schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 14 228 | details stringlengths 48 1.45k | severity stringlengths 2 78 | affected stringlengths 79 6.96k | references stringlengths 143 6.38k | database_specific stringlengths 131 174 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-4vfj-c2xf-8r48 | 2023-09-05T22:26:53Z | 2018-07-23T20:45:20Z | null | ['CVE-2017-16169'] | Directory Traversal in looppake | Affected versions of `looppake` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
... | [] | [{'package': {'ecosystem': 'npm', 'name': 'looppake'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16169'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/looppake'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4vfj-c2xf-8r48'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/a... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5j2h-h5hg-3wf8 | 2020-06-16T21:16:24Z | 2018-07-23T19:51:10Z | null | ['CVE-2011-0696'] | Moderate severity vulnerability that affects django | Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a re... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0696'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=676357'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5j2h-h5hg-3wf8'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announc... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cr6c-85fh-cqpg | 2021-09-09T20:49:32Z | 2018-07-31T22:27:04Z | null | ['CVE-2016-10692'] | Downloads Resources over HTTP in haxeshim | Affected versions of `haxeshim` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxeshim... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'haxeshim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10692'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cr6c-85fh-cqpg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/300'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ff6r-5jwm-8292 | 2023-09-11T21:52:22Z | 2018-07-24T19:51:16Z | null | ['CVE-2017-16099'] | Regular Expression Denial of Service in no-case | Affected versions of `no-case` are vulnerable to a regular expression denial of service when parsing untrusted user input.
## Recommendation
Update to version 2.3.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'no-case'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16099'}, {'type': 'WEB', 'url': 'https://github.com/blakeembrey/no-case/issues/17'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ff6r-5jwm-8292'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/529'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7wph-fc4w-wqp2 | 2021-09-03T21:46:38Z | 2018-07-23T19:51:59Z | null | ['CVE-2010-4535'] | Moderate severity vulnerability that affects django | The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large bas... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-4535'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=665373'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7wph-fc4w-wqp2'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p6h9-gw49-rqm4 | 2022-05-25T13:56:11Z | 2018-07-12T20:29:21Z | null | ['CVE-2018-5773'] | markdown2 is vulnerable to cross-site scripting | An issue was discovered in `markdown2` (aka python-markdown2) through 2.3.5. The `safe_mode` feature, which is supposed to sanitize user input against XSS, is flawed and does not escape the input properly. With a crafted payload, XSS can be triggered, as demonstrated by omitting the final `>` character from an IMG tag. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5773'}, {'type': 'WEB', 'url': 'https://github.com/google/osv/issues/430'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/issues/285'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/pull/303'}, {'type': 'AD... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-924m-4pmx-c67h | 2023-03-31T14:51:18Z | 2018-07-13T16:01:17Z | null | ['CVE-2017-1000433'] | pysaml2 Improper Authentication vulnerability | pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000433'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/issues/451'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/pull/454'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/6312a41e03795485... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:01Z', 'nvd_published_at': '2018-01-02T23:29:00Z'} |
1.4.0 | GHSA-mpcf-4gmh-23w8 | 2023-09-11T22:05:14Z | 2018-07-24T20:16:30Z | null | ['CVE-2017-16118'] | Regular Expression Denial of Service in forwarded | Affected versions of `forwarded` are vulnerable to regular expression denial of service when parsing specially crafted user input.
## Recommendation
Update to version 0.1.2 or later | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'forwarded'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16118'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mpcf-4gmh-23w8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/527'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104427'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wc9v-mj63-m9g5 | 2023-09-11T18:31:10Z | 2018-07-24T19:44:42Z | null | ['CVE-2017-16082'] | Remote Code Execution in pg | Affected versions of `pg` contain a remote code execution vulnerability that occurs when the remote database or query specifies a crafted column name.
