schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 24
values | aliases
stringlengths 2
20
| summary
stringlengths 9
130
⌀ | details
stringlengths 34
11.7k
| severity
stringlengths 2
92
| affected
stringlengths 73
3.22k
| references
stringlengths 64
21.2k
| database_specific
stringlengths 131
202
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-g376-whg7-896m | 2020-08-31T18:23:39Z | 2020-09-01T18:45:53Z | null | [] | Directory Traversal in yjmyjmyjm | Affected versions of `yjmyjmyjm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'yjmyjmyjm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yjmyjmyjm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/451'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g5m5-v5cp-5p7m | 2023-09-11T23:15:25Z | 2020-09-01T18:50:16Z | null | ['CVE-2017-16181'] | Directory Traversal in wintiwebdev | Affected versions of `wintiwebdev` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'wintiwebdev'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16181'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wintiwebdev'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/458'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8h8v-6qqm-fwpq | 2020-08-31T18:32:22Z | 2020-09-01T21:06:38Z | null | [] | Path Traversal in express-cart | Versions of `express-cart` before 1.1.7 are vulnerable to Path Traversal.
## Recommendation
Update to version 1.1.7 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.5'}}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/343726'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/676'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-992f-wf4w-x36v | 2020-08-31T18:33:09Z | 2020-09-01T21:16:13Z | null | [] | Prototype Pollution in merge-objects | All versions of `merge-objects` are vulnerable to Prototype Pollution.
## Recommendation
No fix is available for this vulnerability at this time. It is our recommendation to use an alternative package. | [] | [{'package': {'ecosystem': 'npm', 'name': 'merge-objects'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/310706'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/716'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rm7c-x424-g2mw | 2021-10-01T13:47:19Z | 2020-09-02T18:36:31Z | null | [] | Malicious Package in asyync | All versions of `asyync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'asyync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/843'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fm4j-4xhm-xpwx | 2020-08-31T18:34:58Z | 2020-09-02T15:51:34Z | null | [] | Sandbox Breakout / Arbitrary Code Execution in sandbox | All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. Due to insufficient input sanitization it is possible to escape the sandbox using constructors.
## Proof of concept
```
var Sandbox = require("sandbox")
s = new Sandbox()
code = `new Function("return (this.constructor.constructor('return (this.process.mainModule.constructor._load)')())")()("util").inspect("hi")`
s.run(code)
```
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gf3/sandbox/issues/50'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/766'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-699q-wcff-g9mj | 2021-01-07T22:56:34Z | 2020-09-15T18:19:56Z | null | ['CVE-2020-15148'] | Unsafe deserialization in Yii 2 | ### Impact
Remote code execution in case application calls `unserialize()` on user input containing specially crafted string.
### Patches
2.0.38
### Workarounds
Add the following to BatchQueryResult.php:
```php
public function __sleep()
{
throw new \BadMethodCallException('Cannot serialize '.__CLASS__);
}
public function __wakeup()
{
throw new \BadMethodCallException('Cannot unserialize '.__CLASS__);
}
```
### For more information
If you have any questions or comments about this advisory, [contact us through security form](https://www.yiiframework.com/security). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.38'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15148'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-15T18:19:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m8pw-hgvj-cwcm | 2023-09-11T20:34:10Z | 2020-09-01T18:08:55Z | null | ['CVE-2017-16215'] | Directory Traversal in sgqserve | Affected versions of `sgqserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sgqserve'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16215'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/419'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c6pw-q7f2-97hv | 2021-06-15T17:25:24Z | 2020-09-04T17:57:43Z | null | ['CVE-2019-0219'] | Privilege Escalation in cordova-plugin-inappbrowser | Versions of `cordova-plugin-inappbrowser` prior to 3.1.0 are vulnerable to Privilege Escalation. A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI. This affects Cordova Android applications using the package.
## Recommendation
Upgrade to version 3.1.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'cordova-plugin-inappbrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0219'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/4vtg0trdrh5203dktt4f3vkd5z2d5ndj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1467'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/28/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:21Z', 'nvd_published_at': '2020-01-14T15:15:00Z'} |
1.4.0 | GHSA-mmph-wp49-r48h | 2021-10-01T14:02:46Z | 2020-09-02T20:20:26Z | null | [] | Malicious Package in experss | All versions of `experss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'experss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/852'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g64q-3vg8-8f93 | 2021-10-04T20:58:50Z | 2020-09-03T15:47:10Z | null | [] | Prototype Pollution in subtext | All versions of `subtext` are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed.
## Recommendation
This package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`. | [] | [{'package': {'ecosystem': 'npm', 'name': 'subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1479'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v6gv-fg46-h89j | 2020-08-31T18:43:51Z | 2020-09-03T16:48:36Z | null | [] | Sensitive Data Exposure in put | All versions of `put` are vulnerable to Uninitialized Memory Exposure. The package incorrectly calculates the allocated Buffer size and does not trim the bytes written, which may allow attackers to access uninitialized memory containing sensitive data. This vulnerability only affects versions of Node.js <=6.x.
## Recommendation
Upgrade your Node.js version or consider using an alternative package. | [] | [{'package': {'ecosystem': 'npm', 'name': 'put'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/321702'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1007'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gwpf-62xp-vrg6 | 2021-09-28T16:53:04Z | 2020-09-11T21:14:49Z | null | ['CVE-2016-6799'] | Information Exposure in cordova-android | Versions of `cordova-android` prior to 6.0.0 are vulnerable to Information Exposure through log files. The application calls methods of the Log class. Messages passed to these methods (Log.v(), Log.d(), Log.i(), Log.w(), and Log.e()) are stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs are kept in addition to the current log. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications.
