schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
14
228
details
stringlengths
48
1.45k
severity
stringlengths
2
78
affected
stringlengths
79
6.96k
references
stringlengths
143
6.38k
database_specific
stringlengths
131
174
1.4.0
GHSA-4vfj-c2xf-8r48
2023-09-05T22:26:53Z
2018-07-23T20:45:20Z
null
['CVE-2017-16169']
Directory Traversal in looppake
Affected versions of `looppake` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
[{'package': {'ecosystem': 'npm', 'name': 'looppake'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16169'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/looppake'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4vfj-c2xf-8r48'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/412'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:15Z', 'nvd_published_at': None}
1.4.0
GHSA-5j2h-h5hg-3wf8
2020-06-16T21:16:24Z
2018-07-23T19:51:10Z
null
['CVE-2011-0696']
Moderate severity vulnerability that affects django
Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0696'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=676357'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5j2h-h5hg-3wf8'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/02/09/6'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43230'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43297'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43382'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43426'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2163'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2011/feb/08/security/'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/46296'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1066-1'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0372'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0388'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0429'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0439'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0441'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:24Z', 'nvd_published_at': None}
1.4.0
GHSA-cr6c-85fh-cqpg
2021-09-09T20:49:32Z
2018-07-31T22:27:04Z
null
['CVE-2016-10692']
Downloads Resources over HTTP in haxeshim
Affected versions of `haxeshim` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxeshim`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'haxeshim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10692'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cr6c-85fh-cqpg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/300'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:38Z', 'nvd_published_at': None}
1.4.0
GHSA-ff6r-5jwm-8292
2023-09-11T21:52:22Z
2018-07-24T19:51:16Z
null
['CVE-2017-16099']
Regular Expression Denial of Service in no-case
Affected versions of `no-case` are vulnerable to a regular expression denial of service when parsing untrusted user input. ## Recommendation Update to version 2.3.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'no-case'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16099'}, {'type': 'WEB', 'url': 'https://github.com/blakeembrey/no-case/issues/17'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ff6r-5jwm-8292'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/529'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:26Z', 'nvd_published_at': None}
1.4.0
GHSA-7wph-fc4w-wqp2
2021-09-03T21:46:38Z
2018-07-23T19:51:59Z
null
['CVE-2010-4535']
Moderate severity vulnerability that affects django
The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-4535'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=665373'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7wph-fc4w-wqp2'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'http://code.djangoproject.com/changeset/15032'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42715'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42827'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42913'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2010/dec/22/security/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2010/12/23/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/01/03/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/45563'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1040-1'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0048'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0098'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:37Z', 'nvd_published_at': None}
1.4.0
GHSA-p6h9-gw49-rqm4
2022-05-25T13:56:11Z
2018-07-12T20:29:21Z
null
['CVE-2018-5773']
markdown2 is vulnerable to cross-site scripting
An issue was discovered in `markdown2` (aka python-markdown2) through 2.3.5. The `safe_mode` feature, which is supposed to sanitize user input against XSS, is flawed and does not escape the input properly. With a crafted payload, XSS can be triggered, as demonstrated by omitting the final `>` character from an IMG tag.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5773'}, {'type': 'WEB', 'url': 'https://github.com/google/osv/issues/430'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/issues/285'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/pull/303'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p6h9-gw49-rqm4'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/python-markdown2'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/blob/master/CHANGES.md#python-markdown2-236'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:21Z', 'nvd_published_at': None}
1.4.0
GHSA-924m-4pmx-c67h
2023-03-31T14:51:18Z
2018-07-13T16:01:17Z
null
['CVE-2017-1000433']
pysaml2 Improper Authentication vulnerability
pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000433'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/issues/451'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/pull/454'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/6312a41e037954850867f29d329e5007df1424a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rohe/pysaml2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201801-11'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:01Z', 'nvd_published_at': '2018-01-02T23:29:00Z'}
1.4.0
GHSA-mpcf-4gmh-23w8
2023-09-11T22:05:14Z
2018-07-24T20:16:30Z
null
['CVE-2017-16118']
Regular Expression Denial of Service in forwarded
Affected versions of `forwarded` are vulnerable to regular expression denial of service when parsing specially crafted user input. ## Recommendation Update to version 0.1.2 or later
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'forwarded'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16118'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mpcf-4gmh-23w8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/527'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104427'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:42Z', 'nvd_published_at': None}
1.4.0
GHSA-wc9v-mj63-m9g5
2023-09-11T18:31:10Z
2018-07-24T19:44:42Z
null
['CVE-2017-16082']
Remote Code Execution in pg
Affected versions of `pg` contain a remote code execution vulnerability that occurs when the remote database or query specifies a crafted column name. There are two specific scenarios in which it is likely for an application to be vulnerable: 1. The application executes unsafe, user-supplied sql which contains malicious column names. 2. The application connects to an untrusted database and executes a query returning results which contain a malicious column name. ## Proof of Concept ``` const { Client } = require('pg') const client = new Client() client.connect() const sql = `SELECT 1 AS "\\'/*", 2 AS "\\'*/\n + console.log(process.env)] = null;\n//"` client.query(sql, (err, res) => { client.end() }) ``` ## Recommendation * Version 2.x.x: Update to version 2.11.2 or later. * Version 3.x.x: Update to version 3.6.4 or later. * Version 4.x.x: Update to version 4.5.7 or later. * Version 5.x.x: Update to version 5.2.1 or later. * Version 6.x.x: Update to version 6.4.2 or later. ( Note that versions 6.1.6, 6.2.5, and 6.3.3 are also patched. ) * Version 7.x.x: Update to version 7.1.2 or later. ( Note that version 7.0.2 is also patched. )
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.6.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16082'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wc9v-mj63-m9g5'}, {'type': 'WEB', 'url': 'https://node-postgres.com/announcements#2017-08-12-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/521'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:03Z', 'nvd_published_at': None}
1.4.0
GHSA-6cwv-x26c-w2q4
2022-04-26T18:05:03Z
2018-07-12T12:00:00Z
null
['CVE-2018-8768']
Jupyter Notebook file bypasses sanitization, executes JavaScript
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8768'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2018/03/15/2'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:58Z', 'nvd_published_at': None}
1.4.0
GHSA-p7c9-jqhq-vr3v
2023-03-01T01:36:36Z
2018-07-27T17:03:46Z
null
['CVE-2018-3770']
