schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 24
values | aliases
stringlengths 2
20
| summary
stringlengths 9
130
⌀ | details
stringlengths 34
11.7k
| severity
stringlengths 2
92
| affected
stringlengths 73
3.22k
| references
stringlengths 64
21.2k
| database_specific
stringlengths 131
202
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-9cq4-mhmr-84gm | 2023-07-27T20:06:02Z | 2020-09-01T20:26:49Z | null | [] | Malicious Package in jasmin | Version 0.0.3 of `jasmin` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.3 of this module is found installed you will want to replace it with a version before or after 0.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 0.0.2 | [] | [{'package': {'ecosystem': 'npm', 'name': 'jasmin'}, 'versions': ['0.0.3']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/629'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-46fh-8fc5-xcwx | 2020-08-31T18:46:13Z | 2020-09-03T18:09:16Z | null | [] | Prototype Pollution in lodash.defaultsdeep | Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to Prototype Pollution. The function 'defaultsDeep' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'lodash.defaultsdeep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1070'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wqgx-4q47-j2w5 | 2020-08-31T19:00:07Z | 2020-09-04T17:36:04Z | null | [] | Insecure Cryptography Algorithm in parsel | All versions of `parsel` use an insecure cryptography algorithm. The package uses `aes-256-cbc` without integrity checks, which renders the ciphertext vulnerable to bit-flipping attacks.
## Recommendation
The package is deprecated and will not be updated. Consider using an alternative package. | [] | [{'package': {'ecosystem': 'npm', 'name': 'parsel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1461'}] | {'cwe_ids': ['CWE-327'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wjpj-gmc3-5w56 | 2021-09-30T15:46:02Z | 2020-09-03T22:30:31Z | null | [] | Malicious Package in buvfer-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buvfer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1268'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-629c-j867-3v45 | 2021-10-01T20:43:02Z | 2020-09-04T16:41:04Z | null | [] | Malicious Package in bitcoisnj-lib | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bitcoisnj-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1367'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fpgg-r39h-3x5x | 2021-10-01T21:00:43Z | 2020-09-03T17:06:22Z | null | [] | Malicious Package in cxt | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'cxt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1392'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f8rq-m28h-8hxj | 2020-08-31T19:01:22Z | 2020-09-03T15:50:29Z | null | [] | Cross-Site Scripting in htmr | Versions of `htmr` prior to 0.8.7 are vulnerable to Cross-Site Scripting (XSS). The package uses `innerHTML` to unescape HTML entities. This may lead to [DOM-based XSS](https://owasp.org/www-community/attacks/DOM_Based_XSS) through HTML-encoded XSS payloads. This may allow an attacker to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 0.8.7 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'htmr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.7'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/753971'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1496'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-46q2-93hm-52p5 | 2023-09-11T20:33:10Z | 2020-09-01T16:53:37Z | null | ['CVE-2017-16089'] | Directory Traversal in serverlyr | Affected versions of `serverlyr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serverlyr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16089'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverlyr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/365'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jjhg-qw5v-r8xx | 2021-09-30T20:06:04Z | 2020-09-03T19:01:20Z | null | [] | Malicious Package in anarchy | All versions of `anarchy` contain malicious code. The package ran `rm - rf /` as an install script.
## Recommendation
Remove the package from your environment. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'anarchy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1089'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-phph-xpj4-wvcv | 2021-09-29T18:51:18Z | 2020-09-03T21:13:07Z | null | [] | Cross-Site Scripting in hexo-admin | All versions of `hexo-admin` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize rendered markdown, allowing attackers to execute arbitrary JavaScript in a victim's browser if they are able to create new posts.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'hexo-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jaredly/hexo-admin/issues/185'}, {'type': 'PACKAGE', 'url': 'https://github.com/jaredly/hexo-admin'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1211'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cx7r-634m-2q2h | 2021-06-01T22:21:08Z | 2020-09-02T18:20:21Z | 2021-06-01T22:21:08Z | [] | Cross-Site Scripting in harp | # Withdrawn
This advisory has been withdrawn per request from the maintainer. Given harp is a static webserver, a XSS type of vulnerability is not appropriate.
### Original advisory description
All versions of `harp` are vulnerable to Cross-Site Scripting. Due to misconfiguration of its rendering engine, `harp` does not sanitize the HTML output allowing attackers to run arbitrary JavaScript when processing malicious files.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'harp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/453795'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/806'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8w9j-6wg6-qv4f | 2021-09-30T20:13:23Z | 2020-09-03T19:41:17Z | null | [] | Malicious Package in axioss | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'axioss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1124'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2r8f-2665-3gxq | 2021-09-30T21:54:32Z | 2020-09-02T21:36:36Z | null | [] | Malicious Package in froever | All versions of `froever` contain malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'froever'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/904'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c4fm-46gm-4469 | 2021-09-30T20:28:30Z | 2020-09-03T20:00:05Z | null | [] | Malicious Package in sparkies | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sparkies'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1141'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w3f3-4j22-2v3p | 2021-09-30T21:25:19Z | 2020-09-02T21:27:02Z | null | [] | Malicious Package in destroyer-of-worlds | The package `destroyer-of-worlds` contained malicious code. The package contained a bash script that was run as a postinstall script. The script deleted system files and attempted to exhaust resources by creating a large file, a fork bomb and an endless loop. The script targeted UNIX systems.
