schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
24 values
aliases
stringlengths
2
20
summary
stringlengths
9
130
details
stringlengths
34
11.7k
severity
stringlengths
2
92
affected
stringlengths
73
3.22k
references
stringlengths
64
21.2k
database_specific
stringlengths
131
202
1.4.0
GHSA-g376-whg7-896m
2020-08-31T18:23:39Z
2020-09-01T18:45:53Z
null
[]
Directory Traversal in yjmyjmyjm
Affected versions of `yjmyjmyjm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
[{'package': {'ecosystem': 'npm', 'name': 'yjmyjmyjm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yjmyjmyjm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/451'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:39Z', 'nvd_published_at': None}
1.4.0
GHSA-g5m5-v5cp-5p7m
2023-09-11T23:15:25Z
2020-09-01T18:50:16Z
null
['CVE-2017-16181']
Directory Traversal in wintiwebdev
Affected versions of `wintiwebdev` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'wintiwebdev'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16181'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wintiwebdev'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/458'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:53Z', 'nvd_published_at': None}
1.4.0
GHSA-8h8v-6qqm-fwpq
2020-08-31T18:32:22Z
2020-09-01T21:06:38Z
null
[]
Path Traversal in express-cart
Versions of `express-cart` before 1.1.7 are vulnerable to Path Traversal. ## Recommendation Update to version 1.1.7 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.5'}}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/343726'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/676'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:22Z', 'nvd_published_at': None}
1.4.0
GHSA-992f-wf4w-x36v
2020-08-31T18:33:09Z
2020-09-01T21:16:13Z
null
[]
Prototype Pollution in merge-objects
All versions of `merge-objects` are vulnerable to Prototype Pollution. ## Recommendation No fix is available for this vulnerability at this time. It is our recommendation to use an alternative package.
[]
[{'package': {'ecosystem': 'npm', 'name': 'merge-objects'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/310706'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/716'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:09Z', 'nvd_published_at': None}
1.4.0
GHSA-rm7c-x424-g2mw
2021-10-01T13:47:19Z
2020-09-02T18:36:31Z
null
[]
Malicious Package in asyync
All versions of `asyync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'asyync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/843'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:50Z', 'nvd_published_at': None}
1.4.0
GHSA-fm4j-4xhm-xpwx
2020-08-31T18:34:58Z
2020-09-02T15:51:34Z
null
[]
Sandbox Breakout / Arbitrary Code Execution in sandbox
All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. Due to insufficient input sanitization it is possible to escape the sandbox using constructors. ## Proof of concept ``` var Sandbox = require("sandbox") s = new Sandbox() code = `new Function("return (this.constructor.constructor('return (this.process.mainModule.constructor._load)')())")()("util").inspect("hi")` s.run(code) ``` ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gf3/sandbox/issues/50'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/766'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:58Z', 'nvd_published_at': None}
1.4.0
GHSA-699q-wcff-g9mj
2021-01-07T22:56:34Z
2020-09-15T18:19:56Z
null
['CVE-2020-15148']
Unsafe deserialization in Yii 2
### Impact Remote code execution in case application calls `unserialize()` on user input containing specially crafted string. ### Patches 2.0.38 ### Workarounds Add the following to BatchQueryResult.php: ```php public function __sleep() { throw new \BadMethodCallException('Cannot serialize '.__CLASS__); } public function __wakeup() { throw new \BadMethodCallException('Cannot unserialize '.__CLASS__); } ``` ### For more information If you have any questions or comments about this advisory, [contact us through security form](https://www.yiiframework.com/security).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.38'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15148'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-15T18:19:44Z', 'nvd_published_at': None}
1.4.0
GHSA-m8pw-hgvj-cwcm
2023-09-11T20:34:10Z
2020-09-01T18:08:55Z
null
['CVE-2017-16215']
Directory Traversal in sgqserve
Affected versions of `sgqserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sgqserve'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16215'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/419'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:25Z', 'nvd_published_at': None}
1.4.0
GHSA-c6pw-q7f2-97hv
2021-06-15T17:25:24Z
2020-09-04T17:57:43Z
null
['CVE-2019-0219']
Privilege Escalation in cordova-plugin-inappbrowser
Versions of `cordova-plugin-inappbrowser` prior to 3.1.0 are vulnerable to Privilege Escalation. A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI. This affects Cordova Android applications using the package. ## Recommendation Upgrade to version 3.1.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'cordova-plugin-inappbrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0219'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/4vtg0trdrh5203dktt4f3vkd5z2d5ndj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1467'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/28/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:21Z', 'nvd_published_at': '2020-01-14T15:15:00Z'}
1.4.0
GHSA-mmph-wp49-r48h
2021-10-01T14:02:46Z
2020-09-02T20:20:26Z
null
[]
Malicious Package in experss
All versions of `experss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'experss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/852'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:11Z', 'nvd_published_at': None}
1.4.0
GHSA-g64q-3vg8-8f93
2021-10-04T20:58:50Z
2020-09-03T15:47:10Z
null
[]
Prototype Pollution in subtext
All versions of `subtext` are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed. ## Recommendation This package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`.
[]
[{'package': {'ecosystem': 'npm', 'name': 'subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1479'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:49Z', 'nvd_published_at': None}
1.4.0
GHSA-v6gv-fg46-h89j
2020-08-31T18:43:51Z
2020-09-03T16:48:36Z
null
[]
Sensitive Data Exposure in put
All versions of `put` are vulnerable to Uninitialized Memory Exposure. The package incorrectly calculates the allocated Buffer size and does not trim the bytes written, which may allow attackers to access uninitialized memory containing sensitive data. This vulnerability only affects versions of Node.js <=6.x. ## Recommendation Upgrade your Node.js version or consider using an alternative package.
