Dataset Viewer
Auto-converted to Parquet Duplicate
schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
nullclasses
11 values
aliases
stringlengths
2
20
summary
stringlengths
4
172
details
stringlengths
47
3.95k
severity
stringlengths
2
79
affected
stringlengths
76
3.32k
references
stringlengths
82
11.3k
database_specific
stringlengths
131
190
1.4.0
GHSA-4vr3-9v7h-5f8v
2021-12-03T14:36:23Z
2019-06-18T15:38:41Z
null
[]
Low severity vulnerability that affects Gw2Sharp
## Leaking cached authenticated requests ### Impact If you've been using one `MemoryCacheMethod` object in multiple instances of `Gw2WebApiClient` and are requesting authenticated endpoints with different access tokens, then you are likely to run into this bug. When using an instance of `MemoryCacheMethod` and using ...
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'Gw2Sharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Archomeda/Gw2Sharp/security/advisories/GHSA-4vr3-9v7h-5f8v'}, {'type': 'PACKAGE', 'url': 'https://github.com/Archomeda/Gw2Sharp'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4vr3-9v7h-5f8v'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:21Z', 'nvd_published_at': None}
1.4.0
GHSA-6fmm-47qc-p4m4
2023-09-07T21:41:55Z
2019-06-13T16:12:26Z
null
['CVE-2019-5438']
Unauthorized File Access in harp
All versions of `harp` are vulnerable to Unauthorized File Access. If a symlink in the project's base directory points to a file outside of the directory, the file is served. This could allow an attacker to access sensitive files on the server. ## Recommendation No fix is currently available. Consider using an alter...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'harp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5438'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/530289'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/816'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T16:10:29Z', 'nvd_published_at': None}
1.4.0
GHSA-pm52-wwrw-c282
2021-08-16T14:32:10Z
2019-06-13T18:59:06Z
null
[]
Command Injection in wiki-plugin-datalog
Versions of `wiki-plugin-datalog` prior to 0.1.6 are vulnerable to Command Injection. The package failed to sanitize URLs on the curl endpoint, allowing attackers to inject commands and possibly achieving Remote Code Execution on the system. ## Recommendation Upgrade to version 0.1.6 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'wiki-plugin-datalog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WIKIPLUGINDATALOG-449540'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/926'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T18:50:56Z', 'nvd_published_at': None}
1.4.0
GHSA-cj6j-32rg-45r2
2021-08-04T19:54:08Z
2019-06-06T15:29:25Z
null
['CVE-2019-10077']
Cross-site Scripting in JSPWiki
A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10077'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10077'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:05:35Z', 'nvd_published_at': '2019-05-20T21:29:00Z'}
1.4.0
GHSA-mmf6-6597-3v6m
2021-04-12T21:32:14Z
2019-06-13T20:18:28Z
null
['CVE-2019-11269']
Open Redirect in Spring Security OAuth
Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.18'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11269'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-11269'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/153299/Spring-Security-OAu...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T20:17:53Z', 'nvd_published_at': '2019-06-12T15:29:00Z'}
1.4.0
GHSA-68hw-vfh7-xvg8
2021-08-16T15:25:07Z
2019-06-13T20:38:09Z
null
['CVE-2019-10157']
Forced Logout in keycloak-connect
Versions of `keycloak-connect` prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the `/k_logout` route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely. ## Recommendation Upgrade to version 4.4.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'keycloak-connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10157'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-287', 'CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T20:28:41Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}
1.4.0
GHSA-mxjr-xmcg-fg7w
2021-08-17T15:41:58Z
2019-06-27T17:25:21Z
null
[]
Arbitrary Code Injection in mobile-icon-resizer
mobile-icon-resizer resizes large images for use as icons for iOS and Android. mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3. mobile-icon-resizer takes an options object as an argument to define the resulting icons as such: ``` var options = { config: './config.js' } resize(options...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mobile-icon-resizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.4.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/muzzley/mobile-icon-resizer/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408'}, {'type': 'WEB', 'url': 'https://w...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-27T15:58:50Z', 'nvd_published_at': None}
1.4.0
GHSA-3xc7-xg67-pw99
2021-08-04T20:54:45Z
2019-06-05T20:43:10Z
null
[]
Sensitive Data Exposure in sequelize-cli
Versions of `sequelize-cli` prior to 5.5.0 are vulnerable to Sensitive Data Exposure. The function `filteredURL()` does not properly sanitize the `config.password` value which may cause passwords with special characters to be logged in plain text. ## Recommendation Upgrade to version 5.5.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sequelize-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sequelize/cli/issues/172'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/cli/pull/722'}, {'type': 'WEB', 'url': 'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEQUELIZECLI-174320'...
{'cwe_ids': ['CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T20:42:54Z', 'nvd_published_at': None}
1.4.0
GHSA-h9x2-5rm7-x4gm
2020-08-31T18:09:18Z
2019-06-03T17:28:23Z
null
['CVE-2015-9238']
Insecure Comparison in secure-compare
Versions of `secure-compare` prior to 3.0.1 are affected by a vulnerability that results in the package always returning true when comparing two strings of the same length, despite differences in the contents of those strings. ## Recommendation Upgrade to version 3.0.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'secure-compare'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9238'}, {'type': 'WEB', 'url': 'https://github.com/vdemedes/secure-compare/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/vadimdemedes/secure-compare/commit/dd1ff1ac0122de7e0af4f00c61ed73261062394a'}, {'type': 'WEB', 'url': 'https://www.npmjs...
{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:22:37Z', 'nvd_published_at': None}
1.4.0
GHSA-68gr-cmcp-g3mj
2021-08-16T23:34:10Z
2019-06-14T16:39:31Z
null
[]
Directory Traversal in lactate
A crafted `GET` request can be leveraged to traverse the directory structure of a host using the lactate web server package, and request arbitrary files outside of the specified web root. This allows for a remote attacker to gain access to arbitrary files on the filesystem that the process has access to read. Mitigati...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'lactate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/RetireJS/retire.js/commit/800c8140884eaa5753a49308f560c925fe97b9a5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296645'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:lactate:20180123'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/560'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-14T16:39:14Z', 'nvd_published_at': None}
1.4.0
GHSA-52mh-p2m2-w625
2021-08-04T21:01:39Z
2019-06-07T20:56:59Z
null
['CVE-2019-12741']
Cross-site Scripting in HAPI FHIR
XSS exists in the HAPI FHIR testpage overlay module of the HAPI FHIR library before 3.8.0. The attack involves unsanitized HTTP parameters being output in a form page, allowing attackers to leak cookies and other sensitive information from ca/uhn/fhir/to/BaseController.java via a specially crafted URL. (This module is ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:hapi-fhir-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12741'}, {'type': 'WEB', 'url': 'https://github.com/jamesagnew/hapi-fhir/issues/1335'}, {'type': 'WEB', 'url': 'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a'}, {'type': 'WEB', 'url': 'https://github.com/ja...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T14:35:54Z', 'nvd_published_at': '2019-06-05T15:29:00Z'}
1.4.0
GHSA-74cr-77xc-8g6r
2021-08-16T15:28:22Z
2019-06-13T20:37:39Z
null
[]
Prototype Pollution in @apollo/gateway
Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@apollo/gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/pull/2779'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915'}, {'type': 'WEB', 'url': 'https://www....
