwood` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'commentapp.stetsonwood'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16143'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/commentapp.stetsonwood'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j5mg-fpq8-vvxv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/470'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-48vv-2pmq-9fvv,2021-08-31T21:48:47Z,2018-07-23T19:51:14Z,,['CVE-2012-6661'],Moderate severity vulnerability that affects Plone and Zope2,"Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Zope2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.2'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3a1'}, {'fixed': '4.3b1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3a2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6661'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/zope2/+bug/1071067'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-48vv-2pmq-9fvv'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Products.CMFPlone'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121124'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/security/advisories/20121106/24'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/11/10/1'}]","{'cwe_ids': ['CWE-336'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rrfc-g2gh-xvjm,2023-09-11T23:12:18Z,2018-07-23T20:46:07Z,,['CVE-2017-16162'],Directory Traversal in 22lixian,"Affected versions of `22lixian` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '22lixian'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16162'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/22lixian'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrfc-g2gh-xvjm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/390'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-23wc-v4mf-x7v4,2023-09-07T22:48:16Z,2018-07-23T20:44:45Z,,['CVE-2017-16178'],Directory Traversal in intsol-package,"`intsol-package` is a file server.
+
+`intsol-package` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing ""../"" in the url.
+
+**Example Request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:localhost
+```
+and the server's Response
+
+```http
+HTTP/1.1 200 OK
+Date: Thu, 04 May 2017 23:59:18 GMT
+Connection: keep-alive
+Transfer-Encoding: chunked
+
+{contents of /etc/passwd}
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'intsol-package'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16178'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/intsol-package'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-23wc-v4mf-x7v4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/461'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qmhf-qg6f-pc4v,2023-09-12T21:23:21Z,2018-07-23T20:39:51Z,,['CVE-2017-16217'],Directory Traversal in fbr-client,"Affected versions of `fbr-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'fbr-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16217'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/fbr-client'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qmhf-qg6f-pc4v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/449'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-prr5-pfr8-q9f3,2021-09-16T19:14:17Z,2018-07-23T19:52:35Z,,['CVE-2012-5503'],Moderate severity vulnerability that affects Plone,ftp.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read hidden folder contents via unspecified vectors.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3a1'}, {'fixed': '4.3b1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3a2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5503'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-prr5-pfr8-q9f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Products.CMFPlone'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/security/advisories/20121106/19'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/11/10/1'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8xjv-v9xq-m5h9,2023-09-05T09:23:16Z,2018-07-24T20:15:36Z,,['CVE-2016-0775'],Pillow Buffer overflow in ImagingFliDecode,Buffer overflow in the `ImagingFliDecode` function in `libImaging/FliDecode.c` in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0775'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8xjv-v9xq-m5h9'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-52'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3499'}]","{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x5pg-88wf-qq4p,2023-09-07T22:11:27Z,2018-07-24T20:10:52Z,,['CVE-2017-16114'],Regular Expression Denial of Service in marked,"Affected versions of `marked` are vulnerable to a regular expression denial of service.
+
+The amplification in this vulnerability is significant, with 1,000 characters resulting in the event loop being blocked for around 6 seconds.
+
+
+## Recommendation
+
+Update to version 0.3.9 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16114'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/937'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x5pg-88wf-qq4p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/531'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jpjp-vxv6-59hm,2023-09-11T23:12:30Z,2018-07-23T20:41:11Z,,['CVE-2017-16187'],Directory Traversal in open-device,"Affected versions of `open-device` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'open-device'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16187'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/open-device'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jpjp-vxv6-59hm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/447'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-32pc-xphx-q4f6,2022-04-26T18:06:43Z,2018-07-12T20:30:49Z,,['CVE-2018-1000164'],Gunicorn contains Improper Neutralization of CRLF sequences in HTTP headers,"gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in ""process_headers"" function in ""gunicorn/http/wsgi.py"" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'gunicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000164'}, {'type': 'WEB', 'url': 'https://github.com/benoitc/gunicorn/issues/1227'}, {'type': 'WEB', 'url': 'https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-32pc-xphx-q4f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/benoitc/gunicorn'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4022-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4186'}]","{'cwe_ids': ['CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-884w-698f-927f,2023-09-11T22:41:23Z,2018-07-27T17:06:50Z,,['CVE-2018-1002203'],Arbitrary File Write via Archive Extraction in unzipper,"Versions of `unzipper` before 0.8.13 are vulnerable to arbitrary file write when used to extract a specifically crafted archive that contains path traversal filenames (`../../file.txt` for example).