## Recommendation
Upgrade to version 6.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'cordova-android'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6799'}, {'type': 'WEB', 'url': 'https://github.com/apache/cordova-android/commit/4a0a7bc424fae14c9689f4a8a2dc250ae3a47f82'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6799'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cordova-android'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1f3e7b0319d64b455f73616f572acee36fbca31f87f5b2e509c45b69@%3Cdev.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CORDOVAANDROID-174935'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/964'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98365'}] | {'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f8rj-4v7g-p5rj | 2023-09-07T21:55:43Z | 2020-09-01T18:53:29Z | null | ['CVE-2017-16176'] | Directory Traversal in jansenstuffpleasework | Affected versions of `jansenstuffpleasework` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jansenstuffpleasework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16176'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jansenstuffpleasework'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/464'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m2mx-rfpw-jghv | 2023-08-21T19:57:14Z | 2020-09-04T18:01:59Z | null | ['CVE-2020-13110'] | DLL Injection in kerberos | Version of `kerberos` prior to 1.0.0 are vulnerable to DLL Injection. The package loads DLLs without specifying a full path. This may allow attackers to create a file with the same name in a folder that precedes the intended file in the DLL path search. Doing so would allow attackers to execute arbitrary code in the machine.
## Recommendation
Upgrade to version 1.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'kerberos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13110'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb-js/kerberos'}, {'type': 'WEB', 'url': 'https://medium.com/@kiddo_Ha3ker/dll-injection-attack-in-kerberos-npm-package-cb4b32031cd'}, {'type': 'WEB', 'url': 'https://www.linkedin.com/posts/op-innovate_dll-injection-attack-in-kerberos-npm-package-activity-6667043749547253760-kVlW'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1514'}, {'type': 'WEB', 'url': 'https://www.op-c.net/2020/05/15/dll-injection-attack-in-kerberos-npm-package/'}] | {'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6x8c-mvpv-5366 | 2023-09-07T20:43:08Z | 2020-09-01T18:18:32Z | null | ['CVE-2017-16147'] | Directory Traversal in shit-server | Affected versions of `shit-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'shit-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16147'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/430'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2mvq-xp48-4c77 | 2021-09-29T18:37:04Z | 2020-09-03T20:35:29Z | null | [] | Denial of Service in subtext | All versions of `subtext` are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service.
## Recommendation
This package is not actively maintained and has been moved to `@hapi/subtext` where version 6.1.2. | [] | [{'package': {'ecosystem': 'npm', 'name': 'subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hapijs/subtext/issues/72'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/subtext'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1168'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p2r2-h92r-w2mg | 2023-09-05T22:46:22Z | 2020-09-01T18:11:03Z | null | ['CVE-2017-16213'] | Directory Traversal in mfrserver | Affected versions of `mfrserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'mfrserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16213'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/421'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5g4r-87v2-jqvx | 2020-08-31T18:14:17Z | 2020-09-01T16:05:44Z | null | ['CVE-2016-10564'] | Downloads Resources over HTTP in apk-parser | apk-parser is a tool to extract Android Manifest info from an APK file.
apk-parser versions below 0.1.6 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
## Recommendation
Update to version 0.1.6 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'apk-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10564'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/195'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:14:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pv55-r6j3-wp94 | 2023-07-27T00:04:06Z | 2020-09-01T20:45:57Z | null | [] | Malicious Package in eslint-config-eslint | Version 5.0.2 of `eslint-config-eslint` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to a remote server.
## Recommendation
The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
Users may consider downgrading to version 5.0.1 | [] | [{'package': {'ecosystem': 'npm', 'name': 'eslint-config-eslint'}, 'versions': ['5.0.2']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/674'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h44f-769q-j6px | 2021-10-01T14:08:15Z | 2020-09-02T20:33:14Z | null | [] | Malicious Package in requet | All versions of `requet` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'requet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/864'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wgw3-gf4p-62xc | 2020-08-31T18:42:46Z | 2020-09-11T21:16:59Z | null | [] | Command Injection in wizard-syncronizer | All versions of `wizard-syncronizer` are vulnerable to Command Injection. The package does not validate input on the `cloneAndSync` function and concatenates it to an exec call. This can be abused through a malicious widget containing the payload in the `gitURL` value or through a MITM attack since the package does not enforce HTTPS. This may allow attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'wizard-syncronizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/977'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4r5x-qjqc-p579 | 2021-09-23T21:47:44Z | 2020-09-01T18:57:44Z | null | ['CVE-2017-16126'] | Tracking Module in botbait | The module `botbait` is a tool to be used to track bot and automated tools usage with-in the npm ecosystem.
`botbait` is known to record and track user information.
The module tracks the following information.
- Source IP
- process.versions
- process.platform
- How the module was invoked (test, require, pre-install)
## Recommendation
This package has no functional value, and should be removed from your environment if discovered. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'botbait'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16126'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210120201359/https://www.npmjs.com/advisories/483'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pp7h-53gx-mx7r | 2022-05-26T20:43:51Z | 2020-09-02T15:26:19Z | null | ['CVE-2020-8244'] | Remote Memory Exposure in bl | A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8244'}, {'type': 'WEB', 'url': 'https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e'}, {'type': 'WEB', 'url': 'https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190'}, {'type': 'WEB', 'url': 'https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/966347'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html'}] | {'cwe_ids': ['CWE-125', 'CWE-126'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-02T15:26:05Z', 'nvd_published_at': '2020-08-30T15:15:00Z'} |
1.4.0 | GHSA-c3px-v9c7-m734 | 2020-08-31T18:47:02Z | 2020-09-03T19:04:39Z | null | [] | Prototype Pollution in mithril | Affected versions of `mithril`are vulnerable to prototype pollution. The function `parseQueryString` may allow a malicious user to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. A payload such as `__proto__%5BtoString%5D=123` in the query string would change the `toString()` function to `123`.