## Recommendation
Remove the package from your environment and perform additional incident response on your system's files and processes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'destroyer-of-worlds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/890'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hxwc-5vw9-2w4w | 2021-09-27T15:13:26Z | 2020-09-02T15:52:39Z | null | [] | NoSQL Injection in loopback-connector-mongodb | Versions of `loopback-connector-mongodb` prior to 3.6.0 are vulnerable to NoSQL Injection. Filters passed to the database query are not properly sanitized which leads to execution of code on the database driver and data leak.
## Recommendation
Upgrade to version 3.6.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'loopback-connector-mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.5.0'}}] | [{'type': 'PACKAGE', 'url': 'https://github.com/loopbackio/loopback-connector-mongodb'}, {'type': 'WEB', 'url': 'https://loopback.io/doc/en/lb3/Security-advisory-08-15-2018.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/767'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8gc6-65mm-xr6r | 2021-10-01T20:44:26Z | 2020-09-04T16:46:28Z | null | [] | Malicious Package in bp66 | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bp66'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1372'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qpwf-4fx5-crqq | 2023-09-12T19:35:38Z | 2020-09-01T17:19:36Z | null | ['CVE-2017-16154'] | Directory Traversal in earlybird | Affected versions of `earlybird` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'earlybird'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16154'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/earlybird'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/380'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9wjh-jr2j-6r4x | 2020-08-31T18:35:14Z | 2020-09-02T15:55:58Z | null | [] | Remote Code Execution in pi_video_recording | All versions of `pi_video_recording` are vulnerable to Remote Code Execution. Due to insufficient input validation the server executes arbitrary code through the /api/record/start endpoint. After running the server, `curl -POST -H "Content-Type: application/json" -d '{"filename": " || touch /tmp/worked;"}' http://localhost:5000/api/record/start`creates a file in the /tmp/ directory
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'pi_video_recording'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/773'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2p99-6f47-8x9j | 2021-10-01T13:55:37Z | 2020-09-02T18:38:39Z | null | [] | Malicious Package in asnc | All versions of `asnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'asnc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/845'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m69q-pmxg-vqch | 2023-09-07T21:56:04Z | 2020-09-01T18:26:00Z | null | ['CVE-2017-16191'] | Directory Traversal in cypserver | Affected versions of `cypserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'cypserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16191'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/cypserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/440'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4hfc-fv33-ph9p | 2021-10-01T16:15:37Z | 2020-09-03T23:26:33Z | null | [] | Malicious Package in sj-tw-abc | All versions of `sj-tw-abc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sj-tw-abc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1310'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x9hc-rw35-f44h | 2021-09-27T13:40:52Z | 2020-09-02T15:46:03Z | null | [] | Sandbox Breakout / Arbitrary Code Execution in static-eval | Versions of `static-eval`prior to 2.0.2 pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.
## Proof of concept
```
var evaluate = require('static-eval');
var parse = require('esprima').parse;
var src = process.argv[2];
var payload = '(function({x}){return x.constructor})({x:"".sub})("console.log(process.env)")()'
var ast = parse(payload).body[0].expression;
console.log(evaluate(ast, {x:1}));
```
## Recommendation
Upgrade to version 2.0.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'static-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.1'}}] | [{'type': 'PACKAGE', 'url': 'https://snyk.io/vuln/SNYK-JS-STATICEVAL-173693'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/758'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g7mw-5cq6-fv82 | 2021-09-27T21:00:38Z | 2020-09-02T21:20:40Z | null | [] | Cross-Site Scripting in wangeditor | All versions of `wangeditor` are vulnerable to Cross-Site Scripting. The package fails to properly encode output, allowing arbitrary JavaScript to be inserted in links and executed by browsers.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'wangeditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/wangfupeng1988/wangEditor/issues/1945'}, {'type': 'PACKAGE', 'url': 'https://github.com/wangfupeng1988/wangEditor/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WANGEDITOR-174536'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/876'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x87g-rgrh-r6g3 | 2021-09-30T17:16:09Z | 2020-09-03T17:07:15Z | null | [] | Malicious Package in rpc-websocket | Versions of `rpc-websocket` >= 0.7.6 contained malicious code. The package opens a backdoor to a remote server and executes arbitrary commands, effectively acting as a backdoor.
## Recommendation
Any computer that has these versions of the package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'rpc-websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.7'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1022'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xr53-m937-jr9c | 2021-10-04T21:05:25Z | 2020-09-03T15:49:14Z | null | [] | Cross-Site Scripting in ngx-md | Versions of `ngx-md` prior to 6.0.3 are vulnerable to Cross-Site Scripting. Links are not properly restricted to http/https and can contain JavaScript which may lead to arbitrary code execution. Markdown input such as `[Click Me](javascript:alert('Injected!'%29)` is rendered as a `Click Me` link that executes JavaScript.
## Recommendation
Upgrade to version 6.0.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'ngx-md'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dimpu/ngx-md/issues/129'}, {'type': 'PACKAGE', 'url': 'https://github.com/dimpu/ngx-md'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1485'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qw9c-8p76-3q2x | 2023-09-11T16:38:04Z | 2020-09-01T18:49:11Z | null | ['CVE-2017-16148'] | Directory Traversal in serve46 | Affected versions of `serve46` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serve46'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16148'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serve46'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/456'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w7rc-rwvf-8q5r | 2023-04-21T19:34:08Z | 2020-09-10T17:46:21Z | null | ['CVE-2020-15168'] | The `size` option isn't honored after following a redirect in node-fetch | ### Impact
Node Fetch did not honor the `size` option after following a redirect, which means that when a content size was over the limit, a `FetchError` would never get thrown and the process would end without failure.
For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after `fetch()` has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.