+
+
+## Recommendation
+
+Update to version 0.3.18 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'unzipper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002203'}, {'type': 'WEB', 'url': 'https://github.com/ZJONSSON/node-unzipper/pull/59'}, {'type': 'WEB', 'url': 'https://github.com/ZJONSSON/node-unzipper/commit/2220ddd5b58f6252069a4f99f9475441ad0b50cd'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/362119'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-884w-698f-927f'}, {'type': 'WEB', 'url': 'https://github.com/snyk/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:unzipper:20180415'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/680'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-232r-66cg-79px,2023-08-07T15:45:44Z,2018-07-12T20:29:30Z,,['CVE-2018-7750'],Paramiko not properly checking authentication before processing other requests,"transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}], 'versions': ['2.4.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.18.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7750'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/issues/1175'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/commit/e9dfd854bdaf8af15d7834f7502a0451d217bb8c'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0591'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0646'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1124'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1125'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1213'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1274'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1328'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1525'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1972'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-232r-66cg-79px'}, {'type': 'PACKAGE', 'url': 'https://github.com/paramiko/paramiko'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/blob/e861c7697622774071ce73b46ffe8817eacdedfa/sites/www/changelog.rst?plain=1#L759-L763'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3603-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3603-2/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20190831123128/http://www.securityfocus.com/bid/103713'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45712/'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:50:58Z', 'nvd_published_at': '2018-03-13T18:29:00Z'}"
+1.4.0,GHSA-w4vg-rf63-f3j3,2022-04-26T18:06:19Z,2018-07-12T14:45:42Z,,['CVE-2016-9190'],"Arbitrary code using ""crafted image file"" approach affecting Pillow","Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the ""crafted image file"" approach, related to an ""Insecure Sign Extension"" issue affecting the ImagingNew in Storage.c component.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9190'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/2105'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w4vg-rf63-f3j3'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-52'}, {'type': 'WEB', 'url': 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3710'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94234'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pmg9-p9r2-6q87,2021-01-08T18:20:33Z,2018-07-24T19:46:37Z,,['CVE-2017-16086'],ReDoS via long UserAgent header in ua-parser,"Affected versions of `ua-parser` are vulnerable to regular expression denial of service when given a specially crafted `User-Agent` header.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different, functionally equivalent package such as [useragent](https://www.npmjs.com/package/useragent).",[],"[{'package': {'ecosystem': 'npm', 'name': 'ua-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16086'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pmg9-p9r2-6q87'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/316'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5jg5-w395-9684,2023-09-11T19:00:46Z,2018-07-23T20:39:59Z,,['CVE-2017-16212'],Directory Traversal in ltt,"Affected versions of `ltt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ltt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16212'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5jg5-w395-9684'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/422'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pr49-5hhf-6mm6,2023-09-08T23:29:43Z,2018-07-23T20:44:34Z,,['CVE-2017-16180'],Directory Traversal in serverabc,"Affected versions of `serverabc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serverabc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16180'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverabc'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pr49-5hhf-6mm6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/459'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h8mc-42c3-r72p,2023-09-06T20:06:02Z,2018-07-24T15:40:47Z,,['CVE-2017-16035'],hubl-server downloads resources over HTTP,"Affected versions of `hubl-server` insecurely download dependencies over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the responses and replace the dependencies with malicious ones, resulting in code execution on the system running `hubl-server`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability, and it has not seen any updates since 2015.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo",[],"[{'package': {'ecosystem': 'npm', 'name': 'hubl-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16035'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h8mc-42c3-r72p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/334'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3c48-6pcv-88rm,2023-09-11T16:16:25Z,2018-07-27T17:05:27Z,,['CVE-2018-1999024'],Macro in MathJax running untrusted Javascript within a web browser,MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the `\unicode{}` macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mathjax'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024'}, {'type': 'WEB', 'url': 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}, {'type': 'WEB', 'url': 'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3c48-6pcv-88rm'}, {'type': 'PACKAGE', 'url': 'https://github.com/mathjax/MathJax'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w4pv-w56c-mg4v,2023-01-31T01:40:33Z,2018-07-18T21:20:15Z,,['CVE-2018-3734'],Path Traversal in stattic,"Versions of `stattic` before 0.3.0 are vulnerable to path traversal allowing a remote attacker to read arbitrary files with any extension from the server that users `stattic`.
+
+
+## Recommendation
+
+Update to version 0.3.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'stattic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3734'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319003'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w4pv-w56c-mg4v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/591'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:29Z', 'nvd_published_at': '2018-05-29T20:29:00Z'}"
+1.4.0,GHSA-2gjg-5x33-mmp2,2023-03-01T01:47:01Z,2018-07-25T22:44:05Z,,['CVE-2018-3729'],Path Traversal in localhost-now,"Versions of `localhost-now` before 1.0.2 are vulnerable to path traversal. This allows a remote attacker to read the content of an arbitrary file.