## Recommendation
If you are using mithril 2.x, upgrade to version 2.0.2 or later.
If you are using mithril 1.x, upgrade to version 1.1.7 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'mithril'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mithril'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1094'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p9pc-299p-vxgp | 2022-08-02T21:44:02Z | 2020-09-04T18:00:54Z | null | ['CVE-2020-7608'] | yargs-parser Vulnerable to Prototype Pollution | Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument `--foo.__proto__.bar baz'` adds a `bar` property with value `baz` to all objects. This is only exploitable if attackers have control over the arguments being passed to `yargs-parser`.
## Recommendation
Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '13.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '15.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '18.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7608'}, {'type': 'WEB', 'url': 'https://github.com/yargs/yargs-parser/commit/1c417bd0b42b09c475ee881e36d292af4fa2cc36'}, {'type': 'WEB', 'url': 'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/yargs/yargs-parser'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1500'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:32Z', 'nvd_published_at': '2020-03-16T20:15:00Z'} |
1.4.0 | GHSA-4p7j-5ppx-rfhm | 2021-01-07T23:32:43Z | 2020-09-01T16:06:49Z | null | ['CVE-2016-10574'] | Downloads Resources over HTTP in apk-parser3 | Affected versions of `apk-parser3` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser3`.
## Recommendation
Update to version 0.1.3 or greater. | [] | [{'package': {'ecosystem': 'npm', 'name': 'apk-parser3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10574'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/245'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:16:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rv6q-p3x7-43fx | 2021-10-01T20:42:01Z | 2020-09-04T16:37:50Z | null | [] | Malicious Package in bitcoimjs-lib | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bitcoimjs-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1364'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f2rc-6xjq-95gq | 2023-09-13T23:05:56Z | 2020-09-01T17:24:57Z | null | ['CVE-2017-16161'] | Directory Traversal in shenliru | Affected versions of `shenliru` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'shenliru'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16161'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/389'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4x7w-frcq-v4m3 | 2020-08-31T18:49:56Z | 2020-09-03T20:38:47Z | null | [] | Path Traversal in @wturyn/swagger-injector | All versions of `@wturyn/swagger-injector` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the configured `dist` folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': '@wturyn/swagger-injector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1173'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mj87-8xf8-fp4w | 2020-08-31T18:19:38Z | 2020-09-01T16:42:51Z | null | ['CVE-2013-4939'] | Cross-Site Scripting in yui | Affected versions of `yui` are vulnerable to cross-site scripting in the `uploader.swf` and `io.swf` utilities, via script injection in the url.
## Recommendation
YUI has published their recommendation to fix this issue.
Their recommendation is to:
- Delete self-hosted copies of these files if you are not using them
- Use the Yahoo! CDN hosted files
- Use the patched files provided on the YUI Library [here](https://yuilibrary.com/support/20130515-vulnerability/#resolution). | [] | [{'package': {'ecosystem': 'npm', 'name': 'yui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.10.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4939'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/72837f969cdf9b63a7e7337edd069fa3b3950eea7c997cc2ff61aa0c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d8b9403dbab85a51255614949938b619bd03b1c944c76c48c6996a0e@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=232496'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/332'}, {'type': 'WEB', 'url': 'https://yuilibrary.com/support/20130515-vulnerability/'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-39678'}, {'type': 'WEB', 'url': 'http://yuilibrary.com/support/20130515-vulnerability/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6xg2-cf6h-x4v8 | 2021-09-29T20:58:54Z | 2020-09-03T21:53:05Z | null | [] | Malicious Package in buffer-por | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffer-por'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1243'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hv4w-jhcj-6wfw | 2020-08-31T18:49:43Z | 2020-09-03T20:34:23Z | null | [] | Cross-Site Scripting in snekserve | All versions of `snekserve` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'snekserve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1167'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-97mg-3cr6-3x4c | 2020-08-31T18:59:39Z | 2020-09-04T17:27:23Z | null | [] | Remote Code Execution in mongodb-query-parser | Versions of `mongodb-query-parser` prior to 2.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize queries, allowing attackers to execute arbitrary code in the system. Parsing the following payload executes `touch test-file`:
```'(function () { return (clearImmediate.constructor("return process;")()).mainModule.require("child_process").execSync("touch test-file").toString()})()'```
## Recommendation
Upgrade to version 2.0.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'mongodb-query-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1448'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7xfq-xh6v-4mrm | 2021-10-01T13:10:41Z | 2020-09-01T20:27:53Z | null | [] | Malicious Package in json-serializer | Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 2.0.10 of this module is found installed you will want to replace it with a version before or after 2.0.10. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'json-serializer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.10'}, {'fixed': '2.0.11'}]}], 'versions': ['2.0.10']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/630'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m852-866j-69j8 | 2021-10-01T13:27:58Z | 2020-09-01T20:47:01Z | null | [] | Malicious Package in eslint-config-airbnb-standard | Version 2.0.0 of `eslint-config-airbnb-standard` was published with a bundled version of `eslint-scope` that was found to contain malicious code. This code would read the users `.npmrc` file and send it's contents to a remote server.