There are two specific scenarios in which it is likely for an application to be vulnerable:
1. The application executes unsafe, user-supplied sql which contains malici... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTE... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16082'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wc9v-mj63-m9g5'}, {'type': 'WEB', 'url': 'https://node-postgres.com/announcements#2017-08-12-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advi... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6cwv-x26c-w2q4 | 2022-04-26T18:05:03Z | 2018-07-12T12:00:00Z | null | ['CVE-2018-8768'] | Jupyter Notebook file bypasses sanitization, executes JavaScript | In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8768'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2018/03/15/2'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p7c9-jqhq-vr3v | 2023-03-01T01:36:36Z | 2018-07-27T17:03:46Z | null | ['CVE-2018-3770'] | Remote Code Execution in markdown-pdf | Versions of `markdown-pdf` prior to 9.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize HTML code in markdown files. If markdown files with malicious HTML are converted to PDF, the resulting PDF file will execute any JavaScript code in the original markdown file. This may allow attackers to exe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'markdown-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3770'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/360727'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p7c9-jqhq-vr3v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/991'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:26Z', 'nvd_published_at': '2018-07-20T22:29:00Z'} |
1.4.0 | GHSA-fxpg-gg9g-76gj | 2021-09-10T20:17:17Z | 2018-07-23T19:52:42Z | null | ['CVE-2010-3082'] | Moderate severity vulnerability that affects django | Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3082'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/7f84657b6b2243cc787bdb9f296710c8d13ad0bd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=632239'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmclo... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j5mg-fpq8-vvxv | 2023-09-07T18:25:38Z | 2018-07-23T20:48:14Z | null | ['CVE-2017-16143'] | Directory Traversal in commentapp.stetsonwood | Affected versions of `commentapp.stetsonwood` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example reque... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'commentapp.stetsonwood'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16143'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/commentapp.stetsonwood'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j5mg-fpq8-vvxv'}, {'type': 'WEB', 'url': 'https://w... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-48vv-2pmq-9fvv | 2021-08-31T21:48:47Z | 2018-07-23T19:51:14Z | null | ['CVE-2012-6661'] | Moderate severity vulnerability that affects Plone and Zope2 | Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2). | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Zope2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.2'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6661'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/zope2/+bug/1071067'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-48vv-2pmq-9fvv'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Products.CMFPlone'}, {'type': 'W... | {'cwe_ids': ['CWE-336'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rrfc-g2gh-xvjm | 2023-09-11T23:12:18Z | 2018-07-23T20:46:07Z | null | ['CVE-2017-16162'] | Directory Traversal in 22lixian | Affected versions of `22lixian` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '22lixian'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16162'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/22lixian'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrfc-g2gh-xvjm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/a... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-23wc-v4mf-x7v4 | 2023-09-07T22:48:16Z | 2018-07-23T20:44:45Z | null | ['CVE-2017-16178'] | Directory Traversal in intsol-package | `intsol-package` is a file server.
`intsol-package` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
**Example Request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:localhost
```
and the server's Response
```http
HTTP/1.1 ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'intsol-package'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16178'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/intsol-package'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-23wc-v4mf-x7v4'}, {'type': 'WEB', 'url': 'https://www.npmjs... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qmhf-qg6f-pc4v | 2023-09-12T21:23:21Z | 2018-07-23T20:39:51Z | null | ['CVE-2017-16217'] | Directory Traversal in fbr-client | Affected versions of `fbr-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```htt... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fbr-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16217'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/fbr-client'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qmhf-qg6f-pc4v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-prr5-pfr8-q9f3 | 2021-09-16T19:14:17Z | 2018-07-23T19:52:35Z | null | ['CVE-2012-5503'] | Moderate severity vulnerability that affects Plone | ftp.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read hidden folder contents via unspecified vectors. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3a1'}, {'fixed': '4.3b1'}]}], 'database_specific': {'last_known_... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5503'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-prr5-pfr8-q9f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Products.CMFPlone'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/C... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8xjv-v9xq-m5h9 | 2023-09-05T09:23:16Z | 2018-07-24T20:15:36Z | null | ['CVE-2016-0775'] | Pillow Buffer overflow in ImagingFliDecode | Buffer overflow in the `ImagingFliDecode` function in `libImaging/FliDecode.c` in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0775'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8xjv-v9xq-m5h9'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x5pg-88wf-qq4p | 2023-09-07T22:11:27Z | 2018-07-24T20:10:52Z | null | ['CVE-2017-16114'] | Regular Expression Denial of Service in marked | Affected versions of `marked` are vulnerable to a regular expression denial of service.
The amplification in this vulnerability is significant, with 1,000 characters resulting in the event loop being blocked for around 6 seconds.
## Recommendation
Update to version 0.3.9 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16114'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/937'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x5pg-88wf-qq4p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/531'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jpjp-vxv6-59hm | 2023-09-11T23:12:30Z | 2018-07-23T20:41:11Z | null | ['CVE-2017-16187'] | Directory Traversal in open-device | Affected versions of `open-device` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```ht... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'open-device'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16187'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/open-device'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jpjp-vxv6-59hm'}, {'type': 'WEB', 'url': 'https://www.npmjs.co... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-32pc-xphx-q4f6 | 2022-04-26T18:06:43Z | 2018-07-12T20:30:49Z | null | ['CVE-2018-1000164'] | Gunicorn contains Improper Neutralization of CRLF sequences in HTTP headers | gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'gunicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000164'}, {'type': 'WEB', 'url': 'https://github.com/benoitc/gunicorn/issues/1227'}, {'type': 'WEB', 'url': 'https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisor... | {'cwe_ids': ['CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-884w-698f-927f | 2023-09-11T22:41:23Z | 2018-07-27T17:06:50Z | null | ['CVE-2018-1002203'] | Arbitrary File Write via Archive Extraction in unzipper | Versions of `unzipper` before 0.8.13 are vulnerable to arbitrary file write when used to extract a specifically crafted archive that contains path traversal filenames (`../../file.txt` for example).