+
+
+## Recommendation
+
+Update to version 1.0.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'localhost-now'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3729'}, {'type': 'WEB', 'url': 'https://github.com/DCKT/localhost-now/commit/30b004c7f145d677df8800a106c2edc982313995#diff-b9cfc7f2cdf78a7f4b91a753d10865a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/312889'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2gjg-5x33-mmp2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/582'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:01Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}"
+1.4.0,GHSA-7g9h-c88w-r7h2,2020-06-16T21:22:48Z,2018-07-23T19:52:31Z,,['CVE-2011-0698'],High severity vulnerability that affects django,"Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0698'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7g9h-c88w-r7h2'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/02/09/6'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43230'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2011/feb/08/security/'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/46296'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0372'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0439'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-94x5-94wf-m445,2023-09-11T23:14:13Z,2018-07-24T15:48:38Z,,['CVE-2017-16037'],Directory Traversal in gomeplus-h5-proxy,"Affected versions of `gomeplus-h5-proxy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'gomeplus-h5-proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16037'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-94x5-94wf-m445'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/350'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fwr5-q9rx-294f,2021-09-10T20:11:19Z,2018-07-23T19:51:40Z,,['CVE-2010-4534'],Moderate severity vulnerability that affects django,"The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-4534'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=665373'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fwr5-q9rx-294f'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html'}, {'type': 'WEB', 'url': 'http://code.djangoproject.com/changeset/15031'}, {'type': 'WEB', 'url': 'http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html'}, {'type': 'WEB', 'url': 'http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42715'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42827'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42913'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2010/dec/22/security/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2010/12/23/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/01/03/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/515446'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/45562'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1040-1'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0048'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0098'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6528-wvf6-f6qg,2022-04-26T18:13:29Z,2018-07-12T20:29:26Z,,['CVE-2018-6594'],Pycrypto generates weak key parameters,"lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pycrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6594'}, {'type': 'WEB', 'url': 'https://github.com/dlitz/pycrypto/issues/253'}, {'type': 'WEB', 'url': 'https://github.com/TElgamal/attack-on-pycrypto-elgamal'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6528-wvf6-f6qg'}, {'type': 'PACKAGE', 'url': 'https://github.com/dlitz/pycrypto'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-62'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3616-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3616-2/'}]","{'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4w88-rjj3-x7wp,2023-09-13T19:15:15Z,2018-07-24T20:04:23Z,,['CVE-2017-16151'],Chromium Remote Code Execution in electron,"Affected versions of `ElectronJS` are susceptible to a remote code execution vulnerability that occurs when an affected application access remote content, even if the [sandbox option](https://electron.atom.io/docs/api/sandbox-option) is enabled.
+
+
+
+## Recommendation
+
+Update to electron version 1.7.8 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.14'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16151'}, {'type': 'WEB', 'url': 'https://electron.atom.io/blog/2017/09/27/chromium-rce-vulnerability-fix'}, {'type': 'WEB', 'url': 'https://electronjs.org/blog/chromium-rce-vulnerability'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4w88-rjj3-x7wp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/539'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6xhf-x49c-m5m6,2020-08-31T18:27:14Z,2018-07-24T20:04:11Z,,['CVE-2017-16225'],Github Token Leak in aegir,"Affected versions of `aegir` bundle and publish the current users github token to npm when `aegir-release` is executed.
+
+
+## Recommendation
+
+Update to version 12.0.8 or later.
+
+If you used this module to do a release for your project you should invalidate the GitHub tokens that were leaked.",[],"[{'package': {'ecosystem': 'npm', 'name': 'aegir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.0.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16225'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6xhf-x49c-m5m6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/546'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pvhp-v9qp-xf5r,2023-08-31T21:39:49Z,2018-07-23T19:50:48Z,,['CVE-2011-4103'],Django-piston and Django-tastypie do not properly deserialize YAML data,"emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.
+
+Django Tastypie has a very similar vulnerability.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django-piston'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.2.0'}}, {'package': {'ecosystem': 'PyPI', 'name': 'django-piston'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.2.2'}, {'fixed': '0.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4103'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/jespern/django-piston'}, {'type': 'WEB', 'url': 'https://bitbucket.org/jespern/django-piston/commits/91bdaec89543/'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=750658'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pvhp-v9qp-xf5r'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2344'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/11/01/10'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xpm8-98mx-h4c5,2023-08-23T22:33:51Z,2018-07-13T16:01:07Z,,['CVE-2017-16615'],Unsafe deserialization in MLAlchemy,"An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'MLAlchemy'}, 'ecosystem_specific': {'affected_functions': ['mlalchemy.parser.parse_yaml_query']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16615'}, {'type': 'WEB', 'url': 'https://github.com/thanethomson/MLAlchemy/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/thanethomson/MLAlchemy/commit/bc795757febdcce430d89f9d08f75c32d6989d3c'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xpm8-98mx-h4c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/thanethomson/MLAlchemy'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16615-critical-restful-web-applications-vulnerability/'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g7q5-pjjr-gqvp,2021-09-10T20:28:19Z,2018-07-24T20:14:39Z,,['CVE-2017-15010'],Regular Expression Denial of Service in tough-cookie,"Affected versions of `tough-cookie` are susceptible to a regular expression denial of service.