## Recommendation
The best course of action if you found this package installed in your environment is to revoke all your npm tokens and use a different version of the module. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'eslint-config-airbnb-standard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}], 'versions': ['2.0.0']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/675'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-766v-7gjx-55hf | 2021-09-30T17:14:27Z | 2020-09-03T23:08:34Z | null | [] | Malicious Package in js-shq3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-shq3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1289'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r9cj-xj33-4q42 | 2021-09-29T21:26:56Z | 2020-09-03T22:21:54Z | null | [] | Malicious Package in buffgr-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffgr-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1260'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vwcg-7xqw-qcxw | 2020-09-18T14:06:03Z | 2020-09-18T18:03:59Z | null | ['CVE-2020-25489'] | Heap Overflow in PyMiniRacer | A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption.
More details on https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'py-mini-racer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sqreen/PyMiniRacer/security/advisories/GHSA-vwcg-7xqw-qcxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25489'}, {'type': 'WEB', 'url': 'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d'}, {'type': 'WEB', 'url': 'https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/'}, {'type': 'WEB', 'url': 'https://github.com/sqreen/PyMiniRacer/compare/v0.2.0...v0.3.0'}] | {'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-18T14:06:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5x7p-gm79-383m | 2021-10-01T13:28:51Z | 2020-09-01T21:11:57Z | null | [] | Malicious Package in regenraotr | All versions of `regenraotr` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'regenraotr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/684'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xpqw-fqpw-35fc | 2023-09-07T00:11:01Z | 2020-09-01T16:57:54Z | null | ['CVE-2017-16150'] | Directory Traversal in wangguojing123 | Affected versions of `wangguojing123` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'wangguojing123'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16150'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/wangguojing123'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/374'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vcg5-9xw6-r56c | 2021-09-30T21:55:54Z | 2020-09-02T21:40:49Z | null | [] | Malicious Package in logsymbles | Version 2.2.0 of `logsymbles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'logsymbles'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/908'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-54cr-gv8w-8324 | 2023-07-27T20:32:35Z | 2020-09-01T20:36:22Z | null | [] | Malicious Package in xoc | Version 1.0.7 of `xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.7 of this module is found installed you will want to replace it with a version before or after 1.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 1.0.5 | [] | [{'package': {'ecosystem': 'npm', 'name': 'xoc'}, 'versions': ['1.0.7']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/638'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-788m-pj96-7w2c | 2021-09-27T21:41:40Z | 2020-09-02T21:23:51Z | null | [] | Cross-Site Scripting in fomantic-ui | Versions of `fomantic-ui` are vulnerable to Cross-Site Scripting. Lack of output encoding on the selection dropdowns can lead to user input being executed instead of printed as text.
## Recommendation
Upgrade to version 2.7.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'fomantic-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/fomantic/Fomantic-UI'}, {'type': 'WEB', 'url': 'https://github.com/fomantic/Fomantic-UI/releases/tag/2.7.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/885'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8fw4-xh83-3j6q | 2021-09-28T16:58:42Z | 2020-09-11T21:18:05Z | null | [] | Cross-Site Scripting in diagram-js | Versions of `diagram-js` prior to 3.3.1 (for 3.x) and 2.6.2 (for 2.x) are vulnerable to Cross-Site Scripting. The package fails to escape output of user-controlled input in `search-pad`, allowing attackers to execute arbitrary JavaScript.
## Recommendation
If you are using diagram-js 3.x, upgrade to version 3.3.1.
If you are using diagram-js 2.x, upgrade to version 2.6.2. | [] | [{'package': {'ecosystem': 'npm', 'name': 'diagram-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'diagram-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.1'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/bpmn-io/diagram-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/982'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-39cx-xcwj-3rc4 | 2023-09-27T13:39:18Z | 2020-09-01T15:25:29Z | null | ['CVE-2008-6681'] | Cross-Site Scripting in dojo | Affected versions of `dojo` are susceptible to a cross-site scripting vulnerability in the `dijit.Editor` and `textarea` components, which execute their contents as Javascript, even when sanitized.
## Recommendation
Update to version 1.1.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-6681'}, {'type': 'WEB', 'url': 'https://bugs.dojotoolkit.org/ticket/2140'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/49883'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/107'}, {'type': 'WEB', 'url': 'http://trac.dojotoolkit.org/changeset/15346'}, {'type': 'WEB', 'url': 'http://trac.dojotoolkit.org/ticket/2140'}, {'type': 'WEB', 'url': 'http://www.dojotoolkit.org/book/dojo-1-1-release-notes'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/34661'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w3cg-6577-wx9f | 2023-09-11T20:33:24Z | 2020-09-01T17:20:41Z | null | ['CVE-2017-16122'] | Directory Traversal in cuciuci | Affected versions of `cuciuci` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'cuciuci'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16122'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cuciuci'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/381'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4g9f-63rx-5cw4 | 2021-08-26T15:09:19Z | 2020-09-25T18:28:14Z | null | ['CVE-2020-15190'] | Segfault in Tensorflow | ### Impact
The [`tf.raw_ops.Switch`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/Switch) operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor.
However, the eager runtime traverses all tensors in the output:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/common_runtime/eager/kernel_and_device.cc#L308-L313
Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault
### Patches
We have patched the issue in da8558533d925694483d2c136a9220d6d49d843c and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15190'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}] | {'cwe_ids': ['CWE-20', 'CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T16:14:42Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-qfc9-x7gv-27jr | 2021-09-30T20:03:51Z | 2020-09-03T18:12:36Z | null | [] | Malicious Package in deasyncp | All versions of `deasyncp ` contain malicious code. The package shuts down the machine upon installation as a preinstall script.