[]
[{'package': {'ecosystem': 'npm', 'name': 'put'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/321702'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1007'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:51Z', 'nvd_published_at': None}
1.4.0
GHSA-gwpf-62xp-vrg6
2021-09-28T16:53:04Z
2020-09-11T21:14:49Z
null
['CVE-2016-6799']
Information Exposure in cordova-android
Versions of `cordova-android` prior to 6.0.0 are vulnerable to Information Exposure through log files. The application calls methods of the Log class. Messages passed to these methods (Log.v(), Log.d(), Log.i(), Log.w(), and Log.e()) are stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs are kept in addition to the current log. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications. ## Recommendation Upgrade to version 6.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'cordova-android'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6799'}, {'type': 'WEB', 'url': 'https://github.com/apache/cordova-android/commit/4a0a7bc424fae14c9689f4a8a2dc250ae3a47f82'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6799'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cordova-android'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1f3e7b0319d64b455f73616f572acee36fbca31f87f5b2e509c45b69@%3Cdev.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CORDOVAANDROID-174935'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/964'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98365'}]
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:13Z', 'nvd_published_at': None}
1.4.0
GHSA-f8rj-4v7g-p5rj
2023-09-07T21:55:43Z
2020-09-01T18:53:29Z
null
['CVE-2017-16176']
Directory Traversal in jansenstuffpleasework
Affected versions of `jansenstuffpleasework` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jansenstuffpleasework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16176'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jansenstuffpleasework'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/464'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:07Z', 'nvd_published_at': None}
1.4.0
GHSA-m2mx-rfpw-jghv
2023-08-21T19:57:14Z
2020-09-04T18:01:59Z
null
['CVE-2020-13110']
DLL Injection in kerberos
Version of `kerberos` prior to 1.0.0 are vulnerable to DLL Injection. The package loads DLLs without specifying a full path. This may allow attackers to create a file with the same name in a folder that precedes the intended file in the DLL path search. Doing so would allow attackers to execute arbitrary code in the machine. ## Recommendation Upgrade to version 1.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'kerberos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13110'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb-js/kerberos'}, {'type': 'WEB', 'url': 'https://medium.com/@kiddo_Ha3ker/dll-injection-attack-in-kerberos-npm-package-cb4b32031cd'}, {'type': 'WEB', 'url': 'https://www.linkedin.com/posts/op-innovate_dll-injection-attack-in-kerberos-npm-package-activity-6667043749547253760-kVlW'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1514'}, {'type': 'WEB', 'url': 'https://www.op-c.net/2020/05/15/dll-injection-attack-in-kerberos-npm-package/'}]
{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:58Z', 'nvd_published_at': None}
1.4.0
GHSA-6x8c-mvpv-5366
2023-09-07T20:43:08Z
2020-09-01T18:18:32Z
null
['CVE-2017-16147']
Directory Traversal in shit-server
Affected versions of `shit-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'shit-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16147'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/430'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:50Z', 'nvd_published_at': None}
1.4.0
GHSA-2mvq-xp48-4c77
2021-09-29T18:37:04Z
2020-09-03T20:35:29Z
null
[]
Denial of Service in subtext
All versions of `subtext` are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service. ## Recommendation This package is not actively maintained and has been moved to `@hapi/subtext` where version 6.1.2.
[]
[{'package': {'ecosystem': 'npm', 'name': 'subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hapijs/subtext/issues/72'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/subtext'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1168'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:45Z', 'nvd_published_at': None}
1.4.0
GHSA-p2r2-h92r-w2mg
2023-09-05T22:46:22Z
2020-09-01T18:11:03Z
null
['CVE-2017-16213']
Directory Traversal in mfrserver
Affected versions of `mfrserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
[{'package': {'ecosystem': 'npm', 'name': 'mfrserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16213'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/421'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:29Z', 'nvd_published_at': None}
1.4.0
GHSA-5g4r-87v2-jqvx
2020-08-31T18:14:17Z
2020-09-01T16:05:44Z
null
['CVE-2016-10564']
Downloads Resources over HTTP in apk-parser
apk-parser is a tool to extract Android Manifest info from an APK file. apk-parser versions below 0.1.6 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. ## Recommendation Update to version 0.1.6 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'apk-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10564'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/195'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:14:17Z', 'nvd_published_at': None}
1.4.0
GHSA-pv55-r6j3-wp94
2023-07-27T00:04:06Z
2020-09-01T20:45:57Z
null
[]
Malicious Package in eslint-config-eslint
Version 5.0.2 of `eslint-config-eslint` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to a remote server. ## Recommendation The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens Users may consider downgrading to version 5.0.1
[]
[{'package': {'ecosystem': 'npm', 'name': 'eslint-config-eslint'}, 'versions': ['5.0.2']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/674'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:17Z', 'nvd_published_at': None}
1.4.0
GHSA-h44f-769q-j6px
2021-10-01T14:08:15Z
2020-09-02T20:33:14Z
null
[]
Malicious Package in requet
All versions of `requet` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'requet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/864'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:38Z', 'nvd_published_at': None}
1.4.0
GHSA-wgw3-gf4p-62xc
2020-08-31T18:42:46Z
2020-09-11T21:16:59Z
null
[]
Command Injection in wizard-syncronizer
All versions of `wizard-syncronizer` are vulnerable to Command Injection. The package does not validate input on the `cloneAndSync` function and concatenates it to an exec call. This can be abused through a malicious widget containing the payload in the `gitURL` value or through a MITM attack since the package does not enforce HTTPS. This may allow attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'wizard-syncronizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/977'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:46Z', 'nvd_published_at': None}
1.4.0
GHSA-4r5x-qjqc-p579
2021-09-23T21:47:44Z
2020-09-01T18:57:44Z
null
['CVE-2017-16126']
Tracking Module in botbait
The module `botbait` is a tool to be used to track bot and automated tools usage with-in the npm ecosystem. `botbait` is known to record and track user information. The module tracks the following information. - Source IP - process.versions - process.platform - How the module was invoked (test, require, pre-install) ## Recommendation This package has no functional value, and should be removed from your environment if discovered.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'botbait'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16126'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210120201359/https://www.npmjs.com/advisories/483'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:52Z', 'nvd_published_at': None}
1.4.0
GHSA-pp7h-53gx-mx7r
2022-05-26T20:43:51Z
2020-09-02T15:26:19Z
null
['CVE-2020-8244']
Remote Memory Exposure in bl
A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8244'}, {'type': 'WEB', 'url': 'https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e'}, {'type': 'WEB', 'url': 'https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190'}, {'type': 'WEB', 'url': 'https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/966347'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html'}]
{'cwe_ids': ['CWE-125', 'CWE-126'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-02T15:26:05Z', 'nvd_published_at': '2020-08-30T15:15:00Z'}
1.4.0
GHSA-c3px-v9c7-m734
2020-08-31T18:47:02Z
2020-09-03T19:04:39Z
null
[]
Prototype Pollution in mithril
Affected versions of `mithril`are vulnerable to prototype pollution. The function `parseQueryString` may allow a malicious user to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. A payload such as `__proto__%5BtoString%5D=123` in the query string would change the `toString()` function to `123`. ## Recommendation If you are using mithril 2.x, upgrade to version 2.0.2 or later. If you are using mithril 1.x, upgrade to version 1.1.7 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'mithril'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mithril'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1094'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:02Z', 'nvd_published_at': None}
1.4.0
GHSA-p9pc-299p-vxgp
2022-08-02T21:44:02Z
2020-09-04T18:00:54Z
null
['CVE-2020-7608']
yargs-parser Vulnerable to Prototype Pollution
Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--foo.__proto__.bar baz'` adds a `bar` property with value `baz` to all objects. This is only exploitable if attackers have control over the arguments being passed to `yargs-parser`. ## Recommendation Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '13.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '15.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '18.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'yargs-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7608'}, {'type': 'WEB', 'url': 'https://github.com/yargs/yargs-parser/commit/1c417bd0b42b09c475ee881e36d292af4fa2cc36'}, {'type': 'WEB', 'url': 'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/yargs/yargs-parser'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1500'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:32Z', 'nvd_published_at': '2020-03-16T20:15:00Z'}
1.4.0
GHSA-4p7j-5ppx-rfhm
2021-01-07T23:32:43Z
2020-09-01T16:06:49Z
null
['CVE-2016-10574']
Downloads Resources over HTTP in apk-parser3
Affected versions of `apk-parser3` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser3`. ## Recommendation Update to version 0.1.3 or greater.