+
+The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.
+
+If node was compiled using the `-DHTTP_MAX_HEADER_SIZE` however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.
+
+
+## Recommendation
+
+Update to version 2.3.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'tough-cookie'}, 'ecosystem_specific': {'affected_functions': ['tough-cookie.Cookie.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15010'}, {'type': 'WEB', 'url': 'https://github.com/salesforce/tough-cookie/issues/92'}, {'type': 'WEB', 'url': 'https://github.com/salesforce/tough-cookie/commit/f1ed420a6a92ea7a5418df6e39e676556bc0c71d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2912'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2913'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1263'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1264'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g7q5-pjjr-gqvp'}, {'type': 'PACKAGE', 'url': 'https://github.com/salesforce/tough-cookie'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:tough-cookie:20170905'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/525'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101185'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qmm9-x5gr-4gfm,2023-01-31T01:42:14Z,2018-07-18T21:20:12Z,,['CVE-2018-3743'],Open Redirect in hekto,"Versions of `hekto` before 0.2.4 are vulnerable to open redirect when a domain name is used as part of the `.html` filename.
+
+
+## Recommendation
+
+Update to version 0.2.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'hekto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3743'}, {'type': 'WEB', 'url': 'https://github.com/herber/hekto/pull/3'}, {'type': 'WEB', 'url': 'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/320693'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qmm9-x5gr-4gfm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/669'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:21Z', 'nvd_published_at': '2018-06-01T17:29:00Z'}"
+1.4.0,GHSA-8p5c-f328-9fvv,2022-04-26T18:15:07Z,2018-07-13T16:01:21Z,,['CVE-2017-0359'],Diffoscope may write to arbitrary locations due to an untrusted archive,diffoscope before 76 writes to arbitrary locations on disk based on the contents of an untrusted archive.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'diffoscope'}, 'ecosystem_specific': {'affected_functions': ['diffoscope.comparators.utils.libarchive.LibarchiveContainer.ensure_unpacked', 'diffoscope.comparators.utils.libarchive.LibarchiveContainer.get_member_names', 'diffoscope.comparators.utils.libarchive.LibarchiveContainer.extract']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '76'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0359'}, {'type': 'WEB', 'url': 'https://github.com/anthraxx/diffoscope/commit/632a40828a54b399787c25e7fa243f732aef7e05'}, {'type': 'WEB', 'url': 'https://github.com/anthraxx/diffoscope/commit/f379d1f611dbd5d361e12b732e07c8aee45ff226'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854723'}, {'type': 'PACKAGE', 'url': 'https://github.com/anthraxx/diffoscope'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2017-0359'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2p78-8hh6-96xc,2020-06-16T20:52:46Z,2018-07-23T19:52:21Z,,['CVE-2011-1157'],Moderate severity vulnerability that affects feedparser,Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via malformed XML comments.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'feedparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1157'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=680074'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=684877'}, {'type': 'WEB', 'url': 'https://code.google.com/p/feedparser/issues/detail?id=254'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2p78-8hh6-96xc'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/03/14/18'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/03/15/11'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43730'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44074'}, {'type': 'WEB', 'url': 'http://support.novell.com/security/cve/CVE-2011-1157.html'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:082'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/46867'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3c5c-7235-994j,2023-09-05T09:23:54Z,2018-07-24T20:15:13Z,,['CVE-2016-2533'],Pillow buffer overflow in ImagingPcdDecode,Buffer overflow in the `ImagingPcdDecode` function in `PcdDecode.c` in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2533'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/1706'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3c5c-7235-994j'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst?plain=1#L53'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-52'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3499'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/02/02/5'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/02/22/2'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j6w4-pg6p-5mrv,2023-09-12T21:19:52Z,2018-07-23T23:51:04Z,,['CVE-2017-16106'],Directory Traversal in tmock,"`tmock` is a static file server.
+
+`tmock` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing ""../"" in the url.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host: localhost
+```
+ and server Response:
+```http
+HTTP/1.1 200 OK
+Date: Thu, 04 May 2017 23:59:18 GMT
+Connection: keep-alive
+Transfer-Encoding: chunked
+
+{contents of /etc/passwd}
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tmock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16106'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j6w4-pg6p-5mrv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/375'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vfp9-gwrh-wq9g,2023-03-01T01:14:15Z,2018-07-18T21:20:19Z,,['CVE-2018-3733'],Path Traversal in crud-file-server,"Versions of `crud-file-server` prior to 0.9.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
+
+
+## Recommendation
+
+Upgrade to version 0.9.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'crud-file-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3733'}, {'type': 'WEB', 'url': 'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310690'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vfp9-gwrh-wq9g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1003'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:36Z', 'nvd_published_at': '2018-05-29T20:29:00Z'}"
+1.4.0,GHSA-73jp-3c67-hjfv,2021-09-02T19:18:46Z,2018-07-26T15:53:31Z,,['CVE-2016-7191'],Authentication Bypass in passport-azure-ad,"Affected versions of `passport-azure-ad` do not recognize the `validateIssuer` setting, which allows remote attackers to bypass authentication via a crafted token.