Remote Code Execution in markdown-pdf
Versions of `markdown-pdf` prior to 9.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize HTML code in markdown files. If markdown files with malicious HTML are converted to PDF, the resulting PDF file will execute any JavaScript code in the original markdown file. This may allow attackers to execute Remote Code. ## Recommendation Upgrade to version 9.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'markdown-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3770'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/360727'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p7c9-jqhq-vr3v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/991'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:26Z', 'nvd_published_at': '2018-07-20T22:29:00Z'}
1.4.0
GHSA-fxpg-gg9g-76gj
2021-09-10T20:17:17Z
2018-07-23T19:52:42Z
null
['CVE-2010-3082']
Moderate severity vulnerability that affects django
Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3082'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/7f84657b6b2243cc787bdb9f296710c8d13ad0bd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=632239'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/61729'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fxpg-gg9g-76gj'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'http://marc.info/?l=oss-security&m=128403961700444&w=2'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2010/sep/08/security-release/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/43116'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1004-1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:48Z', 'nvd_published_at': None}
1.4.0
GHSA-j5mg-fpq8-vvxv
2023-09-07T18:25:38Z
2018-07-23T20:48:14Z
null
['CVE-2017-16143']
Directory Traversal in commentapp.stetsonwood
Affected versions of `commentapp.stetsonwood` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'commentapp.stetsonwood'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16143'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/commentapp.stetsonwood'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j5mg-fpq8-vvxv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/470'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:06Z', 'nvd_published_at': None}
1.4.0
GHSA-48vv-2pmq-9fvv
2021-08-31T21:48:47Z
2018-07-23T19:51:14Z
null
['CVE-2012-6661']
Moderate severity vulnerability that affects Plone and Zope2
Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Zope2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.2'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3a1'}, {'fixed': '4.3b1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3a2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6661'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/zope2/+bug/1071067'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-48vv-2pmq-9fvv'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Products.CMFPlone'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121124'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/security/advisories/20121106/24'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/11/10/1'}]
{'cwe_ids': ['CWE-336'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:52Z', 'nvd_published_at': None}
1.4.0
GHSA-rrfc-g2gh-xvjm
2023-09-11T23:12:18Z
2018-07-23T20:46:07Z
null
['CVE-2017-16162']
Directory Traversal in 22lixian
Affected versions of `22lixian` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '22lixian'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16162'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/22lixian'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrfc-g2gh-xvjm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/390'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:39Z', 'nvd_published_at': None}
1.4.0
GHSA-23wc-v4mf-x7v4
2023-09-07T22:48:16Z
2018-07-23T20:44:45Z
null
['CVE-2017-16178']
Directory Traversal in intsol-package
`intsol-package` is a file server. `intsol-package` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. **Example Request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:localhost ``` and the server's Response ```http HTTP/1.1 200 OK Date: Thu, 04 May 2017 23:59:18 GMT Connection: keep-alive Transfer-Encoding: chunked {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'intsol-package'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16178'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/intsol-package'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-23wc-v4mf-x7v4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/461'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:12Z', 'nvd_published_at': None}
1.4.0
GHSA-qmhf-qg6f-pc4v
2023-09-12T21:23:21Z
2018-07-23T20:39:51Z
null
['CVE-2017-16217']
Directory Traversal in fbr-client
Affected versions of `fbr-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fbr-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16217'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/fbr-client'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qmhf-qg6f-pc4v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/449'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:16Z', 'nvd_published_at': None}
1.4.0
GHSA-prr5-pfr8-q9f3
2021-09-16T19:14:17Z
2018-07-23T19:52:35Z
null
['CVE-2012-5503']
Moderate severity vulnerability that affects Plone
ftp.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read hidden folder contents via unspecified vectors.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3a1'}, {'fixed': '4.3b1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3a2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5503'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-prr5-pfr8-q9f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Products.CMFPlone'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/security/advisories/20121106/19'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/11/10/1'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:01Z', 'nvd_published_at': None}
1.4.0
GHSA-8xjv-v9xq-m5h9
2023-09-05T09:23:16Z
2018-07-24T20:15:36Z
null
['CVE-2016-0775']
Pillow Buffer overflow in ImagingFliDecode
Buffer overflow in the `ImagingFliDecode` function in `libImaging/FliDecode.c` in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0775'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8xjv-v9xq-m5h9'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-52'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3499'}]
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:56Z', 'nvd_published_at': None}
1.4.0
GHSA-x5pg-88wf-qq4p
2023-09-07T22:11:27Z
2018-07-24T20:10:52Z
null
['CVE-2017-16114']
Regular Expression Denial of Service in marked
Affected versions of `marked` are vulnerable to a regular expression denial of service. The amplification in this vulnerability is significant, with 1,000 characters resulting in the event loop being blocked for around 6 seconds. ## Recommendation Update to version 0.3.9 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16114'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/937'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x5pg-88wf-qq4p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/531'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:12Z', 'nvd_published_at': None}
1.4.0
GHSA-jpjp-vxv6-59hm
2023-09-11T23:12:30Z
2018-07-23T20:41:11Z
null
['CVE-2017-16187']
Directory Traversal in open-device
Affected versions of `open-device` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'open-device'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16187'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/open-device'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jpjp-vxv6-59hm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/447'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:00Z', 'nvd_published_at': None}
1.4.0
GHSA-32pc-xphx-q4f6
2022-04-26T18:06:43Z
2018-07-12T20:30:49Z
null
['CVE-2018-1000164']
Gunicorn contains Improper Neutralization of CRLF sequences in HTTP headers
gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'gunicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000164'}, {'type': 'WEB', 'url': 'https://github.com/benoitc/gunicorn/issues/1227'}, {'type': 'WEB', 'url': 'https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-32pc-xphx-q4f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/benoitc/gunicorn'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4022-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4186'}]
{'cwe_ids': ['CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:40Z', 'nvd_published_at': None}
1.4.0
GHSA-884w-698f-927f
2023-09-11T22:41:23Z
2018-07-27T17:06:50Z
null
['CVE-2018-1002203']
Arbitrary File Write via Archive Extraction in unzipper