[]
[{'package': {'ecosystem': 'npm', 'name': 'apk-parser3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10574'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/245'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:16:15Z', 'nvd_published_at': None}
1.4.0
GHSA-rv6q-p3x7-43fx
2021-10-01T20:42:01Z
2020-09-04T16:37:50Z
null
[]
Malicious Package in bitcoimjs-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bitcoimjs-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1364'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:32Z', 'nvd_published_at': None}
1.4.0
GHSA-f2rc-6xjq-95gq
2023-09-13T23:05:56Z
2020-09-01T17:24:57Z
null
['CVE-2017-16161']
Directory Traversal in shenliru
Affected versions of `shenliru` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'shenliru'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16161'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/389'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:26Z', 'nvd_published_at': None}
1.4.0
GHSA-4x7w-frcq-v4m3
2020-08-31T18:49:56Z
2020-09-03T20:38:47Z
null
[]
Path Traversal in @wturyn/swagger-injector
All versions of `@wturyn/swagger-injector` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the configured `dist` folder using relative paths. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': '@wturyn/swagger-injector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1173'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:56Z', 'nvd_published_at': None}
1.4.0
GHSA-mj87-8xf8-fp4w
2020-08-31T18:19:38Z
2020-09-01T16:42:51Z
null
['CVE-2013-4939']
Cross-Site Scripting in yui
Affected versions of `yui` are vulnerable to cross-site scripting in the `uploader.swf` and `io.swf` utilities, via script injection in the url. ## Recommendation YUI has published their recommendation to fix this issue. Their recommendation is to: - Delete self-hosted copies of these files if you are not using them - Use the Yahoo! CDN hosted files - Use the patched files provided on the YUI Library [here](https://yuilibrary.com/support/20130515-vulnerability/#resolution).
[]
[{'package': {'ecosystem': 'npm', 'name': 'yui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.10.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4939'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/72837f969cdf9b63a7e7337edd069fa3b3950eea7c997cc2ff61aa0c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d8b9403dbab85a51255614949938b619bd03b1c944c76c48c6996a0e@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=232496'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/332'}, {'type': 'WEB', 'url': 'https://yuilibrary.com/support/20130515-vulnerability/'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-39678'}, {'type': 'WEB', 'url': 'http://yuilibrary.com/support/20130515-vulnerability/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:38Z', 'nvd_published_at': None}
1.4.0
GHSA-6xg2-cf6h-x4v8
2021-09-29T20:58:54Z
2020-09-03T21:53:05Z
null
[]
Malicious Package in buffer-por
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'buffer-por'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1243'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:06Z', 'nvd_published_at': None}
1.4.0
GHSA-hv4w-jhcj-6wfw
2020-08-31T18:49:43Z
2020-09-03T20:34:23Z
null
[]
Cross-Site Scripting in snekserve
All versions of `snekserve` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'snekserve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1167'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:43Z', 'nvd_published_at': None}
1.4.0
GHSA-97mg-3cr6-3x4c
2020-08-31T18:59:39Z
2020-09-04T17:27:23Z
null
[]
Remote Code Execution in mongodb-query-parser
Versions of `mongodb-query-parser` prior to 2.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize queries, allowing attackers to execute arbitrary code in the system. Parsing the following payload executes `touch test-file`: ```'(function () { return (clearImmediate.constructor("return process;")()).mainModule.require("child_process").execSync("touch test-file").toString()})()'``` ## Recommendation Upgrade to version 2.0.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'mongodb-query-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1448'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:39Z', 'nvd_published_at': None}
1.4.0
GHSA-7xfq-xh6v-4mrm
2021-10-01T13:10:41Z
2020-09-01T20:27:53Z
null
[]
Malicious Package in json-serializer
Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 2.0.10 of this module is found installed you will want to replace it with a version before or after 2.0.10. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'json-serializer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.10'}, {'fixed': '2.0.11'}]}], 'versions': ['2.0.10']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/630'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:33Z', 'nvd_published_at': None}
1.4.0
GHSA-m852-866j-69j8
2021-10-01T13:27:58Z
2020-09-01T20:47:01Z
null
[]
Malicious Package in eslint-config-airbnb-standard
Version 2.0.0 of `eslint-config-airbnb-standard` was published with a bundled version of `eslint-scope` that was found to contain malicious code. This code would read the users `.npmrc` file and send it's contents to a remote server. ## Recommendation The best course of action if you found this package installed in your environment is to revoke all your npm tokens and use a different version of the module. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'eslint-config-airbnb-standard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}], 'versions': ['2.0.0']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/675'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:19Z', 'nvd_published_at': None}
1.4.0
GHSA-766v-7gjx-55hf
2021-09-30T17:14:27Z
2020-09-03T23:08:34Z
null
[]
Malicious Package in js-shq3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'js-shq3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1289'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:56Z', 'nvd_published_at': None}
1.4.0
GHSA-r9cj-xj33-4q42
2021-09-29T21:26:56Z
2020-09-03T22:21:54Z
null
[]
Malicious Package in buffgr-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'buffgr-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1260'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:49Z', 'nvd_published_at': None}
1.4.0
GHSA-vwcg-7xqw-qcxw
2020-09-18T14:06:03Z
2020-09-18T18:03:59Z
null
['CVE-2020-25489']
Heap Overflow in PyMiniRacer
A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption. More details on https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'py-mini-racer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sqreen/PyMiniRacer/security/advisories/GHSA-vwcg-7xqw-qcxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25489'}, {'type': 'WEB', 'url': 'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d'}, {'type': 'WEB', 'url': 'https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/'}, {'type': 'WEB', 'url': 'https://github.com/sqreen/PyMiniRacer/compare/v0.2.0...v0.3.0'}]
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-18T14:06:03Z', 'nvd_published_at': None}
1.4.0