{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T20:37:08Z', 'nvd_published_at': None}
1.4.0
GHSA-984p-xq9m-4rjw
2021-08-04T21:03:16Z
2019-06-07T21:01:53Z
null
[]
Rate Limiting Bypass in express-brute
All versions of `express-brute` are vulnerable to Rate Limiting Bypass. Concurrent requests may lead to race conditions that cause the package to incorrectly count requests. This may allow an attacker to bypass the rate limiting provided by the package and execute requests without limiting. ## Recommendation No fix ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'express-brute'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/AdamPflug/express-brute/issues/46'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EXPRESSBRUTE-174457'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/823'}]
{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T21:01:37Z', 'nvd_published_at': None}
1.4.0
GHSA-gc94-6w89-hpqr
2021-09-16T20:59:56Z
2019-06-12T16:37:07Z
null
[]
Command Injection in fs-path
All versions of `fs-path` are vulnerable to command injection is unsanitized user input is passed in. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'fs-path'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.25'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pillys/fs-path/pull/5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/324491'}, {'type': 'PACKAGE', 'url': 'https://github.com/pillys/fs-path'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/661'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:34:26Z', 'nvd_published_at': None}
1.4.0
GHSA-3fc5-9x9m-vqc4
2021-08-04T21:25:59Z
2019-06-03T17:31:32Z
null
[]
Privilege Escalation in express-cart
Versions of `express-cart` before 1.1.6 are vulnerable to privilege escalation. This vulnerability can be exploited so that normal users can escalate their privilege and add new administrator users. ## Recommendation Update to version 1.1.6 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/343626'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/469.json'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:30:55Z', 'nvd_published_at': None}
1.4.0
GHSA-28xh-wpgr-7fm8
2020-08-31T18:31:51Z
2019-06-20T15:35:49Z
null
[]
Command Injection in open
Versions of `open` before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in. The package does come with the following warning in the readme: ``` The same care should be taken when calling open as if you were calling child_process.exec directly. If it is an executable it will run in a ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'open'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pwnall/node-open/issues/68'}, {'type': 'WEB', 'url': 'https://github.com/pwnall/node-open/issues/69'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319473'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/663'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T15:35:06Z', 'nvd_published_at': None}
1.4.0
GHSA-f698-m2v9-5fh3
2020-08-31T18:35:50Z
2019-06-04T20:11:44Z
null
[]
Command Injection in opencv
Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands. ## Recommendation Upgrade to version 6.1.0.
[]
[{'package': {'ecosystem': 'npm', 'name': 'opencv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/789'}]
{'cwe_ids': ['CWE-77'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T20:11:26Z', 'nvd_published_at': None}
1.4.0
GHSA-f7qw-5pvg-mmwp
2021-08-16T14:36:47Z
2019-06-13T18:58:44Z
null
[]
Prototype Pollution in lutils-merge
All versions of `lutils-merge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leadi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'lutils-merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nfour/lutils-merge/issues/1'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/439107'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LUTILSMERGE-174783'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/893'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T18:58:27Z', 'nvd_published_at': None}
1.4.0
GHSA-q42p-pg8m-cqh6
2021-08-04T20:54:05Z
2019-06-05T14:07:48Z
null
[]
Prototype Pollution in handlebars
Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. ## Recommendation For handlebars 4.1.x upgrade to 4.1.2 or later. For handlebars 4.0.x upgrade to 4.0.14 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.helpers.lookup']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_func...
[{'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/issues/1495'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/0d6d8c335ad81bad1b672fc56b6a44f6aa472dac'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b...
{'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:55:39Z', 'nvd_published_at': None}
1.4.0
GHSA-8w57-jfpm-945m
2023-04-11T00:26:58Z
2019-06-11T16:16:07Z
null
[]
Denial of Service in http-proxy-agent
Versions of `http-proxy-agent` before 2.1.0 are vulnerable to denial of service and uninitialized memory leak when unsanitized options are passed to `Buffer`. An attacker may leverage these unsanitized options to consume system resources. ## Recommendation Update to version 2.1.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'http-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/321631'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-http-proxy-agent/blob/2.0.0/index.js#L80'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/607'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-11T16:11:38Z', 'nvd_published_at': None}
1.4.0
GHSA-28hp-fgcr-2r4h
2021-02-24T18:32:36Z
2019-06-27T17:25:42Z
null
[]
Cross-Site Scripting via JSONP
JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors.
[]
[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1630'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-27T15:51:47Z', 'nvd_published_at': None}
1.4.0
GHSA-74cp-qw7f-7hpw
2020-08-31T18:36:24Z
2019-06-05T14:10:23Z
null
[]
Path Traversal in statics-server
All versions of `statics-server` are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'statics-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.9'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/355456'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/805'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:49:00Z', 'nvd_published_at': None}
1.4.0
GHSA-wfp9-vr4j-f49j
2023-04-21T19:34:39Z
2019-06-04T20:04:27Z
null
[]
NoSQL Injection in sequelize
Versions of `sequelize` prior to 4.12.0 are vulnerable to NoSQL Injection. Query operators such as `$gt` are not properly sanitized and may allow an attacker to alter data queries, leading to NoSQL Injection. ## Recommendation Upgrade to version 4.12.0 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.12.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/7310'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/8240'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/ccb99daedb69e8750a241436415ccac8abef358d'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequ...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T20:04:00Z', 'nvd_published_at': None}
1.4.0
GHSA-jwgx-9mmh-684w
2022-02-11T21:13:16Z
2019-06-13T20:02:56Z
null
['CVE-2019-3888']
Credential exposure through log files in Undertow
A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3888'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2439'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-532'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T20:02:23Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}
1.4.0
GHSA-76wm-422q-92mq
2021-08-17T13:42:04Z
2019-06-20T16:06:11Z
null
['CVE-2019-8324']
Code injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8324'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1972'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T16:01:22Z', 'nvd_published_at': None}
1.4.0
GHSA-8948-ffc6-jg52
2021-08-04T20:58:53Z
2019-06-06T15:32:21Z
null
[]
Insecure Default Configuration in redbird
Versions of `redbird` prior to 0.9.1 have a vulnerable default configuration of allowing TLS 1.0 connections on `lib/proxy.js`. The package does not provide an option to disable TLS 1.0 which is deprecated and vulnerable. ## Recommendation Upgrade to version 0.9.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'redbird'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OptimalBits/redbird/pull/207'}, {'type': 'WEB', 'url': 'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REDBIRD-174455'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/82...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T13:06:37Z', 'nvd_published_at': None}
1.4.0
GHSA-wxhq-pm8v-cw75
2020-08-31T18:35:40Z
2019-06-05T20:50:16Z
null
[]
Regular Expression Denial of Service in clean-css
Version of `clean-css` prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. ## Recommendation Upgrade to version 4.1.11 or...