## Recommendation
Update to version 0.3.18 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'unzipper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002203'}, {'type': 'WEB', 'url': 'https://github.com/ZJONSSON/node-unzipper/pull/59'}, {'type': 'WEB', 'url': 'https://github.com/ZJONSSON/node-unzipper/commit/2220ddd5b58f6252069a4f99f9475441ad0b50cd'}, {'type': 'WEB', 'url': 'https://hackerone.c... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-232r-66cg-79px | 2023-08-07T15:45:44Z | 2018-07-12T20:29:30Z | null | ['CVE-2018-7750'] | Paramiko not properly checking authentication before processing other requests | transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}, {'package': {'ecosystem... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7750'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/issues/1175'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/commit/e9dfd854bdaf8af15d7834f7502a0451d217bb8c'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:50:58Z', 'nvd_published_at': '2018-03-13T18:29:00Z'} |
1.4.0 | GHSA-w4vg-rf63-f3j3 | 2022-04-26T18:06:19Z | 2018-07-12T14:45:42Z | null | ['CVE-2016-9190'] | Arbitrary code using "crafted image file" approach affecting Pillow | Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9190'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/2105'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af'}, {'type': 'ADVISORY', 'url': 'https:... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pmg9-p9r2-6q87 | 2021-01-08T18:20:33Z | 2018-07-24T19:46:37Z | null | ['CVE-2017-16086'] | ReDoS via long UserAgent header in ua-parser | Affected versions of `ua-parser` are vulnerable to regular expression denial of service when given a specially crafted `User-Agent` header.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different, functionally equivale... | [] | [{'package': {'ecosystem': 'npm', 'name': 'ua-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16086'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pmg9-p9r2-6q87'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/316'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5jg5-w395-9684 | 2023-09-11T19:00:46Z | 2018-07-23T20:39:59Z | null | ['CVE-2017-16212'] | Directory Traversal in ltt | Affected versions of `ltt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ltt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16212'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5jg5-w395-9684'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/adviso... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pr49-5hhf-6mm6 | 2023-09-08T23:29:43Z | 2018-07-23T20:44:34Z | null | ['CVE-2017-16180'] | Directory Traversal in serverabc | Affected versions of `serverabc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serverabc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16180'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverabc'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pr49-5hhf-6mm6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h8mc-42c3-r72p | 2023-09-06T20:06:02Z | 2018-07-24T15:40:47Z | null | ['CVE-2017-16035'] | hubl-server downloads resources over HTTP | Affected versions of `hubl-server` insecurely download dependencies over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the responses and replace the dependencies with malicious ones, resulting in code execution on the system running `hubl... | [] | [{'package': {'ecosystem': 'npm', 'name': 'hubl-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16035'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h8mc-42c3-r72p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/334'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3c48-6pcv-88rm | 2023-09-11T16:16:25Z | 2018-07-27T17:05:27Z | null | ['CVE-2018-1999024'] | Macro in MathJax running untrusted Javascript within a web browser | MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the `\unicode{}` macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mathjax'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024'}, {'type': 'WEB', 'url': 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}, {'type': 'WEB', 'url': 'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html'}, {'type': 'ADVISORY',... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w4pv-w56c-mg4v | 2023-01-31T01:40:33Z | 2018-07-18T21:20:15Z | null | ['CVE-2018-3734'] | Path Traversal in stattic | Versions of `stattic` before 0.3.0 are vulnerable to path traversal allowing a remote attacker to read arbitrary files with any extension from the server that users `stattic`.
## Recommendation
Update to version 0.3.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'stattic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3734'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319003'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w4pv-w56c-mg4v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/591'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:29Z', 'nvd_published_at': '2018-05-29T20:29:00Z'} |
1.4.0 | GHSA-2gjg-5x33-mmp2 | 2023-03-01T01:47:01Z | 2018-07-25T22:44:05Z | null | ['CVE-2018-3729'] | Path Traversal in localhost-now | Versions of `localhost-now` before 1.0.2 are vulnerable to path traversal. This allows a remote attacker to read the content of an arbitrary file.