GHSA-5x7p-gm79-383m
2021-10-01T13:28:51Z
2020-09-01T21:11:57Z
null
[]
Malicious Package in regenraotr
All versions of `regenraotr` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'regenraotr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/684'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:40Z', 'nvd_published_at': None}
1.4.0
GHSA-xpqw-fqpw-35fc
2023-09-07T00:11:01Z
2020-09-01T16:57:54Z
null
['CVE-2017-16150']
Directory Traversal in wangguojing123
Affected versions of `wangguojing123` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
[{'package': {'ecosystem': 'npm', 'name': 'wangguojing123'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16150'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/wangguojing123'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/374'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:50Z', 'nvd_published_at': None}
1.4.0
GHSA-vcg5-9xw6-r56c
2021-09-30T21:55:54Z
2020-09-02T21:40:49Z
null
[]
Malicious Package in logsymbles
Version 2.2.0 of `logsymbles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'logsymbles'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/908'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:09Z', 'nvd_published_at': None}
1.4.0
GHSA-54cr-gv8w-8324
2023-07-27T20:32:35Z
2020-09-01T20:36:22Z
null
[]
Malicious Package in xoc
Version 1.0.7 of `xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.7 of this module is found installed you will want to replace it with a version before or after 1.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 1.0.5
[]
[{'package': {'ecosystem': 'npm', 'name': 'xoc'}, 'versions': ['1.0.7']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/638'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:51Z', 'nvd_published_at': None}
1.4.0
GHSA-788m-pj96-7w2c
2021-09-27T21:41:40Z
2020-09-02T21:23:51Z
null
[]
Cross-Site Scripting in fomantic-ui
Versions of `fomantic-ui` are vulnerable to Cross-Site Scripting. Lack of output encoding on the selection dropdowns can lead to user input being executed instead of printed as text. ## Recommendation Upgrade to version 2.7.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'fomantic-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/fomantic/Fomantic-UI'}, {'type': 'WEB', 'url': 'https://github.com/fomantic/Fomantic-UI/releases/tag/2.7.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/885'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:20Z', 'nvd_published_at': None}
1.4.0
GHSA-8fw4-xh83-3j6q
2021-09-28T16:58:42Z
2020-09-11T21:18:05Z
null
[]
Cross-Site Scripting in diagram-js
Versions of `diagram-js` prior to 3.3.1 (for 3.x) and 2.6.2 (for 2.x) are vulnerable to Cross-Site Scripting. The package fails to escape output of user-controlled input in `search-pad`, allowing attackers to execute arbitrary JavaScript. ## Recommendation If you are using diagram-js 3.x, upgrade to version 3.3.1. If you are using diagram-js 2.x, upgrade to version 2.6.2.
[]
[{'package': {'ecosystem': 'npm', 'name': 'diagram-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'diagram-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.1'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/bpmn-io/diagram-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/982'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:58Z', 'nvd_published_at': None}
1.4.0
GHSA-39cx-xcwj-3rc4
2023-09-27T13:39:18Z
2020-09-01T15:25:29Z
null
['CVE-2008-6681']
Cross-Site Scripting in dojo
Affected versions of `dojo` are susceptible to a cross-site scripting vulnerability in the `dijit.Editor` and `textarea` components, which execute their contents as Javascript, even when sanitized. ## Recommendation Update to version 1.1.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-6681'}, {'type': 'WEB', 'url': 'https://bugs.dojotoolkit.org/ticket/2140'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/49883'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/107'}, {'type': 'WEB', 'url': 'http://trac.dojotoolkit.org/changeset/15346'}, {'type': 'WEB', 'url': 'http://trac.dojotoolkit.org/ticket/2140'}, {'type': 'WEB', 'url': 'http://www.dojotoolkit.org/book/dojo-1-1-release-notes'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/34661'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:03Z', 'nvd_published_at': None}
1.4.0
GHSA-w3cg-6577-wx9f
2023-09-11T20:33:24Z
2020-09-01T17:20:41Z
null
['CVE-2017-16122']
Directory Traversal in cuciuci
Affected versions of `cuciuci` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'cuciuci'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16122'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cuciuci'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/381'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:07Z', 'nvd_published_at': None}
1.4.0
GHSA-4g9f-63rx-5cw4
2021-08-26T15:09:19Z
2020-09-25T18:28:14Z
null
['CVE-2020-15190']
Segfault in Tensorflow
### Impact The [`tf.raw_ops.Switch`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/Switch) operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor. However, the eager runtime traverses all tensors in the output: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/common_runtime/eager/kernel_and_device.cc#L308-L313 Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault ### Patches We have patched the issue in da8558533d925694483d2c136a9220d6d49d843c and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15190'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]
{'cwe_ids': ['CWE-20', 'CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T16:14:42Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}
1.4.0
GHSA-qfc9-x7gv-27jr
2021-09-30T20:03:51Z
2020-09-03T18:12:36Z
null
[]
Malicious Package in deasyncp
All versions of `deasyncp ` contain malicious code. The package shuts down the machine upon installation as a preinstall script. ## Recommendation Remove the package from your environment. There is no further compromise.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'deasyncp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1073'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:20Z', 'nvd_published_at': None}
1.4.0
GHSA-7696-qr5q-pg37
2021-10-01T16:10:59Z
2020-09-03T23:19:08Z
null
[]
Malicious Package in zs-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'zs-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1299'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:19Z', 'nvd_published_at': None}
1.4.0
GHSA-65xx-c85x-wg76
2020-08-31T18:59:26Z
2020-09-04T17:20:52Z
null
[]
Command Injection in plotter
All versions of `plotter` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory: ``` var plot = require('plotter').plot; const title = 'Example "\nset title system("touch testing")#'; plot({ data: [ 3, 1, 2, 3, 4 ], filename: 'output.pdf', style: 'linespoints', title: title, logscale: true, xlabel: 'time', ylabel: 'length of string', format: 'pdf' }); ``` ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'plotter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1441'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:26Z', 'nvd_published_at': None}
1.4.0
GHSA-vv7g-pjw9-4qj9