Versions of `unzipper` before 0.8.13 are vulnerable to arbitrary file write when used to extract a specifically crafted archive that contains path traversal filenames (`../../file.txt` for example). ## Recommendation Update to version 0.3.18 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'unzipper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002203'}, {'type': 'WEB', 'url': 'https://github.com/ZJONSSON/node-unzipper/pull/59'}, {'type': 'WEB', 'url': 'https://github.com/ZJONSSON/node-unzipper/commit/2220ddd5b58f6252069a4f99f9475441ad0b50cd'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/362119'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-884w-698f-927f'}, {'type': 'WEB', 'url': 'https://github.com/snyk/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:unzipper:20180415'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/680'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:49Z', 'nvd_published_at': None}
1.4.0
GHSA-232r-66cg-79px
2023-08-07T15:45:44Z
2018-07-12T20:29:30Z
null
['CVE-2018-7750']
Paramiko not properly checking authentication before processing other requests
transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}], 'versions': ['2.4.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.18.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7750'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/issues/1175'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/commit/e9dfd854bdaf8af15d7834f7502a0451d217bb8c'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0591'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0646'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1124'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1125'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1213'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1274'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1328'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1525'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1972'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-232r-66cg-79px'}, {'type': 'PACKAGE', 'url': 'https://github.com/paramiko/paramiko'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/blob/e861c7697622774071ce73b46ffe8817eacdedfa/sites/www/changelog.rst?plain=1#L759-L763'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3603-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3603-2/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20190831123128/http://www.securityfocus.com/bid/103713'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45712/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:50:58Z', 'nvd_published_at': '2018-03-13T18:29:00Z'}
1.4.0
GHSA-w4vg-rf63-f3j3
2022-04-26T18:06:19Z
2018-07-12T14:45:42Z
null
['CVE-2016-9190']
Arbitrary code using "crafted image file" approach affecting Pillow
Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9190'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/2105'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w4vg-rf63-f3j3'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-52'}, {'type': 'WEB', 'url': 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3710'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94234'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:34Z', 'nvd_published_at': None}
1.4.0
GHSA-pmg9-p9r2-6q87
2021-01-08T18:20:33Z
2018-07-24T19:46:37Z
null
['CVE-2017-16086']
ReDoS via long UserAgent header in ua-parser
Affected versions of `ua-parser` are vulnerable to regular expression denial of service when given a specially crafted `User-Agent` header. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different, functionally equivalent package such as [useragent](https://www.npmjs.com/package/useragent).
[]
[{'package': {'ecosystem': 'npm', 'name': 'ua-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16086'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pmg9-p9r2-6q87'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/316'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:36Z', 'nvd_published_at': None}
1.4.0
GHSA-5jg5-w395-9684
2023-09-11T19:00:46Z
2018-07-23T20:39:59Z
null
['CVE-2017-16212']
Directory Traversal in ltt
Affected versions of `ltt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ltt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16212'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5jg5-w395-9684'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/422'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:34Z', 'nvd_published_at': None}
1.4.0
GHSA-pr49-5hhf-6mm6
2023-09-08T23:29:43Z
2018-07-23T20:44:34Z
null
['CVE-2017-16180']
Directory Traversal in serverabc
Affected versions of `serverabc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'serverabc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16180'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverabc'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pr49-5hhf-6mm6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/459'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:58Z', 'nvd_published_at': None}
1.4.0
GHSA-h8mc-42c3-r72p
2023-09-06T20:06:02Z
2018-07-24T15:40:47Z
null
['CVE-2017-16035']
hubl-server downloads resources over HTTP
Affected versions of `hubl-server` insecurely download dependencies over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the responses and replace the dependencies with malicious ones, resulting in code execution on the system running `hubl-server`. ## Recommendation No patch is currently available for this vulnerability, and it has not seen any updates since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo
[]
[{'package': {'ecosystem': 'npm', 'name': 'hubl-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16035'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h8mc-42c3-r72p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/334'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:31Z', 'nvd_published_at': None}
1.4.0
GHSA-3c48-6pcv-88rm
2023-09-11T16:16:25Z
2018-07-27T17:05:27Z
null
['CVE-2018-1999024']
Macro in MathJax running untrusted Javascript within a web browser
MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the `\unicode{}` macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mathjax'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024'}, {'type': 'WEB', 'url': 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}, {'type': 'WEB', 'url': 'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3c48-6pcv-88rm'}, {'type': 'PACKAGE', 'url': 'https://github.com/mathjax/MathJax'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:43Z', 'nvd_published_at': None}
1.4.0
GHSA-w4pv-w56c-mg4v
2023-01-31T01:40:33Z
2018-07-18T21:20:15Z
null
['CVE-2018-3734']
Path Traversal in stattic
Versions of `stattic` before 0.3.0 are vulnerable to path traversal allowing a remote attacker to read arbitrary files with any extension from the server that users `stattic`. ## Recommendation Update to version 0.3.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'stattic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3734'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319003'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w4pv-w56c-mg4v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/591'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:29Z', 'nvd_published_at': '2018-05-29T20:29:00Z'}
1.4.0
GHSA-2gjg-5x33-mmp2
2023-03-01T01:47:01Z
2018-07-25T22:44:05Z
null
['CVE-2018-3729']
Path Traversal in localhost-now
Versions of `localhost-now` before 1.0.2 are vulnerable to path traversal. This allows a remote attacker to read the content of an arbitrary file. ## Recommendation Update to version 1.0.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'localhost-now'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3729'}, {'type': 'WEB', 'url': 'https://github.com/DCKT/localhost-now/commit/30b004c7f145d677df8800a106c2edc982313995#diff-b9cfc7f2cdf78a7f4b91a753d10865a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/312889'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2gjg-5x33-mmp2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/582'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:01Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}
1.4.0
GHSA-7g9h-c88w-r7h2
2020-06-16T21:22:48Z
2018-07-23T19:52:31Z
null
['CVE-2011-0698']
High severity vulnerability that affects django
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0698'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7g9h-c88w-r7h2'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/02/09/6'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43230'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2011/feb/08/security/'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/46296'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0372'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0439'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:48Z', 'nvd_published_at': None}
1.4.0
GHSA-94x5-94wf-m445
2023-09-11T23:14:13Z
2018-07-24T15:48:38Z
null
['CVE-2017-16037']
Directory Traversal in gomeplus-h5-proxy