[]
[{'package': {'ecosystem': 'npm', 'name': 'clean-css'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/785'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T20:49:47Z', 'nvd_published_at': None}
1.4.0
GHSA-57cf-349j-352g
2020-08-31T18:31:27Z
2019-06-12T16:37:00Z
null
[]
Out-of-bounds Read in npmconf
Versions of `npmconf` before 2.1.3 allocate and write to disk uninitialized memory contents when a typed number is passed as input on Node.js 4.x. ## Recommendation Update to version 2.1.3 or later. Consider switching to another config storage mechanism, as npmconf is deprecated and should not be used.
[]
[{'package': {'ecosystem': 'npm', 'name': 'npmconf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/320269'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/653'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:35:03Z', 'nvd_published_at': None}
1.4.0
GHSA-4vmm-mhcq-4x9j
2021-08-16T16:06:38Z
2019-06-14T16:15:14Z
null
[]
Sandbox Bypass Leading to Arbitrary Code Execution in constantinople
Versions of `constantinople` prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution. ## Recommendation Update to version 3.1.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'constantinople'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:constantinople:20180421'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/adv...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-14T16:14:40Z', 'nvd_published_at': None}
1.4.0
GHSA-5v72-xg48-5rpm
2021-08-04T21:29:05Z
2019-06-04T19:37:52Z
null
[]
Denial of Service in ws
Affected versions of `ws` can crash when a specially crafted `Sec-WebSocket-Extensions` header containing `Object.prototype` property names as extension or parameter names is sent. ## Proof of concept ``` const WebSocket = require('ws'); const net = require('net'); const wss = new WebSocket.Server({ port: 3000 }, fu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.6'}, {'fixed': '1.1.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a'}, {'type': 'WEB', 'url': 'https://github.com/websockets/ws/commit/f8fdcd40ac8be7318a6ee41f5ceb7e77c995b407'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:ws:20171108'}, {'type': 'WEB', 'url': 'https://www.npm...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T19:37:42Z', 'nvd_published_at': None}
1.4.0
GHSA-cxx2-fp39-rf3r
2021-08-04T19:53:10Z
2019-06-06T15:29:22Z
null
['CVE-2019-10076']
Cross-Site Scripting in JSPWiki
A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10076'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:05:23Z', 'nvd_published_at': None}
1.4.0
GHSA-g45g-g52h-39rg
2023-01-23T20:02:18Z
2019-06-07T20:56:42Z
null
['CVE-2019-12732']
Cross-site Scripting in Chartkick
The Chartkick gem through 3.1.0 for Ruby allows XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'chartkick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12732'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick/issues/488'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/chartkick'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T10:49:06Z', 'nvd_published_at': '2019-06-06T15:29:00Z'}
1.4.0
GHSA-hpfq-8wx8-cgqw
2020-08-31T18:41:56Z
2019-06-13T18:59:18Z
null
[]
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `modal` component fails to sanitize input to the `title` attribute, which may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'ids-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise-ng/issues/511'}, {'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/957'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T18:49:52Z', 'nvd_published_at': None}
1.4.0
GHSA-q4hg-rmq2-52q9
2021-04-12T18:23:31Z
2019-06-26T01:09:40Z
null
['CVE-2019-10072']
Improper Locking in Apache Tomcat
The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leadi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10072'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3929'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3931'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134...
{'cwe_ids': ['CWE-667'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-26T00:56:45Z', 'nvd_published_at': '2019-06-21T18:15:00Z'}
1.4.0
GHSA-m734-r4g6-34f9
2021-08-04T20:47:58Z
2019-06-04T19:36:17Z
null
[]
NoSQL Injection in loopback-connector-mongodb
Versions of `loopback-connector-mongodb` before 3.6.0 are vulnerable to NoSQL injection. MongoDB Connector for LoopBack fails to properly sanitize a filter passed to query the database by allowing the dangerous `$where` property to be passed to the MongoDB Driver. The Driver allows the special `$where` property in a f...
[]
[{'package': {'ecosystem': 'npm', 'name': 'loopback-connector-mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/strongloop/loopback-connector-mongodb/issues/403'}, {'type': 'WEB', 'url': 'https://github.com/strongloop/loopback-connector-mongodb/pull/452'}, {'type': 'WEB', 'url': 'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b'},...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T19:35:47Z', 'nvd_published_at': None}
1.4.0
GHSA-2479-qvv7-47qq
2022-09-13T22:16:02Z
2019-06-13T16:22:13Z
null
['CVE-2019-1020012']
Parse Server before v3.4.1 vulnerable to Denial of Service
### Impact If a POST request is made to /parse/classes/_Audience (or other volatile class), any subsuquent POST requests result in an internal server error (500). ### Patches Afflicted installations will also have to remove the offending collection from their database. Yes, patched in 3.4.1 ### Workarounds Yes, u...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2479-qvv7-47qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020012'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2479-qvv7-47qq'}, {'type': 'PACKAGE', 'url': 'https://gith...
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:19Z', 'nvd_published_at': None}
1.4.0
GHSA-r6v3-hpxj-r8rv
2021-07-27T20:55:27Z
2019-06-07T20:56:27Z
null
['CVE-2019-12761']
Code Injection in PyXDG
A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyxdg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.26'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12761'}, {'type': 'WEB', 'url': 'https://gist.github.com/dhondta/b45cd41f4186110a354dc7272916feba'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/06/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debi...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T10:24:55Z', 'nvd_published_at': '2019-06-06T19:29:00Z'}
1.4.0
GHSA-3p92-886g-qxpq
2021-08-04T21:27:04Z
2019-06-04T15:42:32Z
null
[]
Remote Memory Exposure in floody
Versions of `floody` before 0.1.1 are vulnerable to remote memory exposure. .write(number)` in the affected `floody` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory. Proof of Concept: ``` var f = require('floody')(process.stdout); f.write(USERSUPPLIEDINPUT); 'f.stop(); ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'floody'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:floody:20160115'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/601'}]
{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:40:44Z', 'nvd_published_at': None}
1.4.0
GHSA-hxcm-v35h-mg2x
2021-02-25T17:25:43Z
2019-06-07T21:12:50Z
null
[]
Prototype Pollution
A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.