### Patches
We released patched versions for both stable and beta channels:
- For `v2`: 2.6.1
- For `v3`: 3.0.0-beta.9
### Workarounds
None, it is strongly recommended to update as soon as possible.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [node-fetch](https://github.com/node-fetch/node-fetch/issues/new?assignees=&labels=question&template=support-or-usage.md&title=Question%3A+)
* Contact one of the core maintainers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'node-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-beta.1'}, {'fixed': '3.0.0-beta.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.8'}}] | [{'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15168'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/commit/2358a6c2563d1730a0cdaccc197c611949f6a334'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/commit/eaff0094c4dfdd5b78711a8c4f1b61e33d282072'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-fetch/node-fetch'}] | {'cwe_ids': ['CWE-20', 'CWE-770'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-10T17:44:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xwqw-rf2q-xmhf | 2021-09-24T22:00:38Z | 2020-09-01T21:23:38Z | null | [] | Cross-Site Scripting in buefy | Versions of buefy prior to 0.7.2 are vulnerable to Cross-Site Scripting, allowing attackers to manipulate the DOM and execute remote code. The autocomplete list renders user input as HTML without encoding.
## Recommendation
Upgrade to version 0.7.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'buefy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/buefy/buefy/issues/1097'}, {'type': 'PACKAGE', 'url': 'https://github.com/buefy/buefy'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/747'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9q9m-m2f6-jr5q | 2021-10-01T14:03:17Z | 2020-09-02T20:22:34Z | null | [] | Malicious Package in chak | All versions of `chak` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'chak'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/854'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pg59-2f92-5cph | 2021-08-26T15:11:34Z | 2020-09-25T18:28:21Z | null | ['CVE-2020-15196'] | Heap buffer overflow in Tensorflow | ### Impact
The `SparseCountSparseOutput` and `RaggedCountSparseOutput` implementations don't validate that the `weights` tensor has the same shape as the data. The check exists for `DenseCountSparseOutput`, where both tensors are fully specified:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L110-L117
In the sparse and ragged count weights are still accessed in parallel with the data:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L199-L201
But, since there is no validation, a user passing fewer weights than the values for the tensors can generate a read from outside the bounds of the heap buffer allocated for the weights.
### Patches
We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
We recommend users to upgrade to TensorFlow 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pg59-2f92-5cph'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15196'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}] | {'cwe_ids': ['CWE-119', 'CWE-122', 'CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T16:48:44Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-7qg7-6g3g-8vxg | 2021-09-30T15:46:17Z | 2020-09-03T22:46:25Z | null | [] | Malicious Package in bwffer-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'bwffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1269'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2jm5-2cqf-6vw9 | 2021-10-01T20:29:19Z | 2020-09-04T15:30:32Z | null | [] | Malicious Package in baes-x | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'baes-x'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1351'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jrj9-5qp6-2v8q | 2020-08-31T18:54:28Z | 2020-09-03T23:22:19Z | null | [] | Machine-In-The-Middle in airtable | Affected versions of `airtable` are vulnerable to Machine-In-The-Middle. The package has SSL certificate validation disabled by default unintentionally. This may allow attackers in a privileged network position to decrypt intercepted traffic.
## Recommendation
Upgrade to version 0.7.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'airtable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.19'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1305'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hf5h-hh56-3vrg | 2020-08-31T18:12:32Z | 2020-09-01T16:02:29Z | null | ['CVE-2016-10544'] | Denial of Service in uws | Affected versions of `uws` do not properly handle large websocket messages when `permessage-deflate` is enabled, which may result in a denial of service condition.
If `uws` recieves a 256Mb websocket message when `permessage-deflate` is enabled, the server will compress the message prior to executing the length check, and subsequently extract the message prior to processing. This can result in a situation where an excessively large websocket message passes the length checks, yet still gets cast from a Buffer to a string, which will exceed v8's maximum string size and crash the process.
## Recommendation
Update to version 0.10.9 or later.
Alternatively, disable `permessage-deflate`. | [] | [{'package': {'ecosystem': 'npm', 'name': 'uws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.10.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10544'}, {'type': 'WEB', 'url': 'https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/149'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r863-p739-275c | 2021-10-01T14:09:36Z | 2020-09-11T21:09:24Z | null | [] | Malicious Package in reuest | All versions of `reuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'reuest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/866'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wfjh-3hq2-r276 | 2021-09-30T20:27:36Z | 2020-09-03T19:56:48Z | null | [] | Malicious Package in node-spdy | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-spdy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1138'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fg6m-q92x-vv38 | 2023-09-13T23:06:11Z | 2020-09-01T17:26:00Z | null | ['CVE-2017-16158'] | Directory Traversal in dcserver | Affected versions of `dcserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'dcserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16158'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/393'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8mmf-qp7j-2w24 | 2021-09-30T21:53:41Z | 2020-09-02T21:35:33Z | null | [] | Malicious Package in colour-string | Version 1.5.3 of `colour-string` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'colour-string'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/903'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5h5r-23r4-m87h | 2023-09-12T21:10:48Z | 2020-09-01T16:04:39Z | null | ['CVE-2017-16019'] | Cross-Site Scripting in gitbook | Affected versions of `gitbook` do not properly sanitize user input outside of backticks, which may result in cross-site scripting in the online reader.
## Recommendation
Update to version 3.2.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'gitbook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16019'}, {'type': 'WEB', 'url': 'https://github.com/GitbookIO/gitbook/issues/1609'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/159'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jvfv-jhw9-jmpp | 2021-09-29T20:22:21Z | 2020-09-03T21:23:09Z | null | [] | Malicious Package in b5ffer-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'b5ffer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1228'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-97mp-9g5c-6c93 | 2021-10-01T20:49:31Z | 2020-09-04T16:50:48Z | null | [] | Malicious Package in bs58chcek | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bs58chcek'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1375'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-63m4-fhf2-cmf7 | 2023-09-08T18:52:10Z | 2020-09-01T16:43:55Z | null | ['CVE-2017-1000219'] | Command Execution in windows-cpu | Version of `windows-cpu` before 0.1.5 will execute arbitrary code passed into the first argument of the `findLoad` method, resulting in remote code execution.