Affected versions of `gomeplus-h5-proxy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'gomeplus-h5-proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16037'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-94x5-94wf-m445'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/350'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:32Z', 'nvd_published_at': None}
1.4.0
GHSA-fwr5-q9rx-294f
2021-09-10T20:11:19Z
2018-07-23T19:51:40Z
null
['CVE-2010-4534']
Moderate severity vulnerability that affects django
The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-4534'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=665373'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fwr5-q9rx-294f'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html'}, {'type': 'WEB', 'url': 'http://code.djangoproject.com/changeset/15031'}, {'type': 'WEB', 'url': 'http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html'}, {'type': 'WEB', 'url': 'http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42715'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42827'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/42913'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2010/dec/22/security/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2010/12/23/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/01/03/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/515446'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/45562'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1040-1'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0048'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0098'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:36Z', 'nvd_published_at': None}
1.4.0
GHSA-6528-wvf6-f6qg
2022-04-26T18:13:29Z
2018-07-12T20:29:26Z
null
['CVE-2018-6594']
Pycrypto generates weak key parameters
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pycrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6594'}, {'type': 'WEB', 'url': 'https://github.com/dlitz/pycrypto/issues/253'}, {'type': 'WEB', 'url': 'https://github.com/TElgamal/attack-on-pycrypto-elgamal'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6528-wvf6-f6qg'}, {'type': 'PACKAGE', 'url': 'https://github.com/dlitz/pycrypto'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-62'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3616-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3616-2/'}]
{'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:02Z', 'nvd_published_at': None}
1.4.0
GHSA-4w88-rjj3-x7wp
2023-09-13T19:15:15Z
2018-07-24T20:04:23Z
null
['CVE-2017-16151']
Chromium Remote Code Execution in electron
Affected versions of `ElectronJS` are susceptible to a remote code execution vulnerability that occurs when an affected application access remote content, even if the [sandbox option](https://electron.atom.io/docs/api/sandbox-option) is enabled. ## Recommendation Update to electron version 1.7.8 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.14'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16151'}, {'type': 'WEB', 'url': 'https://electron.atom.io/blog/2017/09/27/chromium-rce-vulnerability-fix'}, {'type': 'WEB', 'url': 'https://electronjs.org/blog/chromium-rce-vulnerability'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4w88-rjj3-x7wp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/539'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:23Z', 'nvd_published_at': None}
1.4.0
GHSA-6xhf-x49c-m5m6
2020-08-31T18:27:14Z
2018-07-24T20:04:11Z
null
['CVE-2017-16225']
Github Token Leak in aegir
Affected versions of `aegir` bundle and publish the current users github token to npm when `aegir-release` is executed. ## Recommendation Update to version 12.0.8 or later. If you used this module to do a release for your project you should invalidate the GitHub tokens that were leaked.
[]
[{'package': {'ecosystem': 'npm', 'name': 'aegir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.0.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16225'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6xhf-x49c-m5m6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/546'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:45Z', 'nvd_published_at': None}
1.4.0
GHSA-pvhp-v9qp-xf5r
2023-08-31T21:39:49Z
2018-07-23T19:50:48Z
null
['CVE-2011-4103']
Django-piston and Django-tastypie do not properly deserialize YAML data
emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method. Django Tastypie has a very similar vulnerability.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-piston'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.2.0'}}, {'package': {'ecosystem': 'PyPI', 'name': 'django-piston'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.2.2'}, {'fixed': '0.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4103'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/jespern/django-piston'}, {'type': 'WEB', 'url': 'https://bitbucket.org/jespern/django-piston/commits/91bdaec89543/'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=750658'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pvhp-v9qp-xf5r'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2344'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/11/01/10'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:09Z', 'nvd_published_at': None}
1.4.0
GHSA-xpm8-98mx-h4c5
2023-08-23T22:33:51Z
2018-07-13T16:01:07Z
null
['CVE-2017-16615']
Unsafe deserialization in MLAlchemy
An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'MLAlchemy'}, 'ecosystem_specific': {'affected_functions': ['mlalchemy.parser.parse_yaml_query']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16615'}, {'type': 'WEB', 'url': 'https://github.com/thanethomson/MLAlchemy/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/thanethomson/MLAlchemy/commit/bc795757febdcce430d89f9d08f75c32d6989d3c'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xpm8-98mx-h4c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/thanethomson/MLAlchemy'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16615-critical-restful-web-applications-vulnerability/'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:55Z', 'nvd_published_at': None}
1.4.0
GHSA-g7q5-pjjr-gqvp
2021-09-10T20:28:19Z
2018-07-24T20:14:39Z
null
['CVE-2017-15010']
Regular Expression Denial of Service in tough-cookie
Affected versions of `tough-cookie` are susceptible to a regular expression denial of service. The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length. If node was compiled using the `-DHTTP_MAX_HEADER_SIZE` however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node. ## Recommendation Update to version 2.3.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tough-cookie'}, 'ecosystem_specific': {'affected_functions': ['tough-cookie.Cookie.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15010'}, {'type': 'WEB', 'url': 'https://github.com/salesforce/tough-cookie/issues/92'}, {'type': 'WEB', 'url': 'https://github.com/salesforce/tough-cookie/commit/f1ed420a6a92ea7a5418df6e39e676556bc0c71d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2912'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2913'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1263'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1264'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g7q5-pjjr-gqvp'}, {'type': 'PACKAGE', 'url': 'https://github.com/salesforce/tough-cookie'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:tough-cookie:20170905'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/525'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101185'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:20Z', 'nvd_published_at': None}
1.4.0
GHSA-qmm9-x5gr-4gfm
2023-01-31T01:42:14Z
2018-07-18T21:20:12Z
null
['CVE-2018-3743']
Open Redirect in hekto
Versions of `hekto` before 0.2.4 are vulnerable to open redirect when a domain name is used as part of the `.html` filename. ## Recommendation Update to version 0.2.4 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'hekto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3743'}, {'type': 'WEB', 'url': 'https://github.com/herber/hekto/pull/3'}, {'type': 'WEB', 'url': 'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/320693'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qmm9-x5gr-4gfm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/669'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:21Z', 'nvd_published_at': '2018-06-01T17:29:00Z'}
1.4.0
GHSA-8p5c-f328-9fvv
2022-04-26T18:15:07Z
2018-07-13T16:01:21Z
null
['CVE-2017-0359']
Diffoscope may write to arbitrary locations due to an untrusted archive