[]
[{'package': {'ecosystem': 'npm', 'name': 'querystringify'}, 'ecosystem_specific': {'affected_functions': ['querystringify.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/unshiftio/querystringify/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T21:11:35Z', 'nvd_published_at': None}
1.4.0
GHSA-49r3-3h96-rwj6
2020-08-31T18:41:54Z
2019-06-13T19:09:31Z
null
[]
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `soho-dropdown` component does not properly encode its output and may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'ids-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise-ng/issues/503'}, {'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/956'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T19:09:01Z', 'nvd_published_at': None}
1.4.0
GHSA-fr32-gr5c-xq5c
2023-08-28T13:19:04Z
2019-06-20T16:06:04Z
null
['CVE-2019-8321']
RubyGems Escape sequence injection vulnerability in verbose
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8321'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2019-8321.yml'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T16:00:39Z', 'nvd_published_at': None}
1.4.0
GHSA-vc6r-4x6g-mmqc
2020-08-31T18:33:45Z
2019-06-11T16:16:23Z
null
[]
Path Traversal in m-server
Versions of `m-server` before 1.4.2 are vulnerable to path traversal allowing a remote attacker to display content of arbitrary files from the server. ## Recommendation Update to version 1.4.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'm-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319795'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/468.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advi...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-11T16:09:28Z', 'nvd_published_at': None}
1.4.0
GHSA-g74r-ffvr-5q9f
2020-08-31T18:29:17Z
2019-06-03T17:26:44Z
null
[]
Memory Exposure in concat-stream
Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()` Versions <1.3.0 are not affected due to not using unguarded Buffer constructor. ## Recommendation Update to version 1.5.2, 1.4.11, 1.3.2 or later. If you are unable to update make sure user ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'concat-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'concat-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.11'}]}]}, {'package': {'...
[{'type': 'WEB', 'url': 'https://github.com/maxogden/concat-stream/pull/47'}, {'type': 'WEB', 'url': 'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e'}, {'type': 'WEB', 'url': 'https://gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:26:24Z', 'nvd_published_at': None}
1.4.0
GHSA-crfx-5phg-hmw9
2020-08-31T18:41:52Z
2019-06-13T18:59:12Z
null
[]
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). Script tags in the `soho-autocomplete` component are not properly encoded and may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'ids-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise-ng/issues/502'}, {'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/955'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T18:47:35Z', 'nvd_published_at': None}
1.4.0
GHSA-qx4v-6gc5-f2vv
2021-02-25T17:20:28Z
2019-06-20T14:32:56Z
null
[]
Regular Expression Denial of Service
A Regular Expression Denial of Service vulnerability was discovered in esm before 3.1.0. The issue is that esm's find-indexes is using the unescaped identifiers in a regex, which, in this case, causes an infinite loop.
[]
[{'package': {'ecosystem': 'npm', 'name': 'esm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/standard-things/esm/issues/694'}, {'type': 'WEB', 'url': 'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T14:17:20Z', 'nvd_published_at': None}
1.4.0
GHSA-v2p6-4mp7-3r9v
2020-08-31T18:34:16Z
2019-06-14T16:26:22Z
null
[]
Regular Expression Denial of Service in underscore.string
Versions of `underscore.string` prior to *3.3.5* are vulnerable to Regular Expression Denial of Service (ReDoS). The function `unescapeHTML` is vulnerable to ReDoS due to an overly-broad regex. The slowdown is approximately 2s for 50,000 characters but grows exponentially with larger inputs. ## Recommendation Upgra...
[]
[{'package': {'ecosystem': 'npm', 'name': 'underscore.string'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/epeli/underscore.string/issues/510'}, {'type': 'WEB', 'url': 'https://github.com/epeli/underscore.string/pull/517'}, {'type': 'WEB', 'url': 'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029'}, {'type': 'WEB', 'url': 'https://www.npmjs...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-14T16:24:01Z', 'nvd_published_at': None}
1.4.0
GHSA-886v-mm6p-4m66
2021-09-07T15:24:35Z
2019-06-05T09:48:02Z
null
[]
High severity vulnerability that affects gun
## Urgent Upgrade The static file server module included with GUN had a **serious vulnerability**: - Using `curl --path-as-is` allowed reads on any parent directory or files. This did not work via the browser or via curl without as-is option. ### Fixed This has been fixed since version `0.2019.416` and higher. ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'gun'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2019.416'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/amark/gun/security/advisories/GHSA-886v-mm6p-4m66'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-886v-mm6p-4m66'}, {'type': 'PACKAGE', 'url': 'https://github.com/amark/gun'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:52Z', 'nvd_published_at': None}
1.4.0
GHSA-4wm8-fjv7-j774
2023-08-28T13:17:43Z
2019-06-20T16:08:21Z
null
['CVE-2019-8325']
RubyGems Escape sequence injection in errors
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8325'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2019-8325.yml'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T16:04:35Z', 'nvd_published_at': None}
1.4.0
GHSA-4859-gpc7-4j66
2021-08-04T20:55:57Z
2019-06-05T21:24:29Z
null
[]
Command Injection in dot
All versions of dot are vulnerable to Command Injection. The template compilation may execute arbitrary commands if an attacker can inject code in the template or if a Prototype Pollution-like vulnerability can be exploited to alter an Object's prototype.
[]
[{'package': {'ecosystem': 'npm', 'name': 'dot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/390929'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/798'}]
{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T21:24:18Z', 'nvd_published_at': None}
1.4.0
GHSA-6394-6h9h-cfjg
2021-02-25T17:23:12Z
2019-06-07T21:12:35Z
null
[]
Regular Expression Denial of Service
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
[]
[{'package': {'ecosystem': 'npm', 'name': 'nwmatcher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T21:11:09Z', 'nvd_published_at': None}
1.4.0
GHSA-vpq5-4rc8-c222
2020-08-31T18:36:22Z
2019-06-05T14:10:45Z
null
[]
Denial of Service in canvas
Versions of `canvas` prior to 1.6.10 are vulnerable to Denial of Service. Processing malicious JPEGs or GIFs could crash the node process. ## Recommendation Upgrade to version 1.6.10
[]
[{'package': {'ecosystem': 'npm', 'name': 'canvas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/315037'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/804'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T12:48:28Z', 'nvd_published_at': None}
1.4.0
GHSA-x9p2-fxq6-2m5f
2021-08-16T23:44:47Z
2019-06-20T14:33:07Z
null
[]
Reverse Tabnapping in swagger-ui
Versions of `swagger-ui` prior to 3.18.0 are vulnerable to [Reverse Tabnapping](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page. This is commonly used for phishing attacks. ## Recommendation Upg...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.18.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/pull/4789'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/releases/tag/v3.18.0'}, {'type': 'WEB', 'url': 'https://s...