+
+
+## Recommendation
+
+Version 1.x: Update to version 1.4.6 or later.
+Version 2.x: Update to version 2.0.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'passport-azure-ad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'passport-azure-ad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7191'}, {'type': 'PACKAGE', 'url': 'https://github.com/AzureAD/passport-azure-ad'}, {'type': 'WEB', 'url': 'https://github.com/AzureAD/passport-azure-ad/blob/master/SECURITY-NOTICE.MD'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-73jp-3c67-hjfv'}, {'type': 'WEB', 'url': 'https://support.microsoft.com/en-us/kb/3187742'}, {'type': 'WEB', 'url': 'https://support.microsoft.com/kb/3187742'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/151'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/93213'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036996'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wjr4-2jgw-hmv8,2023-09-12T21:12:31Z,2018-07-31T18:28:53Z,,['CVE-2018-3772'],Command Injection in whereis,"Versions of `whereis` before 0.4.1 are vulnerable to command injection if untrusted user input is passed into `whereis`.
+
+
+## Recommendation
+
+Update to version 0.4.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'whereis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3772'}, {'type': 'WEB', 'url': 'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319476'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wjr4-2jgw-hmv8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/604'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2qx8-589j-gcpx,2020-06-16T20:52:51Z,2018-07-23T20:26:45Z,,['CVE-2011-1950'],Moderate severity vulnerability that affects Plone and plone.app.users,"plone.app.users in Plone 4.0 and 4.1 allows remote authenticated users to modify the properties of arbitrary accounts via unspecified vectors, as exploited in the wild in June 2011.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'plone.app.users'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0a1'}, {'fixed': '1.0.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.users'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1b1'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1950'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67695'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2qx8-589j-gcpx'}, {'type': 'WEB', 'url': 'http://osvdb.org/72729'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone/security/advisories/CVE-2011-1950'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44775'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/8269'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/518155/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/48005'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8m3r-rv5g-fcpq,2021-09-07T19:50:22Z,2018-07-23T21:01:00Z,,['CVE-2011-0697'],Moderate severity vulnerability that affects django,Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0697'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=676359'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8m3r-rv5g-fcpq'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/02/09/6'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43230'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43297'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43382'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43426'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2163'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2011/feb/08/security/'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/46296'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1066-1'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0372'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0388'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0429'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0439'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0441'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3hq4-f2v6-q338,2023-09-01T20:29:04Z,2018-07-12T20:30:30Z,,['CVE-2018-9856'],Kotti CSRF in the local roles implementation,"Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a `/admin-document/@@share` request.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Kotti'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Kotti'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0a1'}, {'fixed': '2.0.0b2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0b1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9856'}, {'type': 'WEB', 'url': 'https://github.com/Kotti/Kotti/issues/551'}, {'type': 'WEB', 'url': 'https://github.com/Kotti/Kotti/commit/69d3c8a5d7203ddaec5ced5901acf87baddd76be'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3hq4-f2v6-q338'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:14Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h6hq-c896-w882,2021-09-14T15:28:52Z,2018-07-23T21:01:10Z,,['CVE-2011-1949'],Low severity vulnerability that affects Plone,"Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.2'}, {'fixed': '3.3.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1949'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67694'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h6hq-c896-w882'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://osvdb.org/72728'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone/security/advisories/CVE-2011-1949'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44775'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44776'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/8269'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/518155/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/48005'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wwf2-5cj8-jx6w,2023-09-13T22:59:29Z,2018-07-23T20:50:21Z,,['CVE-2017-16049'],nodesqlite is malware,"The `nodesqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodesqlite'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16049'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wwf2-5cj8-jx6w'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/492'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m85c-9mf8-m2m6,2023-08-23T22:09:03Z,2018-07-18T18:28:26Z,,['CVE-2017-16763'],Unsafe deserialization in confire,"An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from ""~/.confire.yaml"" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'confire'}, 'ecosystem_specific': {'affected_functions': ['confire.config.Configuration.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16763'}, {'type': 'WEB', 'url': 'https://github.com/bbengfort/confire/issues/24'}, {'type': 'WEB', 'url': 'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m85c-9mf8-m2m6'}, {'type': 'PACKAGE', 'url': 'https://github.com/bbengfort/confire'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c2w9-48qc-qpj4,2022-05-26T19:37:09Z,2018-07-13T15:16:54Z,,['CVE-2017-2809'],Code injection in ansible,An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2809'}, {'type': 'WEB', 'url': 'https://github.com/tomoh1r/ansible-vault/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2w9-48qc-qpj4'}, {'type': 'PACKAGE', 'url': 'https://github.com/tomoh1r/ansible-vault'}, {'type': 'WEB', 'url': 'https://github.com/tomoh1r/ansible-vault/blob/v1.0.5/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0305'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100824'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:09Z', 'nvd_published_at': '2017-09-14T19:29:00Z'}"
+1.4.0,GHSA-3jqw-crqj-w8qw,2020-06-16T20:55:25Z,2018-07-23T19:51:35Z,,['CVE-2011-4137'],Moderate severity vulnerability that affects django,"The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4137'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=737366'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3jqw-crqj-w8qw'}, {'type': 'WEB', 'url': 'https://hermes.opensuse.org/messages/14700881'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2011/sep/09/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2011/sep/10/127/'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/09/11/1'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/09/13/2'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/09/15/5'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/46614'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2332'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-333w-rxj3-f55r,2020-08-31T18:10:51Z,2018-07-24T20:00:30Z,,['CVE-2017-16021'],Regular Expression Denial Of Service in uri-js,"Affected versions of `uri-js` is susceptible to a regular expression denial of service vulnerability when user input is sent to the `.parse()` method.