diffoscope before 76 writes to arbitrary locations on disk based on the contents of an untrusted archive.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'diffoscope'}, 'ecosystem_specific': {'affected_functions': ['diffoscope.comparators.utils.libarchive.LibarchiveContainer.ensure_unpacked', 'diffoscope.comparators.utils.libarchive.LibarchiveContainer.get_member_names', 'diffoscope.comparators.utils.libarchive.LibarchiveContainer.extract']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '76'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0359'}, {'type': 'WEB', 'url': 'https://github.com/anthraxx/diffoscope/commit/632a40828a54b399787c25e7fa243f732aef7e05'}, {'type': 'WEB', 'url': 'https://github.com/anthraxx/diffoscope/commit/f379d1f611dbd5d361e12b732e07c8aee45ff226'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854723'}, {'type': 'PACKAGE', 'url': 'https://github.com/anthraxx/diffoscope'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2017-0359'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:06Z', 'nvd_published_at': None}
1.4.0
GHSA-2p78-8hh6-96xc
2020-06-16T20:52:46Z
2018-07-23T19:52:21Z
null
['CVE-2011-1157']
Moderate severity vulnerability that affects feedparser
Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via malformed XML comments.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'feedparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1157'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=680074'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=684877'}, {'type': 'WEB', 'url': 'https://code.google.com/p/feedparser/issues/detail?id=254'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2p78-8hh6-96xc'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/03/14/18'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/03/15/11'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43730'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44074'}, {'type': 'WEB', 'url': 'http://support.novell.com/security/cve/CVE-2011-1157.html'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:082'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/46867'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:46Z', 'nvd_published_at': None}
1.4.0
GHSA-3c5c-7235-994j
2023-09-05T09:23:54Z
2018-07-24T20:15:13Z
null
['CVE-2016-2533']
Pillow buffer overflow in ImagingPcdDecode
Buffer overflow in the `ImagingPcdDecode` function in `PcdDecode.c` in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2533'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/1706'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3c5c-7235-994j'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst?plain=1#L53'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-52'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3499'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/02/02/5'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/02/22/2'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html'}]
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:46Z', 'nvd_published_at': None}
1.4.0
GHSA-j6w4-pg6p-5mrv
2023-09-12T21:19:52Z
2018-07-23T23:51:04Z
null
['CVE-2017-16106']
Directory Traversal in tmock
`tmock` is a static file server. `tmock` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host: localhost ``` and server Response: ```http HTTP/1.1 200 OK Date: Thu, 04 May 2017 23:59:18 GMT Connection: keep-alive Transfer-Encoding: chunked {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tmock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16106'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j6w4-pg6p-5mrv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/375'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:20Z', 'nvd_published_at': None}
1.4.0
GHSA-vfp9-gwrh-wq9g
2023-03-01T01:14:15Z
2018-07-18T21:20:19Z
null
['CVE-2018-3733']
Path Traversal in crud-file-server
Versions of `crud-file-server` prior to 0.9.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation Upgrade to version 0.9.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'crud-file-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3733'}, {'type': 'WEB', 'url': 'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310690'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vfp9-gwrh-wq9g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1003'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:36Z', 'nvd_published_at': '2018-05-29T20:29:00Z'}
1.4.0
GHSA-73jp-3c67-hjfv
2021-09-02T19:18:46Z
2018-07-26T15:53:31Z
null
['CVE-2016-7191']
Authentication Bypass in passport-azure-ad
Affected versions of `passport-azure-ad` do not recognize the `validateIssuer` setting, which allows remote attackers to bypass authentication via a crafted token. ## Recommendation Version 1.x: Update to version 1.4.6 or later. Version 2.x: Update to version 2.0.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'passport-azure-ad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'passport-azure-ad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7191'}, {'type': 'PACKAGE', 'url': 'https://github.com/AzureAD/passport-azure-ad'}, {'type': 'WEB', 'url': 'https://github.com/AzureAD/passport-azure-ad/blob/master/SECURITY-NOTICE.MD'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-73jp-3c67-hjfv'}, {'type': 'WEB', 'url': 'https://support.microsoft.com/en-us/kb/3187742'}, {'type': 'WEB', 'url': 'https://support.microsoft.com/kb/3187742'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/151'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/93213'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036996'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:12Z', 'nvd_published_at': None}
1.4.0
GHSA-wjr4-2jgw-hmv8
2023-09-12T21:12:31Z
2018-07-31T18:28:53Z
null
['CVE-2018-3772']
Command Injection in whereis
Versions of `whereis` before 0.4.1 are vulnerable to command injection if untrusted user input is passed into `whereis`. ## Recommendation Update to version 0.4.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'whereis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3772'}, {'type': 'WEB', 'url': 'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319476'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wjr4-2jgw-hmv8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/604'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:43Z', 'nvd_published_at': None}
1.4.0
GHSA-2qx8-589j-gcpx
2020-06-16T20:52:51Z
2018-07-23T20:26:45Z
null
['CVE-2011-1950']
Moderate severity vulnerability that affects Plone and plone.app.users
plone.app.users in Plone 4.0 and 4.1 allows remote authenticated users to modify the properties of arbitrary accounts via unspecified vectors, as exploited in the wild in June 2011.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone.app.users'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0a1'}, {'fixed': '1.0.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.users'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1b1'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1950'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67695'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2qx8-589j-gcpx'}, {'type': 'WEB', 'url': 'http://osvdb.org/72729'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone/security/advisories/CVE-2011-1950'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44775'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/8269'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/518155/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/48005'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:51Z', 'nvd_published_at': None}
1.4.0
GHSA-8m3r-rv5g-fcpq
2021-09-07T19:50:22Z
2018-07-23T21:01:00Z
null
['CVE-2011-0697']
Moderate severity vulnerability that affects django
Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0697'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=676359'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8m3r-rv5g-fcpq'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/02/09/6'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43230'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43297'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43382'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43426'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2163'}, {'type': 'WEB', 'url': 'http://www.djangoproject.com/weblog/2011/feb/08/security/'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/46296'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1066-1'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0372'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0388'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0429'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0439'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0441'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:54Z', 'nvd_published_at': None}
1.4.0
GHSA-3hq4-f2v6-q338
2023-09-01T20:29:04Z
2018-07-12T20:30:30Z
null
['CVE-2018-9856']
Kotti CSRF in the local roles implementation
Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a `/admin-document/@@share` request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Kotti'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Kotti'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0a1'}, {'fixed': '2.0.0b2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0b1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9856'}, {'type': 'WEB', 'url': 'https://github.com/Kotti/Kotti/issues/551'}, {'type': 'WEB', 'url': 'https://github.com/Kotti/Kotti/commit/69d3c8a5d7203ddaec5ced5901acf87baddd76be'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3hq4-f2v6-q338'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:14Z', 'nvd_published_at': None}