## Proof of Concept
```js
var win = require('windows-cpu');
wind.findLoad('foo & calc.exe');
```
## Recommendation
Update to version 0.1.5 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'windows-cpu'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000219'}, {'type': 'WEB', 'url': 'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'}, {'type': 'PACKAGE', 'url': 'https://github.com/KyleRoss/windows-cpu'}, {'type': 'WEB', 'url': 'https://github.com/KyleRoss/windows-cpu/blob/master/index.js#L81'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/336'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j4ch-mw66-xmqv | 2023-07-27T00:07:25Z | 2020-09-03T19:16:44Z | null | [] | Malicious Package in pensi-scheduler | Version 1.1.3 of `pensi-scheduler` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 1.1.2 | [] | [{'package': {'ecosystem': 'npm', 'name': 'pensi-scheduler'}, 'versions': ['1.1.3']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1107'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4q2f-8g74-qm56 | 2020-08-31T18:45:01Z | 2020-09-03T17:18:05Z | null | [] | Cross-Site Scripting in takeapeek | All versions of `takeapeek` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'takeapeek'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/490728'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1038'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8fxw-76px-3rxv | 2021-08-26T15:09:35Z | 2020-09-25T18:28:17Z | null | ['CVE-2020-15192'] | Memory leak in Tensorflow | ### Impact
If a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L100-L104
The allocated memory is from
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L256
The issue occurs because the `status` argument during validation failures is not properly checked:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L265-L267
Since each of the above methods can return an error status, the `status` value must be checked before continuing.
### Patches
We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been discovered during variant analysis of [GHSA-rjjg-hgv6-h69v](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fxw-76px-3rxv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15192'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T16:22:58Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-322m-p39j-r5m2 | 2023-09-12T18:06:16Z | 2020-09-01T18:55:37Z | null | ['CVE-2017-16128'] | npm-script-demo is malware | The `npm-script-demo` package is a piece of malware that opens a connection to a command and control server and executed the instructions it is given.
It has been removed from the npm registry.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer has been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm-script-demo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16128'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/481'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:24:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wfhx-6pcm-7m55 | 2020-08-31T18:43:41Z | 2020-09-03T16:46:22Z | null | [] | Path Traversal in ponse | Versions of `ponse` prior to 2.0.2 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 2.0.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'ponse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/383112'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1002'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cwcp-6c48-fm7m | 2023-09-07T22:01:58Z | 2020-09-01T16:39:38Z | null | ['CVE-2017-16020'] | Unsafe eval() in summit allows arbitrary code execution | Affected versions of `summit` allow attackers to execute arbitrary commands via collection names when using the `PouchDB` driver.
## Recommendation
No direct patch is available at this time.
Currently, the best option to mitigate the issue is to avoid using the `PouchDB` driver, as the package author has abandoned this feature entirely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'summit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16020'}, {'type': 'WEB', 'url': 'https://github.com/notduncansmith/summit/issues/23'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/315'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gvg7-pp82-cff3 | 2021-09-23T21:36:05Z | 2020-09-01T15:59:11Z | null | ['CVE-2016-1000240'] | Cross-Site Scripting in c3 | Affected versions of `c3` are vulnerable to cross-site scripting via improper sanitization of HTML in rendered tooltips.
## Recommendation
Update to 0.4.11 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'c3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000240'}, {'type': 'WEB', 'url': 'https://github.com/c3js/c3/issues/1536'}, {'type': 'WEB', 'url': 'https://github.com/c3js/c3/pull/1675'}, {'type': 'WEB', 'url': 'https://github.com/c3js/c3/commit/de3864650300488a63d0541620e9828b00e94b42'}, {'type': 'PACKAGE', 'url': 'https://github.com/c3js/c3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/138'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:12:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-588m-9qg5-35pq | 2021-09-28T22:06:18Z | 2020-09-03T17:19:09Z | null | [] | Reverse Tabnabbing in quill | Versions of `quill` prior to 1.3.7 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'quill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/quilljs/quill/issues/2438'}, {'type': 'WEB', 'url': 'https://github.com/quilljs/quill/pull/2674'}, {'type': 'PACKAGE', 'url': 'https://github.com/quilljs/quill'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1039'}] | {'cwe_ids': ['CWE-1022'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w5q7-3pr9-x44w | 2020-08-31T18:35:52Z | 2020-09-02T15:59:19Z | null | [] | Denial of Service in serialize-to-js | Versions of `serialize-to-js` prior to 2.0.0 are vulnerable to Denial of Service. User input is not properly validated, allowing attackers to provide inputs that lead the execution to loop indefinitely.
## Recommendation
Upgrade to version 2.0.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'serialize-to-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/790'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wqr3-24xm-fxhq | 2023-09-11T16:37:49Z | 2020-09-01T17:31:22Z | null | ['CVE-2017-16168'] | Directory Traversal in wffserve | Affected versions of `wffserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'wffserve'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16168'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/city-weather-abe'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wffserve'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/407'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xj6q-9hx8-mm7f | 2023-09-05T23:30:59Z | 2020-09-01T17:34:34Z | null | ['CVE-2017-16170'] | Directory Traversal in liuyaserver | Affected versions of `liuyaserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'liuyaserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16170'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/liuyaserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/413'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q8gv-q7wr-9jf8 | 2021-08-26T15:17:12Z | 2020-09-25T18:28:41Z | null | ['CVE-2020-15204'] | Segfault in Tensorflow | ### Impact
In eager mode, TensorFlow does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/session_ops.cc#L45
In the above snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code immediately dereferences this, we get a segmentation fault.