+
+
+
+## Recommendation
+
+Update to v3.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'uri-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16021'}, {'type': 'WEB', 'url': 'https://github.com/garycourt/uri-js/issues/12'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-333w-rxj3-f55r'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/100'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hjf3-r7gw-9rwg,2020-06-16T21:40:30Z,2018-07-24T20:00:41Z,,['CVE-2012-2921'],Moderate severity vulnerability that affects feedparser,Universal Feed Parser (aka feedparser or python-feedparser) before 5.1.2 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML ENTITY declaration in a non-ASCII encoded document.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'feedparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2921'}, {'type': 'WEB', 'url': 'https://code.google.com/p/feedparser/source/browse/trunk/NEWS?spec=svn706&r=706'}, {'type': 'WEB', 'url': 'https://code.google.com/p/feedparser/source/detail?r=703&path=/trunk/feedparser/feedparser.py'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjf3-r7gw-9rwg'}, {'type': 'WEB', 'url': 'https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0157'}, {'type': 'WEB', 'url': 'http://freecode.com/projects/feedparser/releases/344371'}, {'type': 'WEB', 'url': 'http://osvdb.org/81701'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/49256'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2013:118'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/53654'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cqp5-m4pq-gfgp,2023-09-12T20:44:17Z,2018-07-26T15:18:43Z,,['CVE-2018-3723'],Prototype Pollution in defaults-deep,"Versions of `default-deep` before 0.2.4 are vulnerable to prototype pollution
+
+
+## Recommendation
+
+Update to version 0.2.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'defaults-deep'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3723'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/defaults-deep/commit/c873f341327ad885ff4d0f23b3d3bca31b0343e5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310514'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cqp5-m4pq-gfgp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/581'}]","{'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cq94-qf6q-mf2h,2023-09-05T18:13:33Z,2018-07-16T16:50:30Z,,['CVE-2017-1000246'],Pysaml2 improperly initializes encryption vector,"Python package pysaml2 version 4.5.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000246'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/issues/417'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/pull/519/commits/7323f5c20efb59424d853c822e7a26d1aa3e84aa'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cq94-qf6q-mf2h'}, {'type': 'PACKAGE', 'url': 'https://github.com/rohe/pysaml2'}]","{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p7h9-vf92-5fj5,2023-02-13T16:51:50Z,2018-07-23T19:50:57Z,,['CVE-2011-1948'],Cross-site scripting in Products.CMFPlone and Products.PasswordResetTool,Cross-site scripting (XSS) vulnerability in Plone 4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted URL.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Products.PasswordResetTool'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFPlone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFPlone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1a1'}, {'fixed': '4.1rc3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1rc2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1948'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2012:0151'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2011-1948'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=711494'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67693'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p7h9-vf92-5fj5'}, {'type': 'WEB', 'url': 'http://osvdb.org/72727'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone/security/advisories/CVE-2011-1948'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44775'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44776'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/8269'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/518155/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/48005'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:29Z', 'nvd_published_at': '2011-06-06T19:55:00Z'}"
+1.4.0,GHSA-hxf5-mg84-pj4m,2020-06-17T15:14:53Z,2018-07-31T23:03:17Z,2020-06-17T15:14:53Z,[],Moderate severity vulnerability that affects moment,"Withdrawn, accidental duplicate publish.
+
+The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a ""regular expression Denial of Service (ReDoS).""",[],"[{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hxf5-mg84-pj4m'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8g7p-74h8-hg48,2021-09-07T19:45:18Z,2018-07-27T17:04:52Z,,['CVE-2018-3739'],Denial of Service in https-proxy-agent,"Versions of `https-proxy-agent` before 2.2.0 are vulnerable to denial of service. This is due to unsanitized options (proxy.auth) being passed to `Buffer()`.