1.4.0
GHSA-h6hq-c896-w882
2021-09-14T15:28:52Z
2018-07-23T21:01:10Z
null
['CVE-2011-1949']
Low severity vulnerability that affects Plone
Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.2'}, {'fixed': '3.3.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1949'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67694'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h6hq-c896-w882'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://osvdb.org/72728'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone/security/advisories/CVE-2011-1949'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44775'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44776'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/8269'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/518155/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/48005'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:09Z', 'nvd_published_at': None}
1.4.0
GHSA-wwf2-5cj8-jx6w
2023-09-13T22:59:29Z
2018-07-23T20:50:21Z
null
['CVE-2017-16049']
nodesqlite is malware
The `nodesqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodesqlite'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16049'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wwf2-5cj8-jx6w'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/492'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:22Z', 'nvd_published_at': None}
1.4.0
GHSA-m85c-9mf8-m2m6
2023-08-23T22:09:03Z
2018-07-18T18:28:26Z
null
['CVE-2017-16763']
Unsafe deserialization in confire
An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'confire'}, 'ecosystem_specific': {'affected_functions': ['confire.config.Configuration.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16763'}, {'type': 'WEB', 'url': 'https://github.com/bbengfort/confire/issues/24'}, {'type': 'WEB', 'url': 'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m85c-9mf8-m2m6'}, {'type': 'PACKAGE', 'url': 'https://github.com/bbengfort/confire'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:21Z', 'nvd_published_at': None}
1.4.0
GHSA-c2w9-48qc-qpj4
2022-05-26T19:37:09Z
2018-07-13T15:16:54Z
null
['CVE-2017-2809']
Code injection in ansible
An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2809'}, {'type': 'WEB', 'url': 'https://github.com/tomoh1r/ansible-vault/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2w9-48qc-qpj4'}, {'type': 'PACKAGE', 'url': 'https://github.com/tomoh1r/ansible-vault'}, {'type': 'WEB', 'url': 'https://github.com/tomoh1r/ansible-vault/blob/v1.0.5/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0305'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100824'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:09Z', 'nvd_published_at': '2017-09-14T19:29:00Z'}
1.4.0
GHSA-3jqw-crqj-w8qw
2020-06-16T20:55:25Z
2018-07-23T19:51:35Z
null
['CVE-2011-4137']
Moderate severity vulnerability that affects django
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4137'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=737366'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3jqw-crqj-w8qw'}, {'type': 'WEB', 'url': 'https://hermes.opensuse.org/messages/14700881'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2011/sep/09/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2011/sep/10/127/'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/09/11/1'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/09/13/2'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/09/15/5'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/46614'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2332'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:25Z', 'nvd_published_at': None}
1.4.0
GHSA-333w-rxj3-f55r
2020-08-31T18:10:51Z
2018-07-24T20:00:30Z
null
['CVE-2017-16021']
Regular Expression Denial Of Service in uri-js
Affected versions of `uri-js` is susceptible to a regular expression denial of service vulnerability when user input is sent to the `.parse()` method. ## Recommendation Update to v3.0.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'uri-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16021'}, {'type': 'WEB', 'url': 'https://github.com/garycourt/uri-js/issues/12'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-333w-rxj3-f55r'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/100'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:45Z', 'nvd_published_at': None}
1.4.0
GHSA-hjf3-r7gw-9rwg
2020-06-16T21:40:30Z
2018-07-24T20:00:41Z
null
['CVE-2012-2921']
Moderate severity vulnerability that affects feedparser
Universal Feed Parser (aka feedparser or python-feedparser) before 5.1.2 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML ENTITY declaration in a non-ASCII encoded document.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'feedparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2921'}, {'type': 'WEB', 'url': 'https://code.google.com/p/feedparser/source/browse/trunk/NEWS?spec=svn706&r=706'}, {'type': 'WEB', 'url': 'https://code.google.com/p/feedparser/source/detail?r=703&path=/trunk/feedparser/feedparser.py'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjf3-r7gw-9rwg'}, {'type': 'WEB', 'url': 'https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0157'}, {'type': 'WEB', 'url': 'http://freecode.com/projects/feedparser/releases/344371'}, {'type': 'WEB', 'url': 'http://osvdb.org/81701'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/49256'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2013:118'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/53654'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:30Z', 'nvd_published_at': None}
1.4.0
GHSA-cqp5-m4pq-gfgp
2023-09-12T20:44:17Z
2018-07-26T15:18:43Z
null
['CVE-2018-3723']
Prototype Pollution in defaults-deep
Versions of `default-deep` before 0.2.4 are vulnerable to prototype pollution ## Recommendation Update to version 0.2.4 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'defaults-deep'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3723'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/defaults-deep/commit/c873f341327ad885ff4d0f23b3d3bca31b0343e5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310514'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cqp5-m4pq-gfgp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/581'}]
{'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:27Z', 'nvd_published_at': None}
1.4.0
GHSA-cq94-qf6q-mf2h
2023-09-05T18:13:33Z
2018-07-16T16:50:30Z
null
['CVE-2017-1000246']
Pysaml2 improperly initializes encryption vector
Python package pysaml2 version 4.5.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000246'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/issues/417'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/pull/519/commits/7323f5c20efb59424d853c822e7a26d1aa3e84aa'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cq94-qf6q-mf2h'}, {'type': 'PACKAGE', 'url': 'https://github.com/rohe/pysaml2'}]
{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:20Z', 'nvd_published_at': None}
1.4.0
GHSA-p7h9-vf92-5fj5
2023-02-13T16:51:50Z
2018-07-23T19:50:57Z
null
['CVE-2011-1948']
Cross-site scripting in Products.CMFPlone and Products.PasswordResetTool
Cross-site scripting (XSS) vulnerability in Plone 4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Products.PasswordResetTool'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFPlone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFPlone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1a1'}, {'fixed': '4.1rc3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1rc2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1948'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2012:0151'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2011-1948'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=711494'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67693'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p7h9-vf92-5fj5'}, {'type': 'WEB', 'url': 'http://osvdb.org/72727'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone/security/advisories/CVE-2011-1948'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44775'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/44776'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/8269'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/518155/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/48005'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:29Z', 'nvd_published_at': '2011-06-06T19:55:00Z'}
1.4.0
GHSA-hxf5-mg84-pj4m
2020-06-17T15:14:53Z
2018-07-31T23:03:17Z
2020-06-17T15:14:53Z
[]
Moderate severity vulnerability that affects moment
Withdrawn, accidental duplicate publish. The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)."