## Recommendation
Update to version 1.0.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'localhost-now'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3729'}, {'type': 'WEB', 'url': 'https://github.com/DCKT/localhost-now/commit/30b004c7f145d677df8800a106c2edc982313995#diff-b9cfc7f2cdf78a7f4b91a753d10865a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/312889'}, {'type': 'ADVISORY', 'url... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:01Z', 'nvd_published_at': '2018-06-07T02:29:00Z'} |
1.4.0 | GHSA-7g9h-c88w-r7h2 | 2020-06-16T21:22:48Z | 2018-07-23T19:52:31Z | null | ['CVE-2011-0698'] | High severity vulnerability that affects django | Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0698'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7g9h-c88w-r7h2'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/02/09/6'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43230'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-94x5-94wf-m445 | 2023-09-11T23:14:13Z | 2018-07-24T15:48:38Z | null | ['CVE-2017-16037'] | Directory Traversal in gomeplus-h5-proxy | Affected versions of `gomeplus-h5-proxy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'gomeplus-h5-proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16037'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-94x5-94wf-m445'}, {'type': 'WEB', 'url': 'https://www.np... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fwr5-q9rx-294f | 2021-09-10T20:11:19Z | 2018-07-23T19:51:40Z | null | ['CVE-2010-4534'] | Moderate severity vulnerability that affects django | The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-4534'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=665373'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fwr5-q9rx-294f'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', ... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6528-wvf6-f6qg | 2022-04-26T18:13:29Z | 2018-07-12T20:29:26Z | null | ['CVE-2018-6594'] | Pycrypto generates weak key parameters | lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pycrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6594'}, {'type': 'WEB', 'url': 'https://github.com/dlitz/pycrypto/issues/253'}, {'type': 'WEB', 'url': 'https://github.com/TElgamal/attack-on-pycrypto-elgamal'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6528-wvf6-f6qg'}, {'ty... | {'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4w88-rjj3-x7wp | 2023-09-13T19:15:15Z | 2018-07-24T20:04:23Z | null | ['CVE-2017-16151'] | Chromium Remote Code Execution in electron | Affected versions of `ElectronJS` are susceptible to a remote code execution vulnerability that occurs when an affected application access remote content, even if the [sandbox option](https://electron.atom.io/docs/api/sandbox-option) is enabled.
## Recommendation
Update to electron version 1.7.8 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.14'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16151'}, {'type': 'WEB', 'url': 'https://electron.atom.io/blog/2017/09/27/chromium-rce-vulnerability-fix'}, {'type': 'WEB', 'url': 'https://electronjs.org/blog/chromium-rce-vulnerability'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6xhf-x49c-m5m6 | 2020-08-31T18:27:14Z | 2018-07-24T20:04:11Z | null | ['CVE-2017-16225'] | Github Token Leak in aegir | Affected versions of `aegir` bundle and publish the current users github token to npm when `aegir-release` is executed.
## Recommendation
Update to version 12.0.8 or later.
If you used this module to do a release for your project you should invalidate the GitHub tokens that were leaked. | [] | [{'package': {'ecosystem': 'npm', 'name': 'aegir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.0.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16225'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6xhf-x49c-m5m6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/546'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pvhp-v9qp-xf5r | 2023-08-31T21:39:49Z | 2018-07-23T19:50:48Z | null | ['CVE-2011-4103'] | Django-piston and Django-tastypie do not properly deserialize YAML data | emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.
Django Tastypie has a very similar vulnerability. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-piston'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.2.0'}}, {'package': {'ecosystem': 'PyPI', 'nam... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4103'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/jespern/django-piston'}, {'type': 'WEB', 'url': 'https://bitbucket.org/jespern/django-piston/commits/91bdaec89543/'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=7506... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xpm8-98mx-h4c5 | 2023-08-23T22:33:51Z | 2018-07-13T16:01:07Z | null | ['CVE-2017-16615'] | Unsafe deserialization in MLAlchemy | An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have be... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'MLAlchemy'}, 'ecosystem_specific': {'affected_functions': ['mlalchemy.parser.parse_yaml_query']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16615'}, {'type': 'WEB', 'url': 'https://github.com/thanethomson/MLAlchemy/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/thanethomson/MLAlchemy/commit/bc795757febdcce430d89f9d08f75c32d6989d3c'}, {'type': 'ADVISORY', 'url': 'https://github.... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g7q5-pjjr-gqvp | 2021-09-10T20:28:19Z | 2018-07-24T20:14:39Z | null | ['CVE-2017-15010'] | Regular Expression Denial of Service in tough-cookie | Affected versions of `tough-cookie` are susceptible to a regular expression denial of service.
The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.
If node was compiled using the `-DHTTP_MAX_HEADER_SI... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'tough-cookie'}, 'ecosystem_specific': {'affected_functions': ['tough-cookie.Cookie.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15010'}, {'type': 'WEB', 'url': 'https://github.com/salesforce/tough-cookie/issues/92'}, {'type': 'WEB', 'url': 'https://github.com/salesforce/tough-cookie/commit/f1ed420a6a92ea7a5418df6e39e676556bc0c71d'}, {'type': 'WEB', 'url': 'https://access.re... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qmm9-x5gr-4gfm | 2023-01-31T01:42:14Z | 2018-07-18T21:20:12Z | null | ['CVE-2018-3743'] | Open Redirect in hekto | Versions of `hekto` before 0.2.4 are vulnerable to open redirect when a domain name is used as part of the `.html` filename.