2021-10-04T15:24:14Z
2020-09-03T17:03:56Z
null
[]
Malicious Package in scrytsy
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'scrytsy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1408'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:14Z', 'nvd_published_at': None}
1.4.0
GHSA-jfx5-7mr2-g8hg
2021-09-30T18:35:26Z
2020-09-03T17:31:41Z
null
[]
Malicious Package in alico
All versions of `alico` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'alico'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1047'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:22Z', 'nvd_published_at': None}
1.4.0
GHSA-mp55-2274-4pj8
2021-09-29T21:03:38Z
2020-09-03T21:54:09Z
null
[]
Malicious Package in buffer-xgr
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'buffer-xgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1244'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:08Z', 'nvd_published_at': None}
1.4.0
GHSA-353r-3v84-9pjj
2021-10-01T13:25:56Z
2020-09-01T20:40:36Z
null
[]
Malicious Package in nothing-js
`nothing-js` contained a malicious script that attempted to delete all files when `npm test` was run. ## Recommendation This module has been unpublished from the npm Registry. If you find this module in your environment remove it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nothing-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/650'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:31:19Z', 'nvd_published_at': None}
1.4.0
GHSA-gc25-3vc5-2jf9
2020-08-31T18:54:57Z
2020-09-04T15:00:58Z
null
[]
Sandbox Breakout / Arbitrary Code Execution in sandbox
All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1318'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:57Z', 'nvd_published_at': None}
1.4.0
GHSA-4xf9-pgvv-xx67
2021-09-29T18:16:33Z
2020-09-03T20:27:46Z
null
[]
Regular Expression Denial of Service in simple-markdown
Versions of `simple-markdown` prior to 0.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS). The `SimpleMarkdown.defaultInlineParse()` function has significantly degraded performance when parsing inline code blocks. ## Recommendation Upgrade to version 0.5.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'simple-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Khan/simple-markdown/issues/71'}, {'type': 'PACKAGE', 'url': 'https://github.com/Khan/simple-markdown'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SIMPLEMARKDOWN-460540'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1147'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:00Z', 'nvd_published_at': None}
1.4.0
GHSA-m3j9-p4x2-97q6
2023-09-12T19:35:54Z
2020-09-01T17:22:49Z
null
['CVE-2017-16120']
Directory Traversal in liyujing
Affected versions of `liyujing` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'liyujing'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16120'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/liyujing'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/387'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:22Z', 'nvd_published_at': None}
1.4.0
GHSA-c3m8-x3cg-qm2c
2021-09-29T18:45:07Z
2020-09-03T20:39:53Z
null
[]
Configuration Override in helmet-csp
Versions of `helmet-csp` before to 2.9.1 are vulnerable to a Configuration Override affecting the application's Content Security Policy (CSP). The package's browser sniffing for Firefox deletes the `default-src` CSP policy, which is the fallback policy. This allows an attacker to remove an application's default CSP, possibly rendering the application vulnerable to Cross-Site Scripting. ## Recommendation Upgrade to version 2.9.1 or later. Setting the `browserSniff` configuration to `false` in vulnerable versions also mitigates the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'helmet-csp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.2'}, {'fixed': '2.9.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a'}, {'type': 'PACKAGE', 'url': 'https://github.com/helmetjs/csp/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HELMETCSP-469436'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1176'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:01Z', 'nvd_published_at': None}
1.4.0
GHSA-cvfm-xjc8-f2vm
2020-08-31T19:00:44Z
2020-09-03T15:46:36Z
null
[]
Denial of Service in @commercial/subtext
Version 5.1.1 of `@commercial/subtext` is vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to version 5.1.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': '@commercial/subtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.1'}, {'fixed': '5.1.2'}]}], 'versions': ['5.1.1']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1477'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:44Z', 'nvd_published_at': None}
1.4.0
GHSA-xh8g-j88w-6v59
2021-10-01T20:57:22Z
2020-09-03T19:42:16Z
null
[]
Malicious Package in cionstring
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'cionstring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1381'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:11Z', 'nvd_published_at': None}
1.4.0
GHSA-q9wr-gcjc-hq52
2020-08-31T18:55:23Z
2020-09-04T15:12:13Z
null
[]
Prototype Pollution in reggae
All versions of `reggae` are vulnerable to prototype pollution. The function `set` does not restrict the modification of an Object's prototype, which may allow a malicious to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'reggae'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1331'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:23Z', 'nvd_published_at': None}
1.4.0
GHSA-h24p-2c3m-5qf4
2021-10-01T16:14:52Z
2020-09-03T23:23:23Z
null
[]
Malicious Package in owl-orchard-apple-sunshine
All versions of `owl-orchard-apple-sunshine` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'owl-orchard-apple-sunshine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1307'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:32Z', 'nvd_published_at': None}
1.4.0
GHSA-5947-m4fg-xhqg
2020-08-31T18:46:11Z
2020-09-03T18:08:10Z
null
[]
Prototype Pollution in lodash.mergewith
Versions of `lodash.mergewith` before 4.6.1 are vulnerable to Prototype Pollution. The function 'mergeWith' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'lodash.mergewith'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1069'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:11Z', 'nvd_published_at': None}
1.4.0
GHSA-m4vv-p6fq-jhqp
2021-09-23T21:48:53Z
2020-09-01T19:04:07Z
null
[]
Directory Traversal in @vivaxy/here
The @vivaxy/here module is a small web server that serves files with the process' working directory acting as the web root. It is vulnerable to a directory traversal attack. This means that files on the local file system which exist outside of the web root may be disclosed to an attacker. This might include confidential files. Mitigating Factors: If the node process is run as a user with very limited filesystem permissions, there is significantly less risk of exposing confidential/private information. Proof of Concept: ``` curl "http://${SERVER_IP}:${SERVER_PORT}/..%2f..%2fetc/passwd" ``` ## Recommendation Run `npm i @vivaxy/here` to install the latest version that addresses this vulnerability.