+
+
+## Recommendation
+
+Update to version 2.2.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'https-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3736'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319532'}, {'type': 'PACKAGE', 'url': 'https://github.com/TooTallNate/node-https-proxy-agent'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8g7p-74h8-hg48'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/593'}]","{'cwe_ids': ['CWE-125', 'CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jp27-cwp2-5qqr,2023-09-13T21:43:41Z,2018-07-23T20:54:24Z,,['CVE-2017-16045'],jquery.js is malware ,"The `jquery.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16045'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jp27-cwp2-5qqr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/496'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-686g-3xr3-x4x6,2021-09-01T22:46:06Z,2018-07-18T18:33:15Z,,['CVE-2018-3809'],Information Exposure on Case Insensitive File Systems in serve,"Versions of `serve` before 7.0.0 are vulnerable to information exposure, bypassing the ignore security control, but only on case insensitive file systems.
+
+
+
+## Recommendation
+
+Update to version 7.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3809'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330650'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-686g-3xr3-x4x6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/672'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rwr3-c2q8-gm56,2023-09-05T09:20:57Z,2018-07-24T20:08:27Z,,['CVE-2016-9189'],Pillow Integer overflow in Map.c,"Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the ""crafted image file"" approach, related to an ""Integer Overflow"" issue affecting the `Image.core.map_buffer` in `map.c` component.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9189'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/2105'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rwr3-c2q8-gm56'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-52'}, {'type': 'WEB', 'url': 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3710'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94234'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4vcm-qfxh-p6c3,2023-09-11T23:14:01Z,2018-07-23T20:40:29Z,,['CVE-2017-16192'],Directory Traversal in getcityapi.yoehoehne,"Affected versions of `getcityapi.yoehoehne` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'getcityapi.yoehoehne'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16192'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/getcityapi.yoehoehne'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4vcm-qfxh-p6c3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/438'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9j5m-873f-xh76,2023-09-11T16:35:44Z,2018-07-23T20:46:32Z,,['CVE-2017-16152'],Directory Traversal in static-html-server,"Affected versions of `static-html-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'static-html-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16152'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9j5m-873f-xh76'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/376'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pq5x-rprq-8jrj,2023-09-13T20:26:39Z,2018-07-23T22:06:14Z,,['CVE-2017-16130'],Directory Traversal in exxxxxxxxxxx,"Affected versions of `exxxxxxxxxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+This vulnerability is only effective for files that have a file extension, which provides a partial mitigation.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'exxxxxxxxxxx'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16130'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pq5x-rprq-8jrj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/478'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g8q2-24jh-5hpc,2023-09-26T18:29:18Z,2018-07-27T14:47:52Z,2020-06-16T21:36:34Z,[],High severity vulnerability that affects jquery-ui,"Withdrawn, accidental duplicate publish.
+
+Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7103'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g8q2-24jh-5hpc'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2j9c-9vmv-7m39,2023-09-05T21:45:13Z,2018-07-31T18:18:39Z,,['CVE-2017-11173'],Missing Regex anchor in Rack-Cors allows malicious third party site to perform CORS request,"Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted `example.com` domain name and not the malicious `example.net` domain name, then `example.com.example.net` (as well as `example.com-example.net`) would be inadvertently allowed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-cors'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11173'}, {'type': 'WEB', 'url': 'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyu/rack-cors'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Jul/22'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3931'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m79w-4mqv-r39f,2023-09-07T20:36:50Z,2018-07-31T22:06:33Z,,['CVE-2016-10691'],windows-seleniumjar downloads Resources over HTTP,"Affected versions of `windows-seleniumjar` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'windows-seleniumjar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.48.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10691'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m79w-4mqv-r39f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/296'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rch9-xh7r-mqgw,2023-05-30T19:26:12Z,2018-07-26T15:08:05Z,,['CVE-2018-3717'],Cross-Site Scripting in connect,connect node module before 2.14.0 suffers from a Cross-Site Scripting (XSS) vulnerability due to a lack of validation of file in directory.js middleware.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3717'}, {'type': 'WEB', 'url': 'https://github.com/JacksonTian/anywhere/issues/33#issuecomment-366527448'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/309394'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/309641'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rch9-xh7r-mqgw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/584'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/595'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:23Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}"
+1.4.0,GHSA-6f34-pq9f-36vf,2023-09-06T20:02:38Z,2018-07-23T20:50:29Z,,['CVE-2017-16050'],sqlite.js is malware,"The `sqlite.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+
+