### Patches
We have patched the issue in 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1 and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15204'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:46:27Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-rhc3-76jw-4f2x | 2020-08-31T19:00:35Z | 2020-09-04T17:58:46Z | null | [] | Denial of Service in @commercial/ammo | Versions of `@commercial/ammo` prior to 2.1.1 are vulnerable to Denial of Service. The Range HTTP header parser has a vulnerability which will cause the function to throw a system error if the header is set to an invalid value. Because hapi is not expecting the function to ever throw, the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 2.1.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': '@commercial/ammo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1473'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w9q5-mvc6-5cw3 | 2021-09-29T20:56:43Z | 2020-09-03T21:45:13Z | null | [] | Malicious Package in bufder-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'bufder-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1235'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8j7x-pr59-m5h8 | 2021-09-30T21:37:21Z | 2020-09-02T21:31:18Z | null | [] | Malicious Package in whiteproject | All versions of `whiteproject` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'whiteproject'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/898'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vhx6-cp8w-295m | 2023-09-08T18:50:06Z | 2020-09-01T16:55:45Z | null | ['CVE-2017-16095'] | Directory Traversal in serverliujiayi1 | Affected versions of `serverliujiayi1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serverliujiayi1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16095'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverliujiayi1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/367'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r32x-jhw5-g48p | 2021-09-28T21:17:47Z | 2020-09-03T17:08:20Z | null | [] | Cross-Site Scripting in eco | All versions of `eco` are vulnerable to Cross-Site Scripting (XSS). The package's default `__escape` implementation fails to escape single quotes, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'eco'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sstephenson/eco/pull/67'}, {'type': 'PACKAGE', 'url': 'https://github.com/sstephenson/eco'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1024'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q4qf-3fc6-8x34 | 2021-08-26T15:14:33Z | 2020-09-25T18:28:43Z | null | ['CVE-2020-15207'] | Segfault and data corruption in tensorflow-lite | ### Impact
To mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reduce.h#L68-L72
If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption.
### Patches
We have patched the issue in 2d88f470dea2671b430884260f3626b1fe99830a and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15207'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}] | {'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:55:41Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-wmcq-3wfx-qjx5 | 2020-08-31T18:22:02Z | 2020-09-01T17:33:30Z | null | [] | Directory Traversal in nodeload-nmickuli | Affected versions of `nodeload-nmickuli` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'nodeload-nmickuli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeload-nmickuli'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/410'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qm4q-f956-fg64 | 2021-09-30T19:50:00Z | 2020-09-03T17:39:13Z | null | [] | Malicious Package in luna-mock | All versions of `luna-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'luna-mock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1055'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mmqv-m45h-q2hp | 2022-03-14T23:59:01Z | 2020-09-04T15:22:40Z | null | [] | Sandbox Breakout / Arbitrary Code Execution in localeval | All versions of `localeval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `constructor.constructor`. This may allow attackers to execute arbitrary code in the system. Evaluating the payload
```
constructor.constructor("return process.env")()
```
returns the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'localeval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}, {'fixed': '15.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/espadrine/localeval/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c'}, {'type': 'WEB', 'url': 'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335'}, {'type': 'PACKAGE', 'url': 'https://github.com/espadrine/localeval'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3cjv-4phw-gvvv | 2021-10-01T13:25:15Z | 2020-09-01T20:39:33Z | null | [] | Malicious Package in getcookies | The `getcookies` module contained a backdoor that would allow for a remote attacker to execute arbitrary commands on the system running the malicious module.
## Recommendation
This module should be uninstalled if found used within an application. In addition to removing the installed module, you will also want to evaluate your application to determine whether or not user data or systems were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'getcookies'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/649'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:31:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-88xx-23mf-rcj2 | 2021-09-30T16:18:52Z | 2020-09-03T22:51:52Z | null | [] | Malicious Package in bs-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'bs-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1274'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7xf6-cpxm-5mx9 | 2021-09-29T21:35:53Z | 2020-09-03T22:27:18Z | null | [] | Malicious Package in bufner-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'bufner-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1264'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m7qm-r2r5-f77q | 2021-09-24T20:35:29Z | 2020-09-01T20:43:48Z | null | [] | Cross-Site Scripting in react-marked-markdown | All versions of `react-marked-markdown` are vulnerable to cross-site scripting (XSS) via `href` attributes. This is exploitable if user is provided to `react-marked-markdown`
Proof of concept:
```
import React from 'react'
import ReactDOM from 'react-dom'
import { MarkdownPreview } from 'react-marked-markdown'
ReactDOM.render(
<MarkdownPreview
markedOptions={{ sanitize: true }}
value={'[XSS](javascript: alert`1`)'}
/>,
document.getElementById('root')
)
```
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time if you allow user input into href values.
| [] | [{'package': {'ecosystem': 'npm', 'name': 'react-marked-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Vincent-P/react-marked-markdown/issues/61'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/344069'}, {'type': 'PACKAGE', 'url': 'https://github.com/Vincent-P/react-marked-markdown'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/668'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:32:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5ggx-g294-qj3q | 2021-09-29T20:57:42Z | 2020-09-03T21:47:29Z | null | [] | Malicious Package in buffeb-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffeb-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1239'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q42c-rrp3-r3xm | 2021-09-30T22:02:15Z | 2020-09-11T21:13:44Z | null | [] | Malicious Package in commmander | All versions of `commmander` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
## Recommendation
Remove the package from your environment and verify whether your system is running the cryptocurrency miner. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'commmander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/923'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v86x-f47q-f7f4 | 2020-08-31T18:42:01Z | 2020-09-11T21:09:24Z | null | [] | Unauthorized File Access in atompm | Versions of `atompm` prior to 0.8.2 are vulnerable to Unauthorized File Access. The package fails to sanitize relative paths in the URL for file downloads, allowing attackers to download arbitrary files from the system.