[]
[{'package': {'ecosystem': 'npm', 'name': '@vivaxy/here'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296254'}, {'type': 'PACKAGE', 'url': 'https://github.com/vivaxy/here'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/557'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:27:40Z', 'nvd_published_at': None}
1.4.0
GHSA-77q4-m83q-w76v
2021-09-24T20:59:15Z
2020-09-01T21:18:20Z
null
['CVE-2018-14730']
Missing Origin Validation in browserify-hmr
Versions of `browserify-hmr` prior to 0.4.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation Upgrade to version 0.4.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'browserify-hmr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14730'}, {'type': 'WEB', 'url': 'https://github.com/AgentME/browserify-hmr/issues/41'}, {'type': 'WEB', 'url': 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages'}, {'type': 'WEB', 'url': 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)'}, {'type': 'PACKAGE', 'url': 'https://github.com/AgentME/browserify-hmr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/726'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:33Z', 'nvd_published_at': None}
1.4.0
GHSA-mf7c-58q5-7v65
2021-01-14T15:56:03Z
2020-09-01T16:15:28Z
null
['CVE-2016-10695']
Downloads Resources over HTTP in npm-test-sqlite3-trunk
Affected versions of `npm-test-sqlite3-trunk` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `npm-test-sqlite3-trunk`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'npm-test-sqlite3-trunk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10695'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/297'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:19Z', 'nvd_published_at': None}
1.4.0
GHSA-36rh-ggpr-j3gj
2022-08-11T13:19:15Z
2020-09-14T16:38:40Z
null
[]
Renovate vulnerable to Azure DevOps token leakage in logs
### Impact Applies to Azure DevOps users only. The bot's token may be exposed in server or pipeline logs due to the `http.extraheader=AUTHORIZATION` parameter being logged without redaction. It is recommended that Azure DevOps users revoke their existing bot credentials and generate new ones after upgrading if there's a potential that logs have been saved to a location that others can view. ### Patches Fixed in ### Workarounds Do not share Renovate logs with anyone who cannot be trusted with access to the token.
[]
[{'package': {'ecosystem': 'npm', 'name': 'renovate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.180.0'}, {'fixed': '23.25.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/renovatebot/renovate/security/advisories/GHSA-36rh-ggpr-j3gj'}, {'type': 'PACKAGE', 'url': 'https://github.com/renovatebot/renovate'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-14T16:38:10Z', 'nvd_published_at': None}
1.4.0
GHSA-8c8c-4vfj-rrpc
2022-03-04T22:02:50Z
2020-09-01T19:05:11Z
null
[]
Reflected Cross-Site Scripting in redis-commander
Affected versions of `redis-commander` contain a cross-site scripting vulnerability in the `highlighterId` paramter of the clipboard.swf component on hosts serving Redis Commander. Mitigating factors: Flash must be installed / enabled for this to work. The below proof of concept was verified to work using Firefox 57.0 on Windows 10 by manually installing the [Flash NPAPI Windows plugin](https://get.adobe.com/flashplayer/otherversions/) ## Proof of concept ``` http://instance/jstree/_docs/syntax/clipboard.swf?highlighterId=\%22))}%20catch(e)%20{alert(document.domain);}// ``` ## Recommendation No direct patch for this vulnerability is currently available. At this time, the best mitigation is to use an alternative, functionally equivalent package, or to use extreme caution when using redis-commander, ensuring that redis-commmander is the only web page you have open, and avoiding clicking on any links.
[]
[{'package': {'ecosystem': 'npm', 'name': 'redis-commander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296377'}, {'type': 'PACKAGE', 'url': 'https://github.com/joeferner/redis-commander'}, {'type': 'WEB', 'url': 'https://github.com/joeferner/redis-commander/releases/tag/v0.5.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/562'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:27:52Z', 'nvd_published_at': None}
1.4.0
GHSA-cr4x-w2v7-4mmf
2021-09-29T21:36:13Z
2020-09-03T22:26:13Z
null
[]
Malicious Package in bufver-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'bufver-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1265'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:00Z', 'nvd_published_at': None}
1.4.0
GHSA-c7pp-x73h-4m2v
2021-09-27T15:43:19Z
2020-09-02T15:53:46Z
null
[]
Cross-Site Scripting in bootstrap-vue
Versions of `bootstrap-vue` prior to 2.0.0-rc.12 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization, components may be vulnerable to Cross-Site Scripting through the `options` variable. This may lead to the execution of malicious JavaScript on the user's browser. ## Recommendation Upgrade to version 2.0.0-rc.12 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'bootstrap-vue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-rc.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-rc.11'}}]
[{'type': 'WEB', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue/issues/1974'}, {'type': 'WEB', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue/pull/2134'}, {'type': 'WEB', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue/commit/ba6f3f8359e257589d744f180312c09bf9f12289'}, {'type': 'PACKAGE', 'url': 'https://github.com/bootstrap-vue/bootstrap-vue'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/770'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:07Z', 'nvd_published_at': None}
1.4.0
GHSA-9vrw-m88g-w75q
2020-08-31T19:00:40Z
2020-09-03T15:45:53Z
null
[]
Denial of Service in @hapi/accept
Versions of `@hapi/accept` prior to 3.2.4 or 5.0.1 are vulnerable to Denial of Service. The Accept-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to version 3.2.4 or 5.0.1.