## Recommendation
Remove the package from your environment. There is no further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'deasyncp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1073'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7696-qr5q-pg37 | 2021-10-01T16:10:59Z | 2020-09-03T23:19:08Z | null | [] | Malicious Package in zs-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'zs-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1299'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-65xx-c85x-wg76 | 2020-08-31T18:59:26Z | 2020-09-04T17:20:52Z | null | [] | Command Injection in plotter | All versions of `plotter` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory:
```
var plot = require('plotter').plot;
const title = 'Example "\nset title system("touch testing")#';
plot({
data: [ 3, 1, 2, 3, 4 ],
filename: 'output.pdf',
style: 'linespoints',
title: title,
logscale: true,
xlabel: 'time',
ylabel: 'length of string',
format: 'pdf'
});
```
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'plotter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1441'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vv7g-pjw9-4qj9 | 2021-10-04T15:24:14Z | 2020-09-03T17:03:56Z | null | [] | Malicious Package in scrytsy | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'scrytsy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1408'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jfx5-7mr2-g8hg | 2021-09-30T18:35:26Z | 2020-09-03T17:31:41Z | null | [] | Malicious Package in alico | All versions of `alico` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'alico'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1047'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mp55-2274-4pj8 | 2021-09-29T21:03:38Z | 2020-09-03T21:54:09Z | null | [] | Malicious Package in buffer-xgr | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffer-xgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1244'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-353r-3v84-9pjj | 2021-10-01T13:25:56Z | 2020-09-01T20:40:36Z | null | [] | Malicious Package in nothing-js | `nothing-js` contained a malicious script that attempted to delete all files when `npm test` was run.
## Recommendation
This module has been unpublished from the npm Registry. If you find this module in your environment remove it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nothing-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/650'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:31:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gc25-3vc5-2jf9 | 2020-08-31T18:54:57Z | 2020-09-04T15:00:58Z | null | [] | Sandbox Breakout / Arbitrary Code Execution in sandbox | All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1318'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4xf9-pgvv-xx67 | 2021-09-29T18:16:33Z | 2020-09-03T20:27:46Z | null | [] | Regular Expression Denial of Service in simple-markdown | Versions of `simple-markdown` prior to 0.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS). The `SimpleMarkdown.defaultInlineParse()` function has significantly degraded performance when parsing inline code blocks.
## Recommendation
Upgrade to version 0.5.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'simple-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Khan/simple-markdown/issues/71'}, {'type': 'PACKAGE', 'url': 'https://github.com/Khan/simple-markdown'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SIMPLEMARKDOWN-460540'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1147'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m3j9-p4x2-97q6 | 2023-09-12T19:35:54Z | 2020-09-01T17:22:49Z | null | ['CVE-2017-16120'] | Directory Traversal in liyujing | Affected versions of `liyujing` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'liyujing'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16120'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/liyujing'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/387'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c3m8-x3cg-qm2c | 2021-09-29T18:45:07Z | 2020-09-03T20:39:53Z | null | [] | Configuration Override in helmet-csp | Versions of `helmet-csp` before to 2.9.1 are vulnerable to a Configuration Override affecting the application's Content Security Policy (CSP). The package's browser sniffing for Firefox deletes the `default-src` CSP policy, which is the fallback policy. This allows an attacker to remove an application's default CSP, possibly rendering the application vulnerable to Cross-Site Scripting.
## Recommendation
Upgrade to version 2.9.1 or later. Setting the `browserSniff` configuration to `false` in vulnerable versions also mitigates the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'helmet-csp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.2'}, {'fixed': '2.9.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a'}, {'type': 'PACKAGE', 'url': 'https://github.com/helmetjs/csp/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HELMETCSP-469436'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1176'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cvfm-xjc8-f2vm | 2020-08-31T19:00:44Z | 2020-09-03T15:46:36Z | null | [] | Denial of Service in @commercial/subtext | Version 5.1.1 of `@commercial/subtext` is vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 5.1.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': '@commercial/subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.1'}, {'fixed': '5.1.2'}]}], 'versions': ['5.1.1']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1477'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xh8g-j88w-6v59 | 2021-10-01T20:57:22Z | 2020-09-03T19:42:16Z | null | [] | Malicious Package in cionstring | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'cionstring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1381'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q9wr-gcjc-hq52 | 2020-08-31T18:55:23Z | 2020-09-04T15:12:13Z | null | [] | Prototype Pollution in reggae | All versions of `reggae` are vulnerable to prototype pollution. The function `set` does not restrict the modification of an Object's prototype, which may allow a malicious to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'reggae'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1331'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h24p-2c3m-5qf4 | 2021-10-01T16:14:52Z | 2020-09-03T23:23:23Z | null | [] | Malicious Package in owl-orchard-apple-sunshine | All versions of `owl-orchard-apple-sunshine` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'owl-orchard-apple-sunshine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1307'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5947-m4fg-xhqg | 2020-08-31T18:46:11Z | 2020-09-03T18:08:10Z | null | [] | Prototype Pollution in lodash.mergewith | Versions of `lodash.mergewith` before 4.6.1 are vulnerable to Prototype Pollution. The function 'mergeWith' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'lodash.mergewith'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1069'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m4vv-p6fq-jhqp | 2021-09-23T21:48:53Z | 2020-09-01T19:04:07Z | null | [] | Directory Traversal in @vivaxy/here | The @vivaxy/here module is a small web server that serves files with the process' working directory acting as the web root.
It is vulnerable to a directory traversal attack.