## Recommendation
Update to version 0.2.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'hekto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3743'}, {'type': 'WEB', 'url': 'https://github.com/herber/hekto/pull/3'}, {'type': 'WEB', 'url': 'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/320693'}, {'t... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:21Z', 'nvd_published_at': '2018-06-01T17:29:00Z'} |
1.4.0 | GHSA-8p5c-f328-9fvv | 2022-04-26T18:15:07Z | 2018-07-13T16:01:21Z | null | ['CVE-2017-0359'] | Diffoscope may write to arbitrary locations due to an untrusted archive | diffoscope before 76 writes to arbitrary locations on disk based on the contents of an untrusted archive. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'diffoscope'}, 'ecosystem_specific': {'affected_functions': ['diffoscope.comparators.utils.libarchive.LibarchiveContainer.ensure_unpacked', 'diffoscope.comparators.utils.libarchive.LibarchiveContainer.get_member_names', 'diffoscope.comparators.utils.libarchive.LibarchiveContai... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0359'}, {'type': 'WEB', 'url': 'https://github.com/anthraxx/diffoscope/commit/632a40828a54b399787c25e7fa243f732aef7e05'}, {'type': 'WEB', 'url': 'https://github.com/anthraxx/diffoscope/commit/f379d1f611dbd5d361e12b732e07c8aee45ff226'}, {'type': 'WE... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2p78-8hh6-96xc | 2020-06-16T20:52:46Z | 2018-07-23T19:52:21Z | null | ['CVE-2011-1157'] | Moderate severity vulnerability that affects feedparser | Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via malformed XML comments. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'feedparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1157'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=680074'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=684877'}, {'type': 'WEB', 'url': 'https://code.google.com/p/feedparser/issues/detail?id=254'},... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3c5c-7235-994j | 2023-09-05T09:23:54Z | 2018-07-24T20:15:13Z | null | ['CVE-2016-2533'] | Pillow buffer overflow in ImagingPcdDecode | Buffer overflow in the `ImagingPcdDecode` function in `PcdDecode.c` in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2533'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/1706'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b'}, {'type': '... | {'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j6w4-pg6p-5mrv | 2023-09-12T21:19:52Z | 2018-07-23T23:51:04Z | null | ['CVE-2017-16106'] | Directory Traversal in tmock | `tmock` is a static file server.
`tmock` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host: localhost
```
and server Response:
```http
HTTP/1.1 200 OK
Date: Th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tmock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16106'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j6w4-pg6p-5mrv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advi... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vfp9-gwrh-wq9g | 2023-03-01T01:14:15Z | 2018-07-18T21:20:19Z | null | ['CVE-2018-3733'] | Path Traversal in crud-file-server | Versions of `crud-file-server` prior to 0.9.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 0.9.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'crud-file-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3733'}, {'type': 'WEB', 'url': 'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310690'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisori... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:36Z', 'nvd_published_at': '2018-05-29T20:29:00Z'} |
1.4.0 | GHSA-73jp-3c67-hjfv | 2021-09-02T19:18:46Z | 2018-07-26T15:53:31Z | null | ['CVE-2016-7191'] | Authentication Bypass in passport-azure-ad | Affected versions of `passport-azure-ad` do not recognize the `validateIssuer` setting, which allows remote attackers to bypass authentication via a crafted token.
## Recommendation
Version 1.x: Update to version 1.4.6 or later.
Version 2.x: Update to version 2.0.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'passport-azure-ad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'passport-azure-ad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'version... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7191'}, {'type': 'PACKAGE', 'url': 'https://github.com/AzureAD/passport-azure-ad'}, {'type': 'WEB', 'url': 'https://github.com/AzureAD/passport-azure-ad/blob/master/SECURITY-NOTICE.MD'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GH... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wjr4-2jgw-hmv8 | 2023-09-12T21:12:31Z | 2018-07-31T18:28:53Z | null | ['CVE-2018-3772'] | Command Injection in whereis | Versions of `whereis` before 0.4.1 are vulnerable to command injection if untrusted user input is passed into `whereis`.