{'cwe_ids': ['CWE-1022'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T14:13:56Z', 'nvd_published_at': None}
1.4.0
GHSA-m8fw-534v-xm85
2020-08-31T18:31:00Z
2019-06-04T15:43:29Z
null
[]
Cross-Site Scripting (XSS) in cloudcmd
Versions of `cloudcmd` before 9.1.6 are vulnerable to cross-site scripting (XSS) when listing files in a directory. The attacker must control the name of a file for this vulnerability to be exploitable. ## Recommendation Update to version 9.1.6 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'cloudcmd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/341044'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/341044)'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/642'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:43:12Z', 'nvd_published_at': None}
1.4.0
GHSA-mf6x-7mm4-x2g7
2021-03-19T20:59:51Z
2019-06-20T18:22:32Z
null
['CVE-2018-21270']
Out-of-bounds Read in stringstream
All versions of `stringstream` are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is...
[]
[{'package': {'ecosystem': 'npm', 'name': 'stringstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/321670'}, {'type': 'WEB', 'url': 'https://github.com/mhart/StringStream/blob/v0.0.5/stringstream.js#L32'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/664'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T18:22:00Z', 'nvd_published_at': '2020-12-03T21:15:00Z'}
1.4.0
GHSA-xf5p-87ch-gxw2
2022-08-02T17:43:57Z
2019-06-05T14:10:03Z
null
[]
Marked ReDoS due to email addresses being evaluated in quadratic time
Versions of `marked` from 0.3.14 until 0.6.2 are vulnerable to Regular Expression Denial of Service. Email addresses may be evaluated in quadratic time, allowing attackers to potentially crash the node process due to resource exhaustion. ## Recommendation Upgrade to version 0.6.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.14'}, {'fixed': '0.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/markedjs/marked/pull/1460'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/b15e42b67cec9ded8505e9d68bb8741ad7a9590d'}, {'type': 'PACKAGE', 'url': 'https://github.com/markedjs/marked'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/releases/tag...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:50:35Z', 'nvd_published_at': None}
1.4.0
GHSA-6cc5-2vg4-cc7m
2023-08-31T09:10:55Z
2019-06-10T18:05:06Z
null
['CVE-2019-12387']
Twisted CRLF Injection
In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12387'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/6c61fc4503ae39ab8ecee52d10f10ee2c371d7e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://labs.twistedmatrix.com/2019/06/...
{'cwe_ids': ['CWE-74', 'CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-10T18:04:12Z', 'nvd_published_at': '2019-06-10T12:29:00Z'}
1.4.0
GHSA-73cw-jxmm-qpgh
2020-08-31T18:31:31Z
2019-06-11T16:40:48Z
null
[]
Path Traversal in localhost-now
All versions of `localhost-now` are vulnerable to path traversal. This vulnerability is a bypass to the path traversal fix introduced in version 1.0.2 Proof of concept: ``` $ curl -v --path-as-is "http://IP:5432/..././..././..././..././..././..././..././..././..././..././etc/passwd" ``` ## Recommendation No fix i...
[]
[{'package': {'ecosystem': 'npm', 'name': 'localhost-now'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/329837'}, {'type': 'WEB', 'url': 'https://github.com/DCKT/localhost-now/blob/master/lib/app.js#L17'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/655'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-11T16:40:34Z', 'nvd_published_at': None}
1.4.0
GHSA-8j8c-7jfh-h6hx
2020-08-31T18:36:43Z
2019-06-04T20:14:07Z
null
[]
Code Injection in js-yaml
Versions of `js-yaml` prior to 3.13.1 are vulnerable to Code Injection. The `load()` function may execute arbitrary code injected through a malicious YAML file. Objects that have `toString` as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the `l...
[]
[{'package': {'ecosystem': 'npm', 'name': 'js-yaml'}, 'ecosystem_specific': {'affected_functions': ['js-yaml.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.13.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nodeca/js-yaml/pull/480'}, {'type': 'WEB', 'url': 'https://github.com/nodeca/js-yaml/pull/480/commits/e18afbf1edcafb7add2c4c7b22abc8d6ebc2fa61'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/813'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T20:13:53Z', 'nvd_published_at': None}
1.4.0
GHSA-wrw9-m778-g6mc
2020-08-31T18:29:15Z
2019-06-03T17:27:57Z
null
[]
Memory Exposure in bl
Versions of `bl` before 0.9.5 and 1.0.1 are vulnerable to memory exposure. `bl.append(number)` in the affected `bl` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory ## Recommendation Update to version 0.9.5, 1.0.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/rvagg/bl/pull/22'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/596'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:23:00Z', 'nvd_published_at': None}
1.4.0
GHSA-5x32-c9mf-49cc
2023-08-28T13:16:23Z
2019-06-20T16:06:15Z
null
['CVE-2019-8320']
RubyGems Delete directory using symlink when decompressing tar
A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.6'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8320'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/317321'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1429'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'ty...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T16:02:48Z', 'nvd_published_at': None}
1.4.0
GHSA-fqfj-cmh6-hj49
2023-07-05T19:06:46Z
2019-06-13T16:15:56Z
null
['CVE-2019-11027']
ruby-openid SSRF via claimed_id request
Ruby OpenID (aka ruby-openid) through 2.8.0 is vulnerable to SSRF. Ruby-openid performs discovery first, and then verification. This allows an attacker to change the URL used for discovery and trick the server into connecting to the URL, which might be a private server not publicly accessible. Severity can range from m...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11027'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/issues/122'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/commit/d181a8a2099c64365a1d24b29f6b6b646673a131'}, {'type': 'PACKAGE', 'url': 'https://github.com/ope...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T15:45:16Z', 'nvd_published_at': None}
1.4.0
GHSA-q22g-8fr4-qpj4
2021-08-04T21:36:58Z
2019-06-06T15:32:15Z
null
['CVE-2019-12041']
Regular Expression Denial of Service in remarkable
lib/common/html_re.js in remarkable 1.7.1 allows Regular Expression Denial of Service (ReDoS) via a CDATA section.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12041'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/331'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/pull/335#issuecomment-515958379'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinke...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T15:21:06Z', 'nvd_published_at': '2019-05-13T13:29:00Z'}
1.4.0
GHSA-4qhx-g9wp-g9m6
2021-09-16T21:00:23Z
2019-06-14T16:09:01Z
null
[]
Failure to sanitize quotes which can lead to sql injection in squel
All versions of `squel` are vulnerable to sql injection. The `squel` package does not properly escape user provided input when provided using the `setFields` method. This could lead to sql injection if the query was then executed. Proof of concept demonstrating the injection of a single quote into a generated sql sta...