## Recommendation
Upgrade to version 0.8.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'atompm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/959'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-73wv-v82c-xmqv | 2021-09-29T20:58:02Z | 2020-09-03T21:50:51Z | null | [] | Malicious Package in buffep-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffep-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1240'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g8vp-6hv4-m67c | 2020-08-31T18:43:32Z | 2020-09-11T21:23:29Z | null | [] | Command Injection in entitlements | Versions of `entitlements` prior to 1.3.0 are vulnerable to Command Injection. The package does not validate input on the `entitlements` function and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
## Recommendation
Upgrade to version 1.3.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'entitlements'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/341869'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/998'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-435c-qcpm-wjw5 | 2021-10-01T21:02:01Z | 2020-09-03T17:05:43Z | null | [] | Malicious Package in fs-extar | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fs-extar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1397'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2m96-9w4j-wgv7 | 2020-08-31T18:46:06Z | 2020-09-03T18:06:00Z | null | [] | Prototype Pollution in lodash.merge | Versions of `lodash.merge` before 4.6.1 are vulnerable to Prototype Pollution. The function 'merge' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'lodash.merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1067'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mm7r-265w-jv6f | 2020-08-31T19:01:35Z | 2020-09-03T15:51:19Z | null | ['CVE-2020-8135'] | Server-Side Request Forgery in @uppy/companion | Versions of `@uppy/companion` prior to 1.9.3 are vulnerable to Server-Side Request Forgery (SSRF). The `get` route passes the user-controlled variable `req.body.url` to a GET request without sanitizing the value. This allows attackers to inject arbitrary URLs and make GET requests on behalf of the server.
## Recommendation
Upgrade to version 1.9.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': '@uppy/companion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8135'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/786956'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1501'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gqfv-g9f6-3v3m | 2023-09-13T23:05:29Z | 2020-09-01T16:50:23Z | null | ['CVE-2017-16096'] | Directory Traversal in serveryaozeyan | Affected versions of `serveryaozeyan` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serveryaozeyan'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16096'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryaozeyan'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/355'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q2c6-c6pm-g3gh | 2020-08-31T18:55:11Z | 2020-09-04T15:07:38Z | null | [] | Arbitrary Code Execution in handlebars | Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It is due to an incomplete fix for a [previous issue](https://www.npmjs.com/advisories/1316). This vulnerability can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting).
## Recommendation
Upgrade to version 3.0.8, 4.5.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.3'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1324'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wx77-rp39-c6vg | 2022-03-24T22:10:13Z | 2020-09-04T15:11:03Z | null | [] | Regular Expression Denial of Service in markdown | All versions of `markdown` are vulnerable to Regular Expression Denial of Service (ReDoS). The `markdown.toHTML()` function has significantly degraded performance when parsing long strings containing underscores. This may lead to Denial of Service if the parser accepts user input.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/evilstreak/markdown-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1330'}] | {'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qvjc-g5vr-mfgr | 2021-10-04T21:11:37Z | 2020-09-04T18:03:04Z | null | [] | Regular Expression Denial of Service in papaparse | Versions of `papaparse` prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The `parse` function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.
## Recommendation
Upgrade to version 5.2.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'papaparse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mholt/PapaParse/issues/777'}, {'type': 'PACKAGE', 'url': 'https://github.com/mholt/PapaParse'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PAPAPARSE-564258'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1515'}] | {'cwe_ids': ['CWE-185'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:02:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f3pc-c2gf-hvgw | 2021-10-01T14:10:10Z | 2020-09-02T21:13:14Z | null | [] | Malicious Package in requets | All versions of `requets` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'requets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/868'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h6mq-3cj6-h738 | 2021-10-01T16:12:36Z | 2020-09-03T23:21:16Z | null | [] | Reverse Tabnabbing in showdown | Versions of `showdown` prior to 1.9.1 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks.
## Recommendation
Upgrade to version 1.9.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'showdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/showdownjs/showdown/pull/670'}, {'type': 'WEB', 'url': 'https://github.com/showdownjs/showdown/commit/1cd281f0643ef613dc1d36847d4c6cbb22501d91'}, {'type': 'PACKAGE', 'url': 'https://github.com/showdownjs/showdown'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SHOWDOWN-469487'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1302'}] | {'cwe_ids': ['CWE-1022'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w32g-5hqp-gg6q | 2021-09-27T13:34:07Z | 2020-09-02T15:41:41Z | null | [] | Cross-Site Scripting in mermaid | Versions of `mermaid` prior to 8.2.3 are vulnerable to Cross-Site Scripting. If malicious input such as `A["<img src=invalid onerror=alert('XSS')></img>"] ` is provided to the application, it will execute the code instead of rendering it as text due to improper output encoding.