## Recommendation
Update to version 0.4.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'whereis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3772'}, {'type': 'WEB', 'url': 'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319476'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2qx8-589j-gcpx | 2020-06-16T20:52:51Z | 2018-07-23T20:26:45Z | null | ['CVE-2011-1950'] | Moderate severity vulnerability that affects Plone and plone.app.users | plone.app.users in Plone 4.0 and 4.1 allows remote authenticated users to modify the properties of arbitrary accounts via unspecified vectors, as exploited in the wild in June 2011. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone.app.users'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0a1'}, {'fixed': '1.0.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.users'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1b1'}, {'fixed': '1.1.1'}]}]}, {'package... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1950'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67695'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2qx8-589j-gcpx'}, {'type': 'WEB', 'url': 'http://osvdb.org/72729'}, {'type': 'WEB', 'url':... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8m3r-rv5g-fcpq | 2021-09-07T19:50:22Z | 2018-07-23T21:01:00Z | null | ['CVE-2011-0697'] | Moderate severity vulnerability that affects django | Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0697'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=676359'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8m3r-rv5g-fcpq'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3hq4-f2v6-q338 | 2023-09-01T20:29:04Z | 2018-07-12T20:30:30Z | null | ['CVE-2018-9856'] | Kotti CSRF in the local roles implementation | Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a `/admin-document/@@share` request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Kotti'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Kotti'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9856'}, {'type': 'WEB', 'url': 'https://github.com/Kotti/Kotti/issues/551'}, {'type': 'WEB', 'url': 'https://github.com/Kotti/Kotti/commit/69d3c8a5d7203ddaec5ced5901acf87baddd76be'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h6hq-c896-w882 | 2021-09-14T15:28:52Z | 2018-07-23T21:01:10Z | null | ['CVE-2011-1949'] | Low severity vulnerability that affects Plone | Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.2'}, {'fixed': '3.3.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1949'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67694'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h6hq-c896-w882'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': '... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wwf2-5cj8-jx6w | 2023-09-13T22:59:29Z | 2018-07-23T20:50:21Z | null | ['CVE-2017-16049'] | nodesqlite is malware | The `nodesqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is deter... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodesqlite'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16049'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wwf2-5cj8-jx6w'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/492'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m85c-9mf8-m2m6 | 2023-08-23T22:09:03Z | 2018-07-18T18:28:26Z | null | ['CVE-2017-16763'] | Unsafe deserialization in confire | An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'confire'}, 'ecosystem_specific': {'affected_functions': ['confire.config.Configuration.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16763'}, {'type': 'WEB', 'url': 'https://github.com/bbengfort/confire/issues/24'}, {'type': 'WEB', 'url': 'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'}, {'type': 'ADVISORY', 'url': 'https://github.com/advis... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c2w9-48qc-qpj4 | 2022-05-26T19:37:09Z | 2018-07-13T15:16:54Z | null | ['CVE-2017-2809'] | Code injection in ansible | An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2809'}, {'type': 'WEB', 'url': 'https://github.com/tomoh1r/ansible-vault/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04'}, {'type': 'ADVISORY', 'url': 'https://github.com... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:09Z', 'nvd_published_at': '2017-09-14T19:29:00Z'} |
1.4.0 | GHSA-3jqw-crqj-w8qw | 2020-06-16T20:55:25Z | 2018-07-23T19:51:35Z | null | ['CVE-2011-4137'] | Moderate severity vulnerability that affects django | The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4137'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=737366'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3jqw-crqj-w8qw'}, {'type': 'WEB', 'url': 'https://hermes.opensuse.org/messages/14700881'}, {'type'... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-333w-rxj3-f55r | 2020-08-31T18:10:51Z | 2018-07-24T20:00:30Z | null | ['CVE-2017-16021'] | Regular Expression Denial Of Service in uri-js | Affected versions of `uri-js` is susceptible to a regular expression denial of service vulnerability when user input is sent to the `.parse()` method.
## Recommendation
Update to v3.0.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'uri-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16021'}, {'type': 'WEB', 'url': 'https://github.com/garycourt/uri-js/issues/12'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-333w-rxj3-f55r'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/100'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hjf3-r7gw-9rwg | 2020-06-16T21:40:30Z | 2018-07-24T20:00:41Z | null | ['CVE-2012-2921'] | Moderate severity vulnerability that affects feedparser | Universal Feed Parser (aka feedparser or python-feedparser) before 5.1.2 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML ENTITY declaration in a non-ASCII encoded document. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'feedparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2921'}, {'type': 'WEB', 'url': 'https://code.google.com/p/feedparser/source/browse/trunk/NEWS?spec=svn706&r=706'}, {'type': 'WEB', 'url': 'https://code.google.com/p/feedparser/source/detail?r=703&path=/trunk/feedparser/feedparser.py'}, {'type': 'AD... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cqp5-m4pq-gfgp | 2023-09-12T20:44:17Z | 2018-07-26T15:18:43Z | null | ['CVE-2018-3723'] | Prototype Pollution in defaults-deep | Versions of `default-deep` before 0.2.4 are vulnerable to prototype pollution
## Recommendation
Update to version 0.2.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'defaults-deep'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3723'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/defaults-deep/commit/c873f341327ad885ff4d0f23b3d3bca31b0343e5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310514'}, {'type': 'ADVISORY', 'url': 'https://github.com/adviso... | {'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cq94-qf6q-mf2h | 2023-09-05T18:13:33Z | 2018-07-16T16:50:30Z | null | ['CVE-2017-1000246'] | Pysaml2 improperly initializes encryption vector | Python package pysaml2 version 4.5.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000246'}, {'type': 'WEB', 'url': 'https://github.com/rohe/pysaml2/issues/417'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/pull/519/commits/7323f5c20efb59424d853c822e7a26d1aa3e84aa'}, {'type': 'ADVISORY', 'url': 'https://git... | {'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p7h9-vf92-5fj5 | 2023-02-13T16:51:50Z | 2018-07-23T19:50:57Z | null | ['CVE-2011-1948'] | Cross-site scripting in Products.CMFPlone and Products.PasswordResetTool | Cross-site scripting (XSS) vulnerability in Plone 4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Products.PasswordResetTool'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFPlone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.7'}]}]}, {'pa... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1948'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2012:0151'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2011-1948'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=711494'}, {'type'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:29Z', 'nvd_published_at': '2011-06-06T19:55:00Z'} |
1.4.0 | GHSA-hxf5-mg84-pj4m | 2020-06-17T15:14:53Z | 2018-07-31T23:03:17Z | 2020-06-17T15:14:53Z | [] | Moderate severity vulnerability that affects moment | Withdrawn, accidental duplicate publish.