This means that files on the local file system which exist outside of the web root may be disclosed to an attacker. This might include confidential files.
Mitigating Factors:
If the node process is run as a user with very limited filesystem permissions, there is significantly less risk of exposing confidential/private information.
Proof of Concept:
```
curl "http://${SERVER_IP}:${SERVER_PORT}/..%2f..%2fetc/passwd"
```
## Recommendation
Run `npm i @vivaxy/here` to install the latest version that addresses this vulnerability. | [] | [{'package': {'ecosystem': 'npm', 'name': '@vivaxy/here'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296254'}, {'type': 'PACKAGE', 'url': 'https://github.com/vivaxy/here'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/557'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:27:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-77q4-m83q-w76v | 2021-09-24T20:59:15Z | 2020-09-01T21:18:20Z | null | ['CVE-2018-14730'] | Missing Origin Validation in browserify-hmr | Versions of `browserify-hmr` prior to 0.4.0 are missing origin validation on the websocket server.
This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation
Upgrade to version 0.4.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'browserify-hmr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14730'}, {'type': 'WEB', 'url': 'https://github.com/AgentME/browserify-hmr/issues/41'}, {'type': 'WEB', 'url': 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages'}, {'type': 'WEB', 'url': 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)'}, {'type': 'PACKAGE', 'url': 'https://github.com/AgentME/browserify-hmr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/726'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mf7c-58q5-7v65 | 2021-01-14T15:56:03Z | 2020-09-01T16:15:28Z | null | ['CVE-2016-10695'] | Downloads Resources over HTTP in npm-test-sqlite3-trunk | Affected versions of `npm-test-sqlite3-trunk` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `npm-test-sqlite3-trunk`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'npm-test-sqlite3-trunk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10695'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/297'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-36rh-ggpr-j3gj | 2022-08-11T13:19:15Z | 2020-09-14T16:38:40Z | null | [] | Renovate vulnerable to Azure DevOps token leakage in logs | ### Impact
Applies to Azure DevOps users only. The bot's token may be exposed in server or pipeline logs due to the `http.extraheader=AUTHORIZATION` parameter being logged without redaction. It is recommended that Azure DevOps users revoke their existing bot credentials and generate new ones after upgrading if there's a potential that logs have been saved to a location that others can view.
### Patches
Fixed in
### Workarounds
Do not share Renovate logs with anyone who cannot be trusted with access to the token.
| [] | [{'package': {'ecosystem': 'npm', 'name': 'renovate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.180.0'}, {'fixed': '23.25.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/renovatebot/renovate/security/advisories/GHSA-36rh-ggpr-j3gj'}, {'type': 'PACKAGE', 'url': 'https://github.com/renovatebot/renovate'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-14T16:38:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8c8c-4vfj-rrpc | 2022-03-04T22:02:50Z | 2020-09-01T19:05:11Z | null | [] | Reflected Cross-Site Scripting in redis-commander | Affected versions of `redis-commander` contain a cross-site scripting vulnerability in the `highlighterId` paramter of the clipboard.swf component on hosts serving Redis Commander.
Mitigating factors:
Flash must be installed / enabled for this to work. The below proof of concept was verified to work using Firefox 57.0 on Windows 10 by manually installing the [Flash NPAPI Windows plugin](https://get.adobe.com/flashplayer/otherversions/)
## Proof of concept
```
http://instance/jstree/_docs/syntax/clipboard.swf?highlighterId=\%22))}%20catch(e)%20{alert(document.domain);}//
```
## Recommendation
No direct patch for this vulnerability is currently available.
At this time, the best mitigation is to use an alternative, functionally equivalent package, or to use extreme caution when using redis-commander, ensuring that redis-commmander is the only web page you have open, and avoiding clicking on any links. | [] | [{'package': {'ecosystem': 'npm', 'name': 'redis-commander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}, {'fixed': '0.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296377'}, {'type': 'PACKAGE', 'url': 'https://github.com/joeferner/redis-commander'}, {'type': 'WEB', 'url': 'https://github.com/joeferner/redis-commander/releases/tag/v0.5.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/562'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:27:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cr4x-w2v7-4mmf | 2021-09-29T21:36:13Z | 2020-09-03T22:26:13Z | null | [] | Malicious Package in bufver-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'bufver-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1265'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c7pp-x73h-4m2v | 2021-09-27T15:43:19Z | 2020-09-02T15:53:46Z | null | [] | Cross-Site Scripting in bootstrap-vue | Versions of `bootstrap-vue` prior to 2.0.0-rc.12 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization, components may be vulnerable to Cross-Site Scripting through the `options` variable. This may lead to the execution of malicious JavaScript on the user's browser.