[]
[{'package': {'ecosystem': 'npm', 'name': '@hapi/accept'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/accept'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1475'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:40Z', 'nvd_published_at': None}
1.4.0
GHSA-5x8q-gj67-rhf2
2021-09-30T21:23:24Z
2020-09-02T21:18:33Z
null
[]
Malicious Package in discord_debug_log
All versions of `discord_debug_log` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts. ## Recommendation Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'discord_debug_log'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/873'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:59Z', 'nvd_published_at': None}
1.4.0
GHSA-xgf5-5gjr-4hjq
2023-09-07T20:42:22Z
2020-09-01T18:15:20Z
null
['CVE-2017-16201']
Directory Traversal in zjjserver
Affected versions of `zjjserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'zjjserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16201'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/zjjserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/427'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:43Z', 'nvd_published_at': None}
1.4.0
GHSA-qhf6-vqq9-q2p7
2023-09-07T00:11:06Z
2020-09-01T16:58:58Z
null
['CVE-2017-16108']
Directory Traversal in gaoxiaotingtingting
Affected versions of `gaoxiaotingtingting` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
[{'package': {'ecosystem': 'npm', 'name': 'gaoxiaotingtingting'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16108'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/377'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:57Z', 'nvd_published_at': None}
1.4.0
GHSA-r3xc-47qg-h929
2021-09-28T17:38:45Z
2020-09-03T17:06:09Z
null
[]
Cross-Site Scripting in @ionic/core
Versions of `@ionic/core` prior to 4.0.3, 4.1.3, 4.2.1 or 4.3.1 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. This issue affects the components: - `<ion-alert>.message` - `<ion-searchbar>.placeholder` - `<ion-infinite-scroll-content>.loadingText` - `<ion-refresher-content>.pullingText` - `<ion-refresher-content>.refershingText` ## Recommendation - If you are using @ionic/core 4.0.x, upgrade to 4.0.3 or later. - If you are using @ionic/core 4.1.x, upgrade to 4.1.3 or later. - If you are using @ionic/core 4.2.x, upgrade to 4.2.1 or later. - If you are using @ionic/core 4.3.x, upgrade to 4.3.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ionic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ionic-team/ionic/issues/18065'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionic-team/ionic'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1023'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:31Z', 'nvd_published_at': None}
1.4.0
GHSA-74f5-4m28-gq5c
2023-09-11T23:15:12Z
2020-09-01T18:09:59Z
null
['CVE-2017-16214']
Directory Traversal in peiserver
Affected versions of `peiserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'peiserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16214'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/peiserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/420'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:27Z', 'nvd_published_at': None}
1.4.0
GHSA-4f9m-pxwh-68hg
2021-09-28T16:57:07Z
2020-09-11T21:20:14Z
null
[]
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 3.20.9 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs used in the OAuth auth flow, which may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 3.20.9 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.20.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/pull/5190'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449921'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/976'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:43Z', 'nvd_published_at': None}
1.4.0
GHSA-gfjr-xqhm-qvv3
2021-10-01T14:01:11Z
2020-09-02T20:16:09Z
null
[]
Malicious Package in aysnc
All versions of `aysnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'aysnc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/848'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:02Z', 'nvd_published_at': None}
1.4.0
GHSA-76xq-58hj-vwm2
2021-09-30T22:06:07Z
2020-09-11T21:16:59Z
null
[]
Malicious Package in test-module-a
All versions of `test-module-a` contain malicious code as a preinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking, ## Recommendation Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'test-module-a'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/929'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:53Z', 'nvd_published_at': None}
1.4.0
GHSA-95hx-62rh-gg96
2022-10-05T14:46:27Z
2020-09-15T17:34:17Z
null
['CVE-2020-15178']
Potential XSS injection In PrestaShop contactform
### Impact An attacker is able to inject javascript while using the contact form. ### Patches The problem is fixed in v4.3.0 ### References [Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/contactform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1'}, {'fixed': '4.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/contactform/security/advisories/GHSA-95hx-62rh-gg96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15178'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/contactform/commit/a1da814bea7e5750b858a2dbbc58ace80379f42f'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/contactform'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/prestashop/contactform'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-15T17:33:50Z', 'nvd_published_at': None}
1.4.0
GHSA-jfcc-rm7f-xgf8
2021-09-29T18:37:46Z
2020-09-03T20:36:35Z
null
[]
Cross-Site Scripting in mavon-editor
All versions of `mavon-editor` are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mavon-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hinesboy/mavonEditor/issues/472'}, {'type': 'WEB', 'url': 'https://github.com/hinesboy/mavonEditor/pull/548'}, {'type': 'WEB', 'url': 'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72'}, {'type': 'PACKAGE', 'url': 'https://github.com/hinesboy/mavonEditor'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MAVONEDITOR-459108'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1169'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/mavon-editor'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:49:47Z', 'nvd_published_at': None}
1.4.0
GHSA-gjcw-v447-2w7q
2021-09-23T21:25:33Z
2020-09-01T15:23:18Z
null
['CVE-2016-1000223']
Forgeable Public/Private Tokens in jws
Affected versions of the `jws` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT as a bearer token, the end result is a complete authentication bypass with minimal effort. ## Recommendation Update to version 3.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000223'}, {'type': 'WEB', 'url': 'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e'}, {'type': 'WEB', 'url': 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianloveswords/node-jws'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:jws:20160726'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/88'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:10:22Z', 'nvd_published_at': None}
1.4.0
GHSA-j67m-jg9p-ppg4
2021-10-01T16:10:45Z
2020-09-03T23:18:05Z
null
[]
Malicious Package in ns-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ns-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1298'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:17Z', 'nvd_published_at': None}
1.4.0
GHSA-jjgw-jf33-7fg9
2023-09-12T19:36:07Z
2020-09-01T18:22:48Z
null
['CVE-2017-16193']
Directory Traversal in mfrs
Affected versions of `mfrs` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mfrs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16193'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrs'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/437'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:06Z', 'nvd_published_at': None}
1.4.0
GHSA-wqhw-frpx-5mmp
2020-08-31T18:36:09Z
2020-09-02T16:01:33Z
null
[]
Command Injection in tomato
All versions of `tomato` are vulnerable to Command Injection. The /api/exec endpoint does not validate user input allowing attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'tomato'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/797'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:09Z', 'nvd_published_at': None}
1.4.0
GHSA-7543-mr7h-6v86
2021-09-27T16:15:52Z
2020-09-02T16:00:26Z
null
[]
Improper Authorization in googleapis
Versions of `googleapis` prior to 39.1.0 are vulnerable to Improper Authorization. Setting credentials to one client may apply to all clients which may cause requests to be sent with the incorrect credentials. ## Recommendation Upgrade to version 39.1.0.