## Recommendation
Upgrade to version 8.2.3 or later | [] | [{'package': {'ecosystem': 'npm', 'name': 'mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/knsv/mermaid/issues/847'}, {'type': 'PACKAGE', 'url': 'https://github.com/knsv/mermaid'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/751'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qcff-ffx3-m25c | 2020-08-31T18:59:58Z | 2020-09-04T17:31:44Z | null | [] | Command Injection in meta-git | All versions of `meta-git` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `clone` command is vulnerable through the branch name.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'meta-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/728040'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1457'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9cph-cqqh-36pw | 2021-10-01T20:17:59Z | 2020-09-04T15:29:25Z | null | [] | Malicious Package in babel-loqder | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'babel-loqder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1350'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4p6w-m9wc-c9c9 | 2022-02-08T22:06:02Z | 2020-09-14T18:13:29Z | null | ['CVE-2020-1945'] | Sensitive Data Exposure in Apache Ant | Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ant:ant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '1.9.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.ant:ant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1945'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d08a96ba9de8aa435f32944e8b2867c368a518d4ff57782e3637335@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1863b9ce4c3e4b1e5b0c671ad05545ba3eb8399616aa746af5dfe1b1@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1a9c992d7c8219dc15b4ad448649f0ffdaa88d76ef6a0035c49455f5@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b32c76afffcf676e13ed635a3332f3e46e6aaa7722eb3fc7a28f58e@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2704fb14ce068c64759a986f81d5b5e42ab434fa13d0f444ad52816b@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3cea0f3da4f6d06d7afb6c0804da8e01773a0f50a09b8d9beb2cda65@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b2904d64affd4266cd72ccb2fc3927c1c2f22009f183095aa46bf90@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5dfc77048b1f9db26622dce91a6edf083d499397256594952fad5f35@%3Ccommits.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6030d34ceacd0098538425c5dac8251ffc7fd90b886942bc7ef87858@%3Cnotifications.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6970d196cd73863dafdbc3a7052562deedd338e3bd7d73d8171d92d6@%3Ccommits.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6e295d792032ec02b32be3846c21a58857fba4a077d22c5842d69ba2@%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6edd3e2cb79ee635630d891b54a4f1a9cd8c7f639d6ee34e75fbe830@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r815f88d1044760176f30a4913b4baacd06f3eae4eb662de7388e46d8@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e24abb7dd77cda14c6df90a377c94f0a413bbfcec90a29540ff8adf@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e592bbfc016a5dbe2a8c0e81ff99682b9c78c453621b82c14e7b75e%40%3Cdev.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95dc943e47a211d29df605e14f86c280fc9fa8d828b2b53bd07673c9@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cdev.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cusers.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb860063819b9c0990e1fbce29d83f4554766fe5a05e3b3939736bf2b@%3Ccommits.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8ec556f176c83547b959150e2108e2ddf1d61224295941908b0a81f@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea@%3Cdev.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc89e491b5b270fb40f1210b70554527b737c217ad2e831b643ead6bc@%3Cuser.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce099751721c26a8166d8b6578293820832831a0b2cb8d93b8efa081@%3Cnotifications.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7dda48ff835f4d0293949837d55541bfde3683bd35bd8431e324538@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rda80ac59119558eaec452e58ddfac2ccc9211da1c65f7927682c78b1@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdaa9c51d5dc6560c9d2b3f3d742c768ad0705e154041e574a0fae45c@%3Cnotifications.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re1ce84518d773a94a613d988771daf9252c9cf7375a9a477009f9735@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf07feaf78afc8f701e21948a06ef92565d3dff1242d710f4fbf900b2@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd346609527a79662c48b1da3ac500ec30f29f7ddaa3575051e81890@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQBR65TINSJRN7PTPIVNYS33P535WM74/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRVAWTCVXJMRYKQKEXYSNBF7NLSR6OEI/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-34'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4380-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09/30/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/06/1'}] | {'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-14T18:12:46Z', 'nvd_published_at': '2020-05-14T16:15:00Z'} |
1.4.0 | GHSA-fw4p-36j9-rrj3 | 2020-08-31T18:48:48Z | 2020-09-03T20:25:33Z | null | [] | Denial of Service in sequelize | Versions of `sequelize` prior to 4.44.4 are vulnerable to Denial of Service (DoS). The SQLite dialect fails to catch a `TypeError` exception for the `results` variable. The `results` value may be undefined and trigger the error on a `.map` call. This may allow attackers to submit malicious input that forces the exception and crashes the Node process.
The following proof-of-concept crashes the Node process:
```
const Sequelize = require('sequelize');
const sequelize = new Sequelize({
dialect: 'sqlite',
storage: 'database.sqlite'
});
const TypeError = sequelize.define('TypeError', {
name: Sequelize.STRING,
});
TypeError.sync({force: true}).then(() => {
return TypeError.create({name: "SELECT tbl_name FROM sqlite_master"});
});
```
## Recommendation
Upgrade to version 4.44.4 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.44.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/11877'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1142'}] | {'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hq8g-qq57-5275 | 2020-08-31T18:43:13Z | 2020-09-11T21:24:33Z | null | [] | SQL Injection in untitled-model | All versions of `untitled-model` re vulnerable to SQL Injection. Query parameters are not properly sanitized allowing attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'untitled-model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/507222'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/989'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h2jv-5v3f-7m7j | 2021-01-14T15:57:07Z | 2020-09-01T16:10:03Z | null | ['CVE-2016-10680'] | Downloads Resources over HTTP in adamvr-geoip-lite | Affected versions of `adamvr-geoip-lite` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'adamvr-geoip-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10680'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/283'}] | {'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:17:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xwg3-gjxh-c8pm | 2023-07-26T23:58:59Z | 2020-09-03T19:14:32Z | null | [] | Malicious Package in ngx-context-menu | Version 0.0.26 of `ngx-context-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 0.0.25 | [] | [{'package': {'ecosystem': 'npm', 'name': 'ngx-context-menu'}, 'versions': ['0.0.26']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1105'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mxjj-953w-2c2v | 2021-08-26T15:16:46Z | 2020-09-25T18:28:44Z | null | ['CVE-2020-15208'] | Data corruption in tensorflow-lite | ### Impact
When determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/types.h#L437-L442
Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors.