## Recommendation
Upgrade to version 2.0.0-rc.12 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'bootstrap-vue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-rc.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-rc.11'}}] | [{'type': 'WEB', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue/issues/1974'}, {'type': 'WEB', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue/pull/2134'}, {'type': 'WEB', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue/commit/ba6f3f8359e257589d744f180312c09bf9f12289'}, {'type': 'PACKAGE', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/770'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9vrw-m88g-w75q | 2020-08-31T19:00:40Z | 2020-09-03T15:45:53Z | null | [] | Denial of Service in @hapi/accept | Versions of `@hapi/accept` prior to 3.2.4 or 5.0.1 are vulnerable to Denial of Service. The Accept-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 3.2.4 or 5.0.1. | [] | [{'package': {'ecosystem': 'npm', 'name': '@hapi/accept'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/accept'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1475'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5x8q-gj67-rhf2 | 2021-09-30T21:23:24Z | 2020-09-02T21:18:33Z | null | [] | Malicious Package in discord_debug_log | All versions of `discord_debug_log` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'discord_debug_log'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/873'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xgf5-5gjr-4hjq | 2023-09-07T20:42:22Z | 2020-09-01T18:15:20Z | null | ['CVE-2017-16201'] | Directory Traversal in zjjserver | Affected versions of `zjjserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'zjjserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16201'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/zjjserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/427'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qhf6-vqq9-q2p7 | 2023-09-07T00:11:06Z | 2020-09-01T16:58:58Z | null | ['CVE-2017-16108'] | Directory Traversal in gaoxiaotingtingting | Affected versions of `gaoxiaotingtingting` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'gaoxiaotingtingting'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16108'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/377'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r3xc-47qg-h929 | 2021-09-28T17:38:45Z | 2020-09-03T17:06:09Z | null | [] | Cross-Site Scripting in @ionic/core | Versions of `@ionic/core` prior to 4.0.3, 4.1.3, 4.2.1 or 4.3.1 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. This issue affects the components:
- `<ion-alert>.message`
- `<ion-searchbar>.placeholder`
- `<ion-infinite-scroll-content>.loadingText`
- `<ion-refresher-content>.pullingText`
- `<ion-refresher-content>.refershingText`
## Recommendation
- If you are using @ionic/core 4.0.x, upgrade to 4.0.3 or later.
- If you are using @ionic/core 4.1.x, upgrade to 4.1.3 or later.
- If you are using @ionic/core 4.2.x, upgrade to 4.2.1 or later.
- If you are using @ionic/core 4.3.x, upgrade to 4.3.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ionic-team/ionic/issues/18065'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionic-team/ionic'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1023'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-74f5-4m28-gq5c | 2023-09-11T23:15:12Z | 2020-09-01T18:09:59Z | null | ['CVE-2017-16214'] | Directory Traversal in peiserver | Affected versions of `peiserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'peiserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16214'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/peiserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/420'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4f9m-pxwh-68hg | 2021-09-28T16:57:07Z | 2020-09-11T21:20:14Z | null | [] | Cross-Site Scripting in swagger-ui | Versions of `swagger-ui` prior to 3.20.9 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs used in the OAuth auth flow, which may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 3.20.9 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.20.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/pull/5190'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449921'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/976'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gfjr-xqhm-qvv3 | 2021-10-01T14:01:11Z | 2020-09-02T20:16:09Z | null | [] | Malicious Package in aysnc | All versions of `aysnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'aysnc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/848'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-76xq-58hj-vwm2 | 2021-09-30T22:06:07Z | 2020-09-11T21:16:59Z | null | [] | Malicious Package in test-module-a | All versions of `test-module-a` contain malicious code as a preinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking,
## Recommendation
Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'test-module-a'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/929'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-95hx-62rh-gg96 | 2022-10-05T14:46:27Z | 2020-09-15T17:34:17Z | null | ['CVE-2020-15178'] | Potential XSS injection In PrestaShop contactform | ### Impact
An attacker is able to inject javascript while using the contact form.
### Patches
The problem is fixed in v4.3.0
### References
[Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/contactform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1'}, {'fixed': '4.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PrestaShop/contactform/security/advisories/GHSA-95hx-62rh-gg96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15178'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/contactform/commit/a1da814bea7e5750b858a2dbbc58ace80379f42f'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/contactform'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/prestashop/contactform'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-15T17:33:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jfcc-rm7f-xgf8 | 2021-09-29T18:37:46Z | 2020-09-03T20:36:35Z | null | [] | Cross-Site Scripting in mavon-editor | All versions of `mavon-editor` are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mavon-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hinesboy/mavonEditor/issues/472'}, {'type': 'WEB', 'url': 'https://github.com/hinesboy/mavonEditor/pull/548'}, {'type': 'WEB', 'url': 'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72'}, {'type': 'PACKAGE', 'url': 'https://github.com/hinesboy/mavonEditor'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MAVONEDITOR-459108'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1169'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/mavon-editor'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gjcw-v447-2w7q | 2021-09-23T21:25:33Z | 2020-09-01T15:23:18Z | null | ['CVE-2016-1000223'] | Forgeable Public/Private Tokens in jws | Affected versions of the `jws` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT as a bearer token, the end result is a complete authentication bypass with minimal effort.
## Recommendation
Update to version 3.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000223'}, {'type': 'WEB', 'url': 'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e'}, {'type': 'WEB', 'url': 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianloveswords/node-jws'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:jws:20160726'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/88'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:10:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j67m-jg9p-ppg4 | 2021-10-01T16:10:45Z | 2020-09-03T23:18:05Z | null | [] | Malicious Package in ns-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ns-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1298'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jjgw-jf33-7fg9 | 2023-09-12T19:36:07Z | 2020-09-01T18:22:48Z | null | ['CVE-2017-16193'] | Directory Traversal in mfrs | Affected versions of `mfrs` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mfrs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16193'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrs'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/437'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wqhw-frpx-5mmp | 2020-08-31T18:36:09Z | 2020-09-02T16:01:33Z | null | [] | Command Injection in tomato | All versions of `tomato` are vulnerable to Command Injection. The /api/exec endpoint does not validate user input allowing attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'tomato'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/797'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7543-mr7h-6v86 | 2021-09-27T16:15:52Z | 2020-09-02T16:00:26Z | null | [] | Improper Authorization in googleapis | Versions of `googleapis` prior to 39.1.0 are vulnerable to Improper Authorization. Setting credentials to one client may apply to all clients which may cause requests to be sent with the incorrect credentials.