[]
[{'package': {'ecosystem': 'npm', 'name': 'squel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hiddentao/squel/issues/350'}, {'type': 'PACKAGE', 'url': 'https://github.com/hiddentao/squel'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/575'}]
{'cwe_ids': ['CWE-74', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-14T16:08:38Z', 'nvd_published_at': None}
1.4.0
GHSA-gm9g-2g8v-fvxj
2021-09-16T20:59:20Z
2019-06-06T15:32:28Z
null
[]
Prototype Pollution in upmerge
All versions of `upmerge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'upmerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/439120'}, {'type': 'PACKAGE', 'url': 'https://github.com/jazzfog/UpMerge'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-UPMERGE-174133'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/809'}]
{'cwe_ids': ['CWE-345', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T10:04:57Z', 'nvd_published_at': None}
1.4.0
GHSA-mh37-8c3g-3fgc
2023-08-28T13:22:21Z
2019-06-20T16:06:00Z
null
['CVE-2019-8322']
RubyGems Escape sequence injection vulnerability in gem owner
An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8322'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/315087'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T16:00:00Z', 'nvd_published_at': None}
1.4.0
GHSA-xc7v-wxcw-j472
2020-08-31T18:29:19Z
2019-06-03T17:08:26Z
null
[]
Memory Exposure in tunnel-agent
Versions of `tunnel-agent` before 0.6.0 are vulnerable to memory exposure. This is exploitable if user supplied input is provided to the auth value and is a number. Proof-of-concept: ```js require('request')({ method: 'GET', uri: 'http://www.example.com', tunnel: true, proxy:{ protocol: 'http:', host:...
[]
[{'package': {'ecosystem': 'npm', 'name': 'tunnel-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0'}, {'type': 'WEB', 'url': 'https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/598'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:08:06Z', 'nvd_published_at': None}
1.4.0
GHSA-8v5f-hp78-jgxq
2020-08-31T18:37:26Z
2019-06-06T15:30:33Z
null
[]
Signature Verification Bypass in jwt-simple
Versions of `jwt-simple` prior to 0.5.3 are vulnerable to Signature Verification Bypass. If no algorithm is specified in the `decode()` function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and t...
[]
[{'package': {'ecosystem': 'npm', 'name': 'jwt-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/831'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T09:42:36Z', 'nvd_published_at': None}
1.4.0
GHSA-xggx-fx6w-v7ch
2021-08-04T20:41:46Z
2019-06-04T15:42:15Z
null
['CVE-2019-3802']
Improper Neutralization of Wildcards or Matching Symbols
This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is suppli...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3802'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3802'}]
{'cwe_ids': ['CWE-155', 'CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:38:52Z', 'nvd_published_at': '2019-06-03T14:29:00Z'}
1.4.0
GHSA-38cg-gg9j-q9j9
2021-08-17T15:33:33Z
2019-06-27T17:25:57Z
null
['CVE-2019-3875']
Improper Certificate Validation and Insufficient Verification of Data Authenticity in Keycloak
A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3875'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3875'}]
{'cwe_ids': ['CWE-295', 'CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-27T15:43:10Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}
1.4.0
GHSA-cff4-rrq6-h78w
2020-08-31T18:31:41Z
2019-06-03T17:31:26Z
null
[]
Command Injection in command-exists
Versions of `command-exists` before 1.2.4 are vulnerable to command injection. This is exploitable if user input is provided to this module. ## Recommendation Update to version 1.2.4 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'command-exists'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mathisonian/command-exists/commit/7ca91ba71604df6817a28c93d7776af9c49c431a'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/324453'}, {'type': 'WEB', 'url': 'https://github.com/mathisonian/command-exists/blob/v1.2.2/lib/command-exists.js#L49-L94'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:28:56Z', 'nvd_published_at': None}
1.4.0
GHSA-pgcr-7wm4-mcv6
2021-08-04T21:28:00Z
2019-06-04T15:42:45Z
null
[]
Sensitive Data Exposure in pem
Versions of `pem` before 1.13.2 expose sensitive data when the `readPkcs12` is used. The `readPkcs12` function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary d...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'pem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Dexus/pem/pull/217'}, {'type': 'WEB', 'url': 'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PEM-173687'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/723'}]
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:41:30Z', 'nvd_published_at': None}
1.4.0
GHSA-hwcx-9p4j-7hwj
2021-08-16T15:20:04Z
2019-06-13T20:22:30Z
null
['CVE-2019-5442']
XML Entity Expansion in Pippo
XML Entity Expansion (Billion Laughs Attack) on Pippo 1.12.0 results in Denial of Service.Entities are created recursively and large amounts of heap memory is taken. Eventually, the JVM process will run out of memory. Otherwise, if the OS does not bound the memory on that process, memory will continue to be exhausted a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ro.pippo:pippo-jaxb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5442'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/506791'}]
{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T20:22:17Z', 'nvd_published_at': '2019-06-12T16:29:00Z'}
1.4.0
GHSA-w7q7-vjp8-7jv4
2020-08-31T18:36:13Z
2019-06-06T15:30:16Z
null
[]
SQL Injection in typeorm
Versions of `typeorm` before 0.1.15 are vulnerable to SQL Injection. Field names are not properly validated allowing attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation Upgrade to version 0.1.15
[]
[{'package': {'ecosystem': 'npm', 'name': 'typeorm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.15'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319458'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/800'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T21:25:43Z', 'nvd_published_at': None}
1.4.0
GHSA-j9f8-8h89-j69x
2021-08-04T21:06:49Z
2019-06-11T16:16:34Z
null
[]
Remote Code Execution in node-os-utils
Versions of `node-os-utils` prior to 1.1.0 are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution. ## Recommendation Upgrade to version 1.1.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-os-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/SunilWang/node-os-utils/issues/2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEOSUTILS-173696'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/784'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-11T16:08:05Z', 'nvd_published_at': None}
1.4.0
GHSA-3h4r-pjv6-cph9
2023-08-28T13:23:44Z
2019-06-20T16:05:57Z
null
['CVE-2019-8323']
RubyGems Escape sequence injection vulnerability in api response handling
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8323'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/315081'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T15:59:33Z', 'nvd_published_at': None}
1.4.0
GHSA-p426-qw2p-v95v
2021-08-17T14:51:31Z
2019-06-26T01:09:35Z
null
['CVE-2017-15694']
Argument Injection in Apache Geode server
When an Apache Geode server versions 1.0.0 to 1.8.0 is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15694'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/311505e7b7a045aaa246f0a1935703acacf41b954621b1363c40bf6f@%3Cuser.geode.apache.org%3E'}]
{'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-26T00:48:24Z', 'nvd_published_at': '2019-06-21T16:15:00Z'}
1.4.0
GHSA-c35v-qwqg-87jc
2022-08-03T16:27:53Z
2019-06-06T15:32:32Z
null
[]
express-basic-auth Timing Attack due to native string comparison instead of constant time string comparison
Versions of `express-basic-auth` prior to 1.1.7 are vulnerable to Timing Attacks. The package uses native string comparison instead of a constant time string comparison, which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'express-basic-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263'}, {'type': 'WEB', 'url': 'https://github.com/LionC/express-basic-auth/pull/20'}, {'type': 'WEB', 'url': 'https://github.com/LionC/express-basic-auth/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/LionC/express-basic-a...