The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)." | [] | [{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hxf5-mg84-pj4m'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8g7p-74h8-hg48 | 2021-09-07T19:45:18Z | 2018-07-27T17:04:52Z | null | ['CVE-2018-3739'] | Denial of Service in https-proxy-agent | Versions of `https-proxy-agent` before 2.2.0 are vulnerable to denial of service. This is due to unsanitized options (proxy.auth) being passed to `Buffer()`.
## Recommendation
Update to version 2.2.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'https-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3736'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319532'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-125', 'CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jp27-cwp2-5qqr | 2023-09-13T21:43:41Z | 2018-07-23T20:54:24Z | null | ['CVE-2017-16045'] | jquery.js is malware | The `jquery.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16045'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jp27-cwp2-5qqr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/496'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-686g-3xr3-x4x6 | 2021-09-01T22:46:06Z | 2018-07-18T18:33:15Z | null | ['CVE-2018-3809'] | Information Exposure on Case Insensitive File Systems in serve | Versions of `serve` before 7.0.0 are vulnerable to information exposure, bypassing the ignore security control, but only on case insensitive file systems.
## Recommendation
Update to version 7.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3809'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330650'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-686g-3xr3-x4x6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/672'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rwr3-c2q8-gm56 | 2023-09-05T09:20:57Z | 2018-07-24T20:08:27Z | null | ['CVE-2016-9189'] | Pillow Integer overflow in Map.c | Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the `Image.core.map_buffer` in `map.c` component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9189'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/2105'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'}, {'type': 'ADVISORY', 'url': 'https:... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4vcm-qfxh-p6c3 | 2023-09-11T23:14:01Z | 2018-07-23T20:40:29Z | null | ['CVE-2017-16192'] | Directory Traversal in getcityapi.yoehoehne | Affected versions of `getcityapi.yoehoehne` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'getcityapi.yoehoehne'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16192'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/getcityapi.yoehoehne'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4vcm-qfxh-p6c3'}, {'type': 'WEB', 'url': 'https://www... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9j5m-873f-xh76 | 2023-09-11T16:35:44Z | 2018-07-23T20:46:32Z | null | ['CVE-2017-16152'] | Directory Traversal in static-html-server | Affected versions of `static-html-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:*... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'static-html-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16152'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9j5m-873f-xh76'}, {'type': 'WEB', 'url': 'https://www.n... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pq5x-rprq-8jrj | 2023-09-13T20:26:39Z | 2018-07-23T22:06:14Z | null | ['CVE-2017-16130'] | Directory Traversal in exxxxxxxxxxx | Affected versions of `exxxxxxxxxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
This vulnerability is onl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'exxxxxxxxxxx'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16130'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pq5x-rprq-8jrj'}, {'type': 'WEB', 'url': 'https://www.npmjs.c... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g8q2-24jh-5hpc | 2023-09-26T18:29:18Z | 2018-07-27T14:47:52Z | 2020-06-16T21:36:34Z | [] | High severity vulnerability that affects jquery-ui | Withdrawn, accidental duplicate publish.
Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ran... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7103'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g8q2-24jh-5hpc'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2j9c-9vmv-7m39 | 2023-09-05T21:45:13Z | 2018-07-31T18:18:39Z | null | ['CVE-2017-11173'] | Missing Regex anchor in Rack-Cors allows malicious third party site to perform CORS request | Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted `example.com` domain name and not the malicious `example.net` domain name, then `example.com.example.net` (as well as `example.com-examp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack-cors'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11173'}, {'type': 'WEB', 'url': 'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyu/rack-cors'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/14334... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m79w-4mqv-r39f | 2023-09-07T20:36:50Z | 2018-07-31T22:06:33Z | null | ['CVE-2016-10691'] | windows-seleniumjar downloads Resources over HTTP | Affected versions of `windows-seleniumjar` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runnin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'windows-seleniumjar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.48.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10691'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m79w-4mqv-r39f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/296'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rch9-xh7r-mqgw | 2023-05-30T19:26:12Z | 2018-07-26T15:08:05Z | null | ['CVE-2018-3717'] | Cross-Site Scripting in connect | connect node module before 2.14.0 suffers from a Cross-Site Scripting (XSS) vulnerability due to a lack of validation of file in directory.js middleware. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3717'}, {'type': 'WEB', 'url': 'https://github.com/JacksonTian/anywhere/issues/33#issuecomment-366527448'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:23Z', 'nvd_published_at': '2018-06-07T02:29:00Z'} |