## Recommendation
Upgrade to version 39.1.0. | [] | [{'package': {'ecosystem': 'npm', 'name': 'googleapis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '39.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/googleapis/google-api-nodejs-client/issues/1594'}, {'type': 'PACKAGE', 'url': 'https://github.com/googleapis/google-api-nodejs-client'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/791'}] | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j3g2-m5jj-6336 | 2020-08-31T18:09:51Z | 2020-09-01T15:20:00Z | null | ['CVE-2015-9243'] | Unsafe Merging of CORS Configuration Conflict in hapi | Versions of `hapi` prior to 11.1.4 are affected by a vulnerability that causes route-level CORS configuration to override connection-level or server-level CORS defaults. This may result in a situation where CORS permissions are less restrictive than intended.
## Recommendation
Update hapi to version 11.1.4 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9243'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/issues/2980'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/65'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wgvj-6v57-wjh3 | 2021-09-30T21:37:06Z | 2020-09-02T21:30:14Z | null | [] | Malicious Package in bowee | Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'bowee'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/897'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f8mr-jv2c-v8mg | 2021-11-19T15:27:56Z | 2020-09-09T17:29:27Z | null | ['CVE-2020-15163'] | Invalid root may become trusted root in The Update Framework (TUF) | ### Impact
The Python TUF reference implementation `tuf<0.12` will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a man-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates.
While investigating the reported vulnerability, we discovered that the detailed client workflow was not fully implemented. Specifically, for step 1.3 the newly downloaded root metadata was not being verified with a threshold of keys specified in the new root metadata file.
This missing step of the client workflow has been implemented in [PR #1101](https://github.com/theupdateframework/tuf/pull/1101), which is included in [v0.14.0](https://github.com/theupdateframework/tuf/releases/tag/v0.14.0) of tuf.
### Patches
A [fix](https://github.com/theupdateframework/tuf/pull/885), is available in version [0.12](https://github.com/theupdateframework/tuf/releases/tag/v0.12.0) and newer.
### Workarounds
No workarounds are known for this issue.
### References
* Pull request resolving the invalid root becoming trusted issue [PR 885](https://github.com/theupdateframework/tuf/pull/885)
* Pull request implementing self verification of newly downloaded root metadata [PR 1101](https://github.com/theupdateframework/tuf/pull/1101) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15163'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/pull/885'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/tuf'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/releases/tag/v0.12.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/tuf'}] | {'cwe_ids': ['CWE-345', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-09T17:27:31Z', 'nvd_published_at': '2020-09-09T18:15:00Z'} |
1.4.0 | GHSA-49mg-94fc-2fx6 | 2020-08-31T19:00:00Z | 2020-09-04T17:32:49Z | null | [] | Command Injection in npm-git-publish | All versions of `npm-git-publish` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `execSync` call, which may allow attackers to execute arbitrary code in the system. The `publish` function is vulnerable through the `gitRemoteUrl` variable.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'npm-git-publish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/730121'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1458'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pc7q-c837-3wjq | 2021-10-04T15:56:21Z | 2020-09-03T17:02:58Z | null | [] | Malicious Package in wallet-address-validtaor | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'wallet-address-validtaor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1413'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f64g-whxf-w8f2 | 2021-09-29T20:56:59Z | 2020-09-03T21:44:06Z | null | [] | Malicious Package in buffar-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffar-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1236'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m7xv-7p93-g6q8 | 2023-07-27T20:05:00Z | 2020-09-03T00:35:35Z | null | [] | Malicious Package in libubx | Version 1.0.3 of `libubx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 1.0.2 | [] | [{'package': {'ecosystem': 'npm', 'name': 'libubx'}, 'versions': ['1.0.3']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/938'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mq9h-cwc2-6j5r | 2021-09-30T19:50:21Z | 2020-09-03T17:42:27Z | null | [] | Malicious Package in midway-dataproxy | All versions of `midway-dataproxy` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'midway-dataproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1056'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mhxg-pr3j-v9gr | 2021-10-01T20:59:03Z | 2020-09-03T19:41:22Z | null | [] | Malicious Package in colne | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'colne'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1386'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g336-c7wv-8hp3 | 2021-09-23T21:35:43Z | 2020-09-01T15:58:06Z | null | [] | Cross-Site Scripting in swagger-ui | Affected versions of `swagger-ui` are vulnerable to cross-site scripting via the `url` query string parameter.
## Recommendation
Update to 2.2.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/1617'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/commit/a1aea70f2c64533bf053a41d4da5a8accd0117b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/137'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h5vm-jhq7-w647 | 2021-10-01T14:01:26Z | 2020-09-02T20:17:13Z | null | [] | Malicious Package in momen | All versions of `momen` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'momen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/849'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gqf6-75v8-vr26 | 2020-08-31T18:58:56Z | 2020-09-04T16:56:11Z | null | [] | Arbitrary File Write in bin-links | Versions of `bin-links` prior to 1.1.5 are vulnerable to an Arbitrary File Write. The package fails to restrict access to folders outside of the intended `node_modules` folder through the `bin` field. This allows attackers to create arbitrary files in the system. Note it is not possible to overwrite files that already exist.
## Recommendation
Upgrade to version 1.1.5 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'bin-links'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.5'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1427'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gvm7-8fq3-qjj2 | 2021-10-01T20:50:15Z | 2020-09-03T19:43:18Z | null | [] | Malicious Package in bs85 | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bs85'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1378'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:04Z', 'nvd_published_at': None} |