{'cwe_ids': ['CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T09:51:04Z', 'nvd_published_at': None}
1.4.0
GHSA-2pr6-76vf-7546
2021-08-04T21:32:56Z
2019-06-05T14:35:29Z
null
[]
Denial of Service in js-yaml
Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service. ## Recommendation Upgrade to version 3.13.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'js-yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nodeca/js-yaml/issues/475'}, {'type': 'WEB', 'url': 'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSYAML-173999'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/788'}, {'ty...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:52:07Z', 'nvd_published_at': None}
1.4.0
GHSA-v33x-prhc-gph5
2021-06-09T20:12:57Z
2019-06-27T17:24:58Z
null
['CVE-2019-11272']
Insufficiently Protected Credentials and Improper Authentication in Spring Security
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11272'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-11272'}]
{'cwe_ids': ['CWE-287', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-27T17:23:36Z', 'nvd_published_at': '2019-06-26T14:15:00Z'}
1.4.0
GHSA-22mf-97vh-x8rw
2021-12-03T14:35:56Z
2019-06-13T16:12:57Z
null
['CVE-2019-12760']
TODO
** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'parso'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12760'}, {'type': 'WEB', 'url': 'https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T15:48:35Z', 'nvd_published_at': '2019-06-06T19:29:00Z'}
1.4.0
GHSA-46hv-7769-j7rx
2023-09-07T21:43:42Z
2019-06-13T16:12:22Z
null
['CVE-2019-5437']
Unauthorized File Access in harp
Affected versions of `harp` are vulnerable to Unauthorized File Access. The package states that it ignores files and directories with names that start with an underscore, such as `_secret-folder`. If the underscore character is URL encoded the server delivers the file. ## Recommendation Upgrade to version `0.40.2` or...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'harp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5437'}, {'type': 'WEB', 'url': 'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/453820'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/807'}]
{'cwe_ids': ['CWE-548'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T16:10:40Z', 'nvd_published_at': None}
1.4.0
GHSA-h6ch-v84p-w6p9
2021-02-24T19:27:02Z
2019-06-13T18:58:54Z
null
[]
Regular Expression Denial of Service (ReDoS)
A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
[]
[{'package': {'ecosystem': 'npm', 'name': 'diff'}, 'ecosystem_specific': {'affected_functions': ['diff.parsePatch']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1552148'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:diff:20180305'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1631'},...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T18:54:38Z', 'nvd_published_at': None}
1.4.0
GHSA-g95f-p29q-9xw4
2021-08-04T21:35:07Z
2019-06-06T15:30:30Z
null
[]
Regular Expression Denial of Service in braces
Versions of `braces` prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. ## Recommendation Upgrade to version 2.3.1 or hig...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'braces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:braces:20180219'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/786'}]
{'cwe_ids': ['CWE-185', 'CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T09:40:51Z', 'nvd_published_at': None}
1.4.0
GHSA-86p3-4gfq-38f2
2021-08-04T21:31:03Z
2019-06-05T14:10:34Z
null
[]
Denial of Service in url-relative
All versions of `url-relative` are vulnerable to Denial of Service. If the values `to` and `from` are equal, the function hangs and never returns. This may cause a Denial of Service. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'url-relative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/junosuarez/url-relative/issues/3'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-URLRELATIVE-173691'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/783'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:46:47Z', 'nvd_published_at': None}
1.4.0
GHSA-8f93-rv4p-x4jw
2020-08-31T18:31:48Z
2019-06-12T16:36:52Z
null
[]
SQL Injection in sql
All versions of `sql` are vulnerable to sql injection as it does not properly escape parameters when building SQL queries. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'sql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.78.0'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/319465'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/662'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:36:34Z', 'nvd_published_at': None}
1.4.0
GHSA-hp5r-mhgp-56c9
2021-08-04T20:00:07Z
2019-06-06T15:29:29Z
null
['CVE-2019-10078']
Cross-site Scriptin in JSPWiki
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10078'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10078'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:05:49Z', 'nvd_published_at': '2019-05-20T21:29:00Z'}
1.4.0
GHSA-rv49-54qp-fw42
2020-08-31T18:36:18Z
2019-06-06T15:30:20Z
null
[]
Path Traversal in servey
Versions of `servey` prior to 3.x are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. ## Recommendation Upgrade to the latest version
[]
[{'package': {'ecosystem': 'npm', 'name': 'servey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/355501'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/802'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T08:47:21Z', 'nvd_published_at': None}
1.4.0
GHSA-f7r3-p866-q9qr
2022-08-03T16:34:42Z
2019-06-03T17:27:49Z
null
[]
ircdkit vulnerable to Denial of Service due to unhandled connection end event
Versions of `ircdkit` 1.0.3 and prior are vulnerable to a remote denial of service. ## Recommendation Upgrade to version 1.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'ircdkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/Twipped/ircdkit/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/Twipped/ircdkit/pull/2/commits/595ed02cde517fad57854d2ac2855a09a626e665'}, {'type': 'WEB', 'url': 'https://github.com/Twipped/ircdkit/commit/f0cc6dc913ec17b499fa33a676bb72c624456f2c'}, {'type': 'PACKAGE', ...