[]
[{'package': {'ecosystem': 'npm', 'name': 'googleapis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '39.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/googleapis/google-api-nodejs-client/issues/1594'}, {'type': 'PACKAGE', 'url': 'https://github.com/googleapis/google-api-nodejs-client'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/791'}]
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:54Z', 'nvd_published_at': None}
1.4.0
GHSA-j3g2-m5jj-6336
2020-08-31T18:09:51Z
2020-09-01T15:20:00Z
null
['CVE-2015-9243']
Unsafe Merging of CORS Configuration Conflict in hapi
Versions of `hapi` prior to 11.1.4 are affected by a vulnerability that causes route-level CORS configuration to override connection-level or server-level CORS defaults. This may result in a situation where CORS permissions are less restrictive than intended. ## Recommendation Update hapi to version 11.1.4 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9243'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/issues/2980'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/65'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:51Z', 'nvd_published_at': None}
1.4.0
GHSA-wgvj-6v57-wjh3
2021-09-30T21:37:06Z
2020-09-02T21:30:14Z
null
[]
Malicious Package in bowee
Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'bowee'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/897'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:45Z', 'nvd_published_at': None}
1.4.0
GHSA-f8mr-jv2c-v8mg
2021-11-19T15:27:56Z
2020-09-09T17:29:27Z
null
['CVE-2020-15163']
Invalid root may become trusted root in The Update Framework (TUF)
### Impact The Python TUF reference implementation `tuf<0.12` will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a man-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. While investigating the reported vulnerability, we discovered that the detailed client workflow was not fully implemented. Specifically, for step 1.3 the newly downloaded root metadata was not being verified with a threshold of keys specified in the new root metadata file. This missing step of the client workflow has been implemented in [PR #1101](https://github.com/theupdateframework/tuf/pull/1101), which is included in [v0.14.0](https://github.com/theupdateframework/tuf/releases/tag/v0.14.0) of tuf. ### Patches A [fix](https://github.com/theupdateframework/tuf/pull/885), is available in version [0.12](https://github.com/theupdateframework/tuf/releases/tag/v0.12.0) and newer. ### Workarounds No workarounds are known for this issue. ### References * Pull request resolving the invalid root becoming trusted issue [PR 885](https://github.com/theupdateframework/tuf/pull/885) * Pull request implementing self verification of newly downloaded root metadata [PR 1101](https://github.com/theupdateframework/tuf/pull/1101)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15163'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/pull/885'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/tuf'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/releases/tag/v0.12.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/tuf'}]
{'cwe_ids': ['CWE-345', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-09T17:27:31Z', 'nvd_published_at': '2020-09-09T18:15:00Z'}
1.4.0
GHSA-49mg-94fc-2fx6
2020-08-31T19:00:00Z
2020-09-04T17:32:49Z
null
[]
Command Injection in npm-git-publish
All versions of `npm-git-publish` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `execSync` call, which may allow attackers to execute arbitrary code in the system. The `publish` function is vulnerable through the `gitRemoteUrl` variable. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'npm-git-publish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/730121'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1458'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:00Z', 'nvd_published_at': None}
1.4.0
GHSA-pc7q-c837-3wjq
2021-10-04T15:56:21Z
2020-09-03T17:02:58Z
null
[]
Malicious Package in wallet-address-validtaor
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'wallet-address-validtaor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1413'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:26Z', 'nvd_published_at': None}
1.4.0
GHSA-f64g-whxf-w8f2
2021-09-29T20:56:59Z
2020-09-03T21:44:06Z
null
[]
Malicious Package in buffar-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'buffar-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1236'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:50Z', 'nvd_published_at': None}
1.4.0
GHSA-m7xv-7p93-g6q8
2023-07-27T20:05:00Z
2020-09-03T00:35:35Z
null
[]
Malicious Package in libubx
Version 1.0.3 of `libubx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 1.0.2
[]
[{'package': {'ecosystem': 'npm', 'name': 'libubx'}, 'versions': ['1.0.3']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/938'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:13Z', 'nvd_published_at': None}
1.4.0
GHSA-mq9h-cwc2-6j5r
2021-09-30T19:50:21Z
2020-09-03T17:42:27Z
null
[]
Malicious Package in midway-dataproxy
All versions of `midway-dataproxy` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'midway-dataproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1056'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:42Z', 'nvd_published_at': None}
1.4.0
GHSA-mhxg-pr3j-v9gr
2021-10-01T20:59:03Z
2020-09-03T19:41:22Z
null
[]
Malicious Package in colne
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'colne'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1386'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:23Z', 'nvd_published_at': None}
1.4.0
GHSA-g336-c7wv-8hp3
2021-09-23T21:35:43Z
2020-09-01T15:58:06Z
null
[]
Cross-Site Scripting in swagger-ui
Affected versions of `swagger-ui` are vulnerable to cross-site scripting via the `url` query string parameter. ## Recommendation Update to 2.2.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/1617'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/commit/a1aea70f2c64533bf053a41d4da5a8accd0117b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/137'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:09Z', 'nvd_published_at': None}
1.4.0
GHSA-h5vm-jhq7-w647
2021-10-01T14:01:26Z
2020-09-02T20:17:13Z
null
[]
Malicious Package in momen
All versions of `momen` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'momen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/849'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:04Z', 'nvd_published_at': None}
1.4.0
GHSA-gqf6-75v8-vr26
2020-08-31T18:58:56Z
2020-09-04T16:56:11Z
null
[]
Arbitrary File Write in bin-links
Versions of `bin-links` prior to 1.1.5 are vulnerable to an Arbitrary File Write. The package fails to restrict access to folders outside of the intended `node_modules` folder through the `bin` field. This allows attackers to create arbitrary files in the system. Note it is not possible to overwrite files that already exist. ## Recommendation Upgrade to version 1.1.5 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'bin-links'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.5'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1427'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:56Z', 'nvd_published_at': None}
1.4.0
GHSA-gvm7-8fq3-qjj2
2021-10-01T20:50:15Z
2020-09-03T19:43:18Z
null
[]
Malicious Package in bs85
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bs85'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1378'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:04Z', 'nvd_published_at': None}