1.4.0 | GHSA-6f34-pq9f-36vf | 2023-09-06T20:02:38Z | 2018-07-23T20:50:29Z | null | ['CVE-2017-16050'] | sqlite.js is malware | The `sqlite.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is dete... | [] | [{'package': {'ecosystem': 'npm', 'name': 'sqlite.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16050'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6f34-pq9f-36vf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/491'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ggq8-j54v-54x8 | 2023-09-13T23:04:25Z | 2018-07-23T20:47:02Z | null | ['CVE-2017-16145'] | Directory Traversal in sspa | Affected versions of `sspa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sspa'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16145'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ggq8-j54v-54x8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advis... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mj4x-wcxf-hm8x | 2023-08-25T23:55:12Z | 2018-07-31T18:13:51Z | null | ['CVE-2018-1000539'] | Json-jwt did not verify the cryptographic signature for data | The json-jwt rubygem version >= 0.5.0 && < 1.9.4 contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability in Decryption of AES-GCM encrypted JSON Web Tokens that can result in Attacker can forge a authentication tag. This attack appear to be exploitable via network connectivity. This vulnerabi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'json-jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.1'}, {'fixed': '1.9.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000539'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/commit/a3b2147f0f6d9aca653e7a30e453d3a92b33413f'}, {'type': 'PACKAGE', 'url': 'https://github.com/nov/json-jwt'}, ... | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cfxm-4p54-5w7h | 2023-09-13T23:04:16Z | 2018-07-24T00:20:57Z | null | ['CVE-2017-16107'] | Directory traversal in pooledwebsocket | Affected versions of `pooledwebsocket` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
`... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'pooledwebsocket'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16107'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfxm-4p54-5w7h'}, {'type': 'WEB', 'url': 'https://www.npmj... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-68cm-mgv7-vg5c | 2023-09-07T22:52:46Z | 2018-07-23T20:45:11Z | null | ['CVE-2017-16173'] | Directory Traversal in utahcityfinder | Affected versions of `utahcityfinder` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
``... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'utahcityfinder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16173'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/utahcityfinder'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-68cm-mgv7-vg5c'}, {'type': 'WEB', 'url': 'https://www.npmjs... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8qp3-pvwc-2g4p | 2023-09-08T20:34:44Z | 2018-07-23T20:49:58Z | null | ['CVE-2017-16054'] | nodefabric is malware | The `nodefabric` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is dete... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodefabric'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16054'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qp3-pvwc-2g4p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/488'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ghjx-3jg5-h6r2 | 2021-09-10T21:36:44Z | 2018-07-13T15:17:10Z | null | ['CVE-2017-9462'] | High severity vulnerability that affects mercurial | In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mercurial'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9462'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1576'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/861243'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ghjx-3jg5-h6r2'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fx46-whrj-73v5 | 2023-09-12T20:47:14Z | 2018-07-24T20:06:17Z | null | ['CVE-2017-0928'] | Bypassing Sanitization using DOM clobbering in html-janitor | All versions of `html-janitor` are vulnerable to cross-site scripting (XSS).
Arbitrary HTML can pass the sanitization process, which can be unexpected and dangerous (XSS) in case user-controlled input is passed to the clean function."
## Recommendation
Upgrade to version 2.0.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'html-janitor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0928'}, {'type': 'WEB', 'url': 'https://github.com/guardian/html-janitor/issues/35'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/308158'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fx46-whrj-73v5'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-547', 'CWE-642'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wm77-q74p-5763 | 2021-08-09T22:21:02Z | 2018-07-27T17:06:03Z | null | [] | Path Traversal in superstatic | Affected of `superstatic` are vulnerable to path traversal when used on Windows.
Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0).
## Recommendation
Upd... | [] | [{'package': {'ecosystem': 'npm', 'name': 'superstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/firebase/superstatic/pull/255'}, {'type': 'WEB', 'url': 'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'}, {'type': 'WEB', 'url': 'https://github.com/firebase/superstatic/blob/v5.0.1/lib/providers/fs.js#L71'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-177'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q75g-2496-mxpp | 2020-08-31T18:26:32Z | 2018-07-24T20:11:13Z | null | ['CVE-2017-16113'] | Regular Expression Denial of Service in parsejson | Affected versions of `parsejson` are vulnerable to a regular expression denial of service when parsing untrusted user input.
## Recommendation
The `parsejson` package has not been functionally updated since it was initially released.
Additionally, it provides functionality which is natively included in Node.js, and... | [] | [{'package': {'ecosystem': 'npm', 'name': 'parsejson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16113'}, {'type': 'WEB', 'url': 'https://github.com/get/parsejson/issues/4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q75g-2496-mxpp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/528'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wxvm-fh75-mpgr | 2020-06-17T15:15:19Z | 2018-07-26T16:24:34Z | 2020-06-17T15:15:19Z | [] | Critical severity vulnerability that affects dns-sync | Withdrawn, accidental duplicate publish.
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function. | [] | [{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9682'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wxvm-fh75-mpgr'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:19Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.