{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:27:33Z', 'nvd_published_at': None}
1.4.0
GHSA-xm7f-x4wx-wmgv
2020-08-31T18:31:36Z
2019-06-04T15:47:43Z
null
[]
Out-of-bounds Read in byte
Versions of `byte` before 1.4.1 allocate uninitialized buffers and read data from them past the initialized length ## Recommendation Update to version 1.4.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'byte'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/node-modules/byte/pull/3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330351'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/657'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:47:01Z', 'nvd_published_at': None}
1.4.0
GHSA-7rp2-fm2h-wchj
2023-09-05T13:11:53Z
2019-06-10T18:43:25Z
null
['CVE-2019-12308']
Django Cross-site Scripting in AdminURLFieldWidget
An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query param...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.21'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12308'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/1.11.21/'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/2.1.9/'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/2.2....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-10T18:41:42Z', 'nvd_published_at': '2019-06-03T17:29:00Z'}
1.4.0
GHSA-83rx-c8cr-6j8q
2021-08-04T21:33:58Z
2019-06-05T20:48:55Z
null
[]
Insecure Default Configuration in tesseract.js
Versions of `tesseract.js` prior to 1.0.19 default to using a third-party proxy. Requests may be proxied through `crossorigin.me` which clearly states is not suitable for production use. This may lead to instability and privacy violations. ## Recommendation Upgrade to version 1.0.19 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tesseract.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/naptha/tesseract.js/pull/267'}, {'type': 'WEB', 'url': 'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TESSERACTJS-174085'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisorie...
{'cwe_ids': ['CWE-829'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T20:48:43Z', 'nvd_published_at': None}
1.4.0
GHSA-w457-6q6x-cgp9
2022-06-06T17:16:15Z
2019-12-26T17:58:13Z
null
['CVE-2019-19919']
Prototype Pollution in handlebars
Versions of `handlebars` prior to 3.0.8 or 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' `__proto__` and `__defineGetter__` properties, which may allow an attacker to execute arbitrary code through crafted payloads. ## Recommendation Upgrade to version ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.compile']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19919'}, {'type': 'WEB', 'url': 'https://github.com/wycats/handlebars.js/issues/1558'}, {'type': 'WEB', 'url': 'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc'}, {'type': 'WEB', 'url': 'https://cve.mitre.org...
{'cwe_ids': ['CWE-1321', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T17:55:40Z', 'nvd_published_at': '2019-12-20T23:15:00Z'}
1.4.0
GHSA-24r8-fm9r-cpj2
2021-01-08T20:10:19Z
2019-12-05T18:40:51Z
null
['CVE-2019-16771']
Low severity vulnerability that affects com.linecorp.armeria:armeria
## Multiple timing attack vulnerabilities leading to the recovery of secrets based on the use of non-constant time compare function ### Impact String comparison method in multiple authentication validation in Armeria were known to be vulnerable to timing attacks. This vulnerability is caused by the insecure implement...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.97.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-24r8-fm9r-cpj2'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16771'}, {'type': 'WEB', 'url': 'https://github.co...
{'cwe_ids': ['CWE-113'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:26Z', 'nvd_published_at': None}
1.4.0
GHSA-wjx8-cgrm-hh8p
2023-04-25T16:32:33Z
2019-12-17T22:53:10Z
null
['CVE-2019-19745']
Unrestricted file uploads in Contao
### Impact A back end user with access to the form generator can upload arbitrary files and execute them on the server. ### Patches Update to Contao 4.4.46 or 4.8.6. ### Workarounds Configure your web server so it does not execute PHP files and other scripts in the Contao file upload directory. ### References ht...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.46'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.8.6...
[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-wjx8-cgrm-hh8p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19745'}, {'type': 'WEB', 'url': 'https://contao.org/en/news.html'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/unrestricted-f...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:42:31Z', 'nvd_published_at': None}
1.4.0
GHSA-3fjq-93xj-3f3f
2021-01-08T20:02:20Z
2019-12-06T23:20:26Z
null
['CVE-2019-16772']
Cross-Site Scripting in serialize-to-js
Versions of `serialize-to-js` prior to 3.0.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications. ## Recommendation Upgrade to version 3.0.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'serialize-to-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16772'}, {'type': 'WEB', 'url': 'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'}, {'typ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:02Z', 'nvd_published_at': None}
1.4.0
GHSA-pg36-wpm5-g57p
2022-04-25T23:10:28Z
2019-12-20T23:03:57Z
null
['CVE-2019-16785']
HTTP Request Smuggling: LF vs CRLF handling in Waitress
### Impact Waitress implemented a &amp;quot;MAY&amp;quot; part of the RFC7230 (https://tools.ietf.org/html/rfc7230#section-3.5) which states: Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header', 'waitress.parser.get_header_lines', 'waitress.receiver.ChunkedReceiver', 'waitress.receiver.ChunkedReceiver.received']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'i...
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-pg36-wpm5-g57p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16785'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:01:44Z', 'nvd_published_at': '2019-12-20T23:15:00Z'}
1.4.0
GHSA-xhh6-956q-4q69
2021-07-28T16:28:00Z
2019-12-02T18:08:19Z
null
['CVE-2019-18888']
Argument injection in a MimeTypeGuesser in Symfony
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to sy...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.8.52'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18888'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-18888.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/mime/CVE...
{'cwe_ids': ['CWE-20', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:46:13Z', 'nvd_published_at': '2019-11-21T23:15:00Z'}
1.4.0
GHSA-3r8j-pmch-5j2h
2021-01-08T21:20:32Z
2019-12-05T19:57:04Z
null
['CVE-2019-16768']
Internal exception message exposure for login action in Sylius
## Internal exception message exposure for login action ### Impact Exception messages from internal exceptions (like database exception) are wrapped by `\Symfony\Component\Security\Core\Exception\AuthenticationServiceException` and propagated through the system to UI. Therefore, some internal system information may le...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.10'}]}]}, {'pac...
[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-3r8j-pmch-5j2h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16768'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f'}, {'type': 'ADVISORY', 'url': 'ht...
{'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:06Z', 'nvd_published_at': None}
1.4.0
GHSA-5pm8-492c-92p5
2023-01-26T20:23:44Z
2019-12-02T18:04:11Z
null
['CVE-2019-18841']
Prototype Pollution in chartkick
Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'chartkick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'chartkick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.0'}]}], 'database_specific': {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick.js/issues/117'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'}, {'type': 'WEB', 'url': 'https://chartkick.com'}, {'...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:43:23Z', 'nvd_published_at': '2019-11-11T01:15:00Z'}
1.4.0
GHSA-3c45-wgjp-7v9r
2023-08-31T09:50:49Z
2019-12-17T22:52:34Z
null
['CVE-2014-7143']
Python Twisted trustRoot is not respected in HTTP client
Python Twisted 14.0.0 `trustRoot` is not respected in HTTP client
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.0.1'}]}], 'versions': ['14.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7143'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/3b5942252f5f3e45862a0e12b266ab29e243cc33'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-7143'}, {'type': 'WEB', 'url': 'https://exchange.xfor...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T01:47:21Z', 'nvd_published_at': None}
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
7