### Patches
We have patched the issue in 8ee24e7949a20 and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15208'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}] | {'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:59:45Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-c8h6-89q2-mgv8 | 2021-09-24T17:24:28Z | 2020-09-01T19:55:48Z | null | [] | Malicious Package in dossier | Version 0.0.4 of `dossier` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.4 of this module is found installed you will want to replace it with a version before or after 0.0.4. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'dossier'}, 'versions': ['0.0.4']}] | [{'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c8h6-89q2-mgv8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOSSIER-450994'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/625'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-657v-jjf8-83gh | 2021-10-01T14:37:41Z | 2020-09-03T23:14:55Z | null | [] | Malicious Package in jsmsha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsmsha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1295'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xmq7-7fxm-rr79 | 2021-08-26T15:14:11Z | 2020-09-25T18:28:37Z | null | ['CVE-2020-15203'] | Denial of Service in Tensorflow | ### Impact
By controlling the `fill` argument of [`tf.strings.as_string`](https://www.tensorflow.org/api_docs/python/tf/strings/as_string), a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/as_string_op.cc#L68-L74
This can result in unexpected output:
```python
In [1]: tf.strings.as_string(input=[1234], width=6, fill='-')
Out[1]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['1234 '], dtype=object)>
In [2]: tf.strings.as_string(input=[1234], width=6, fill='+')
Out[2]: <tf.Tensor: shape=(1,), dtype=string, numpy=array([' +1234'], dtype=object)>
In [3]: tf.strings.as_string(input=[1234], width=6, fill="h")
Out[3]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['%6d'], dtype=object)>
In [4]: tf.strings.as_string(input=[1234], width=6, fill="d")
Out[4]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['12346d'], dtype=object)>
In [5]: tf.strings.as_string(input=[1234], width=6, fill="o")
Out[5]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['23226d'], dtype=object)>
In [6]: tf.strings.as_string(input=[1234], width=6, fill="x")
Out[6]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['4d26d'], dtype=object)>
In [7]: tf.strings.as_string(input=[1234], width=6, fill="g")
Out[7]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['8.67458e-3116d'], dtype=object)>
In [8]: tf.strings.as_string(input=[1234], width=6, fill="a")
Out[8]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['0x0.00ff7eebb4d4p-10226d'], dtype=object)>
In [9]: tf.strings.as_string(input=[1234], width=6, fill="c")
Out[9]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['\xd26d'], dtype=object)>
In [10]: tf.strings.as_string(input=[1234], width=6, fill="p")
Out[10]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['0x4d26d'], dtype=object)>
In [11]: tf.strings.as_string(input=[1234], width=6, fill='m')
Out[11]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['Success6d'], dtype=object)>
```
However, passing in `n` or `s` results in segmentation fault.
### Patches
We have patched the issue in 33be22c65d86256e6826666662e40dbdfe70ee83 and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15203'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}] | {'cwe_ids': ['CWE-134', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:34:02Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-22h7-7wwg-qmgg | 2020-08-31T19:00:24Z | 2020-09-04T17:56:39Z | null | [] | Prototype Pollution in @hapi/hoek | Versions of `@hapi/hoek` prior to 8.5.1 and 9.0.3 are vulnerable to Prototype Pollution. The `clone` function fails to prevent the modification of the Object prototype when passed specially-crafted input. Attackers may use this to change existing properties that exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances.
This issue __does not__ affect hapi applications since the framework protects against such malicious inputs. Applications that use `@hapi/hoek` outside of the hapi ecosystem may be vulnerable.
## Recommendation
Update to version 8.5.1, 9.0.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': '@hapi/hoek'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.3.2'}, {'fixed': '8.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/hoek'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1468'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-533p-g2hq-qr26 | 2020-08-31T18:59:07Z | 2020-09-04T17:16:35Z | null | [] | Command Injection in treekill | All versions of `treekill` are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'treekill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/703415'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1433'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vm7j-4rj6-mw2p | 2021-09-29T20:46:35Z | 2020-09-03T21:08:42Z | null | [] | Malicious Package in ember_cli_babe | Version 6.16.0 of `ember_cli_babe` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ember_cli_babe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1200'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f8h3-rqrm-47v9 | 2020-08-31T18:36:15Z | 2020-09-02T16:02:40Z | null | [] | Prototype Pollution in smart-extend | All versions of `smart-extend` are vulnerable to Prototype Pollution. The `deep()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'smart-extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/438274'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/801'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pqpp-2363-649v | 2020-08-31T18:36:36Z | 2020-09-02T18:22:30Z | null | [] | Cross-Site Scripting in buttle | All versions of `buttle` are vulnerable to Cross-Site Scripting. Due to misconfiguration of its rendering engine, `buttle` does not sanitize the HTML output allowing attackers to run arbitrary JavaScript when processing malicious markdown files.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| [] | [{'package': {'ecosystem': 'npm', 'name': 'buttle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/404126'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/810'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vm67-mh96-95mq | 2021-09-29T20:53:43Z | 2020-09-03T21:40:48Z | null | [] | Malicious Package in bubfer-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'bubfer-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1232'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:41Z', 'nvd_published_at': None} |