[]
[{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hxf5-mg84-pj4m'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:53Z', 'nvd_published_at': None}
1.4.0
GHSA-8g7p-74h8-hg48
2021-09-07T19:45:18Z
2018-07-27T17:04:52Z
null
['CVE-2018-3739']
Denial of Service in https-proxy-agent
Versions of `https-proxy-agent` before 2.2.0 are vulnerable to denial of service. This is due to unsanitized options (proxy.auth) being passed to `Buffer()`. ## Recommendation Update to version 2.2.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'https-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3736'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319532'}, {'type': 'PACKAGE', 'url': 'https://github.com/TooTallNate/node-https-proxy-agent'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8g7p-74h8-hg48'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/593'}]
{'cwe_ids': ['CWE-125', 'CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:32Z', 'nvd_published_at': None}
1.4.0
GHSA-jp27-cwp2-5qqr
2023-09-13T21:43:41Z
2018-07-23T20:54:24Z
null
['CVE-2017-16045']
jquery.js is malware
The `jquery.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16045'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jp27-cwp2-5qqr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/496'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:53Z', 'nvd_published_at': None}
1.4.0
GHSA-686g-3xr3-x4x6
2021-09-01T22:46:06Z
2018-07-18T18:33:15Z
null
['CVE-2018-3809']
Information Exposure on Case Insensitive File Systems in serve
Versions of `serve` before 7.0.0 are vulnerable to information exposure, bypassing the ignore security control, but only on case insensitive file systems. ## Recommendation Update to version 7.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3809'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330650'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-686g-3xr3-x4x6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/672'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:32Z', 'nvd_published_at': None}
1.4.0
GHSA-rwr3-c2q8-gm56
2023-09-05T09:20:57Z
2018-07-24T20:08:27Z
null
['CVE-2016-9189']
Pillow Integer overflow in Map.c
Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the `Image.core.map_buffer` in `map.c` component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9189'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/2105'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rwr3-c2q8-gm56'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-52'}, {'type': 'WEB', 'url': 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3710'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/94234'}]
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:09Z', 'nvd_published_at': None}
1.4.0
GHSA-4vcm-qfxh-p6c3
2023-09-11T23:14:01Z
2018-07-23T20:40:29Z
null
['CVE-2017-16192']
Directory Traversal in getcityapi.yoehoehne
Affected versions of `getcityapi.yoehoehne` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'getcityapi.yoehoehne'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16192'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/getcityapi.yoehoehne'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4vcm-qfxh-p6c3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/438'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:12Z', 'nvd_published_at': None}
1.4.0
GHSA-9j5m-873f-xh76
2023-09-11T16:35:44Z
2018-07-23T20:46:32Z
null
['CVE-2017-16152']
Directory Traversal in static-html-server
Affected versions of `static-html-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'static-html-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16152'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9j5m-873f-xh76'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/376'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:52Z', 'nvd_published_at': None}
1.4.0
GHSA-pq5x-rprq-8jrj
2023-09-13T20:26:39Z
2018-07-23T22:06:14Z
null
['CVE-2017-16130']
Directory Traversal in exxxxxxxxxxx
Affected versions of `exxxxxxxxxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. This vulnerability is only effective for files that have a file extension, which provides a partial mitigation. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'exxxxxxxxxxx'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16130'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pq5x-rprq-8jrj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/478'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:48Z', 'nvd_published_at': None}
1.4.0
GHSA-g8q2-24jh-5hpc
2023-09-26T18:29:18Z
2018-07-27T14:47:52Z
2020-06-16T21:36:34Z
[]
High severity vulnerability that affects jquery-ui
Withdrawn, accidental duplicate publish. Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7103'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g8q2-24jh-5hpc'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:34Z', 'nvd_published_at': None}
1.4.0
GHSA-2j9c-9vmv-7m39
2023-09-05T21:45:13Z
2018-07-31T18:18:39Z
null
['CVE-2017-11173']
Missing Regex anchor in Rack-Cors allows malicious third party site to perform CORS request
Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted `example.com` domain name and not the malicious `example.net` domain name, then `example.com.example.net` (as well as `example.com-example.net`) would be inadvertently allowed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-cors'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11173'}, {'type': 'WEB', 'url': 'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyu/rack-cors'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Jul/22'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3931'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:24Z', 'nvd_published_at': None}
1.4.0
GHSA-m79w-4mqv-r39f
2023-09-07T20:36:50Z
2018-07-31T22:06:33Z
null
['CVE-2016-10691']
windows-seleniumjar downloads Resources over HTTP
Affected versions of `windows-seleniumjar` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'windows-seleniumjar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.48.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10691'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m79w-4mqv-r39f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/296'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:13Z', 'nvd_published_at': None}
1.4.0
GHSA-rch9-xh7r-mqgw
2023-05-30T19:26:12Z
2018-07-26T15:08:05Z
null
['CVE-2018-3717']
Cross-Site Scripting in connect
connect node module before 2.14.0 suffers from a Cross-Site Scripting (XSS) vulnerability due to a lack of validation of file in directory.js middleware.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3717'}, {'type': 'WEB', 'url': 'https://github.com/JacksonTian/anywhere/issues/33#issuecomment-366527448'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/309394'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/309641'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rch9-xh7r-mqgw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/584'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/595'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:23Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}
1.4.0
GHSA-6f34-pq9f-36vf
2023-09-06T20:02:38Z
2018-07-23T20:50:29Z
null
['CVE-2017-16050']
sqlite.js is malware
The `sqlite.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[]