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sqlite.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16050'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6f34-pq9f-36vf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/491'}]","{'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ggq8-j54v-54x8,2023-09-13T23:04:25Z,2018-07-23T20:47:02Z,,['CVE-2017-16145'],Directory Traversal in sspa,"Affected versions of `sspa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sspa'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16145'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ggq8-j54v-54x8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/463'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mj4x-wcxf-hm8x,2023-08-25T23:55:12Z,2018-07-31T18:13:51Z,,['CVE-2018-1000539'],Json-jwt did not verify the cryptographic signature for data,The json-jwt rubygem version >= 0.5.0 && < 1.9.4 contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability in Decryption of AES-GCM encrypted JSON Web Tokens that can result in Attacker can forge a authentication tag. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 1.9.4 and later.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'json-jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.1'}, {'fixed': '1.9.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000539'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/commit/a3b2147f0f6d9aca653e7a30e453d3a92b33413f'}, {'type': 'PACKAGE', 'url': 'https://github.com/nov/json-jwt'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json-jwt/CVE-2018-1000539.yml'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4283'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cfxm-4p54-5w7h,2023-09-13T23:04:16Z,2018-07-24T00:20:57Z,,['CVE-2017-16107'],Directory traversal in pooledwebsocket,"Affected versions of `pooledwebsocket` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+Update to version 0.0.19 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'pooledwebsocket'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16107'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfxm-4p54-5w7h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/341'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-68cm-mgv7-vg5c,2023-09-07T22:52:46Z,2018-07-23T20:45:11Z,,['CVE-2017-16173'],Directory Traversal in utahcityfinder,"Affected versions of `utahcityfinder` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'utahcityfinder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16173'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/utahcityfinder'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-68cm-mgv7-vg5c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/467'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8qp3-pvwc-2g4p,2023-09-08T20:34:44Z,2018-07-23T20:49:58Z,,['CVE-2017-16054'],nodefabric is malware,"The `nodefabric` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodefabric'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16054'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qp3-pvwc-2g4p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/488'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ghjx-3jg5-h6r2,2021-09-10T21:36:44Z,2018-07-13T15:17:10Z,,['CVE-2017-9462'],High severity vulnerability that affects mercurial,"In Mercurial before 4.1.3, ""hg serve --stdio"" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mercurial'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9462'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1576'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/861243'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ghjx-3jg5-h6r2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201709-18'}, {'type': 'WEB', 'url': 'https://www.mercurial-scm.org/repo/hg/rev/77eaf9539499'}, {'type': 'WEB', 'url': 'https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.1.3_.282017-4-18.29'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3963'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99123'}]","{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fx46-whrj-73v5,2023-09-12T20:47:14Z,2018-07-24T20:06:17Z,,['CVE-2017-0928'],Bypassing Sanitization using DOM clobbering in html-janitor,"All versions of `html-janitor` are vulnerable to cross-site scripting (XSS).
+
+Arbitrary HTML can pass the sanitization process, which can be unexpected and dangerous (XSS) in case user-controlled input is passed to the clean function.""
+
+
+## Recommendation
+
+Upgrade to version 2.0.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'html-janitor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0928'}, {'type': 'WEB', 'url': 'https://github.com/guardian/html-janitor/issues/35'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/308158'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fx46-whrj-73v5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/569'}]","{'cwe_ids': ['CWE-547', 'CWE-642'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wm77-q74p-5763,2021-08-09T22:21:02Z,2018-07-27T17:06:03Z,,[],Path Traversal in superstatic,"Affected of `superstatic` are vulnerable to path traversal when used on Windows.
+
+Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0).
+
+
+## Recommendation
+
+Update to version 5.0.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'superstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/firebase/superstatic/pull/255'}, {'type': 'WEB', 'url': 'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'}, {'type': 'WEB', 'url': 'https://github.com/firebase/superstatic/blob/v5.0.1/lib/providers/fs.js#L71'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/652'}]","{'cwe_ids': ['CWE-177'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q75g-2496-mxpp,2020-08-31T18:26:32Z,2018-07-24T20:11:13Z,,['CVE-2017-16113'],Regular Expression Denial of Service in parsejson,"Affected versions of `parsejson` are vulnerable to a regular expression denial of service when parsing untrusted user input.
+
+
+## Recommendation
+
+The `parsejson` package has not been functionally updated since it was initially released.
+
+Additionally, it provides functionality which is natively included in Node.js, and therefore the native `JSON.parse()` should be used, for both performance and security reasons.",[],"[{'package': {'ecosystem': 'npm', 'name': 'parsejson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16113'}, {'type': 'WEB', 'url': 'https://github.com/get/parsejson/issues/4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q75g-2496-mxpp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/528'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wxvm-fh75-mpgr,2020-06-17T15:15:19Z,2018-07-26T16:24:34Z,2020-06-17T15:15:19Z,[],Critical severity vulnerability that affects dns-sync,"Withdrawn, accidental duplicate publish.
+
+The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.",[],"[{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9682'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wxvm-fh75-mpgr'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:19Z', 'nvd_published_at': None}"