[{'package': {'ecosystem': 'npm', 'name': 'sqlite.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16050'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6f34-pq9f-36vf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/491'}]
{'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:01Z', 'nvd_published_at': None}
1.4.0
GHSA-ggq8-j54v-54x8
2023-09-13T23:04:25Z
2018-07-23T20:47:02Z
null
['CVE-2017-16145']
Directory Traversal in sspa
Affected versions of `sspa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sspa'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16145'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ggq8-j54v-54x8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/463'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:18Z', 'nvd_published_at': None}
1.4.0
GHSA-mj4x-wcxf-hm8x
2023-08-25T23:55:12Z
2018-07-31T18:13:51Z
null
['CVE-2018-1000539']
Json-jwt did not verify the cryptographic signature for data
The json-jwt rubygem version >= 0.5.0 && < 1.9.4 contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability in Decryption of AES-GCM encrypted JSON Web Tokens that can result in Attacker can forge a authentication tag. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 1.9.4 and later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'json-jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.1'}, {'fixed': '1.9.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000539'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/commit/a3b2147f0f6d9aca653e7a30e453d3a92b33413f'}, {'type': 'PACKAGE', 'url': 'https://github.com/nov/json-jwt'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json-jwt/CVE-2018-1000539.yml'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4283'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:30Z', 'nvd_published_at': None}
1.4.0
GHSA-cfxm-4p54-5w7h
2023-09-13T23:04:16Z
2018-07-24T00:20:57Z
null
['CVE-2017-16107']
Directory traversal in pooledwebsocket
Affected versions of `pooledwebsocket` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to version 0.0.19 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'pooledwebsocket'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16107'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfxm-4p54-5w7h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/341'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:27Z', 'nvd_published_at': None}
1.4.0
GHSA-68cm-mgv7-vg5c
2023-09-07T22:52:46Z
2018-07-23T20:45:11Z
null
['CVE-2017-16173']
Directory Traversal in utahcityfinder
Affected versions of `utahcityfinder` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'utahcityfinder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16173'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/utahcityfinder'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-68cm-mgv7-vg5c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/467'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:37Z', 'nvd_published_at': None}
1.4.0
GHSA-8qp3-pvwc-2g4p
2023-09-08T20:34:44Z
2018-07-23T20:49:58Z
null
['CVE-2017-16054']
nodefabric is malware
The `nodefabric` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodefabric'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16054'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qp3-pvwc-2g4p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/488'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:26Z', 'nvd_published_at': None}
1.4.0
GHSA-ghjx-3jg5-h6r2
2021-09-10T21:36:44Z
2018-07-13T15:17:10Z
null
['CVE-2017-9462']
High severity vulnerability that affects mercurial
In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mercurial'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9462'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1576'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/861243'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ghjx-3jg5-h6r2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201709-18'}, {'type': 'WEB', 'url': 'https://www.mercurial-scm.org/repo/hg/rev/77eaf9539499'}, {'type': 'WEB', 'url': 'https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.1.3_.282017-4-18.29'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3963'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99123'}]
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:26Z', 'nvd_published_at': None}
1.4.0
GHSA-fx46-whrj-73v5
2023-09-12T20:47:14Z
2018-07-24T20:06:17Z
null
['CVE-2017-0928']
Bypassing Sanitization using DOM clobbering in html-janitor
All versions of `html-janitor` are vulnerable to cross-site scripting (XSS). Arbitrary HTML can pass the sanitization process, which can be unexpected and dangerous (XSS) in case user-controlled input is passed to the clean function." ## Recommendation Upgrade to version 2.0.4 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'html-janitor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0928'}, {'type': 'WEB', 'url': 'https://github.com/guardian/html-janitor/issues/35'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/308158'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fx46-whrj-73v5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/569'}]
{'cwe_ids': ['CWE-547', 'CWE-642'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:41Z', 'nvd_published_at': None}
1.4.0
GHSA-wm77-q74p-5763
2021-08-09T22:21:02Z
2018-07-27T17:06:03Z
null
[]
Path Traversal in superstatic
Affected of `superstatic` are vulnerable to path traversal when used on Windows. Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0). ## Recommendation Update to version 5.0.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'superstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/firebase/superstatic/pull/255'}, {'type': 'WEB', 'url': 'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'}, {'type': 'WEB', 'url': 'https://github.com/firebase/superstatic/blob/v5.0.1/lib/providers/fs.js#L71'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/652'}]
{'cwe_ids': ['CWE-177'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:48Z', 'nvd_published_at': None}
1.4.0
GHSA-q75g-2496-mxpp
2020-08-31T18:26:32Z
2018-07-24T20:11:13Z
null
['CVE-2017-16113']
Regular Expression Denial of Service in parsejson
Affected versions of `parsejson` are vulnerable to a regular expression denial of service when parsing untrusted user input. ## Recommendation The `parsejson` package has not been functionally updated since it was initially released. Additionally, it provides functionality which is natively included in Node.js, and therefore the native `JSON.parse()` should be used, for both performance and security reasons.
[]
[{'package': {'ecosystem': 'npm', 'name': 'parsejson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16113'}, {'type': 'WEB', 'url': 'https://github.com/get/parsejson/issues/4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q75g-2496-mxpp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/528'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:20Z', 'nvd_published_at': None}
1.4.0
GHSA-wxvm-fh75-mpgr
2020-06-17T15:15:19Z
2018-07-26T16:24:34Z
2020-06-17T15:15:19Z
[]
Critical severity vulnerability that affects dns-sync
Withdrawn, accidental duplicate publish. The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.
[]
[{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9682'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wxvm-fh75-mpgr'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:19Z', 'nvd_published_at': None}