schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
nulllengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 14
228
| details
stringlengths 48
1.45k
| severity
stringlengths 2
78
| affected
stringlengths 79
6.96k
| references
stringlengths 143
6.38k
| database_specific
stringlengths 131
174
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-f7ph-p5rv-phw2 | 2020-08-31T18:12:27Z | 2018-11-06T23:13:37Z | null | ['CVE-2016-10547'] | Cross-Site Scripting in nunjucks | Affected versions of `nunjucks` do not properly escape specially structured user input in template vars when in auto-escape mode, resulting in a cross-site scripting vulnerability.
## Proof of Concept
By using an array for the keys in a template var, escaping is bypassed.
```javascript
name[]=<script>alert(1)</script>
```
A full PoC is available in the references section.
## Recommendation
Update to version 2.4.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'nunjucks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10547'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/nunjucks/issues/835'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f7ph-p5rv-phw2'}, {'type': 'WEB', 'url': 'https://github.com/matt-/nunjucks_test'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/147'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rwg6-3fmj-w4wx | 2023-09-08T23:30:49Z | 2018-11-01T14:47:21Z | null | ['CVE-2017-16061'] | tkinter is malware | The `tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tkinter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16061'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/500'}] | {'cwe_ids': ['CWE-433', 'CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xgc9-9w4v-h33h | 2021-09-21T22:31:15Z | 2018-11-06T23:17:27Z | null | ['CVE-2018-1321'] | High severity vulnerability that affects org.apache.syncope:syncope-core | An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1321'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xgc9-9w4v-h33h'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45400/'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security.html#CVE-2018-1321:_Remote_code_execution_by_administrators_with_report_and_template_entitlements'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103508'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xvch-r4wf-h8w9 | 2022-09-14T22:05:10Z | 2018-11-21T22:22:21Z | null | ['CVE-2018-17187'] | Improper Certificate Validation in proton-j | The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options to configure this explicitly or select a certificate verification mode with or without hostname verification being performed. The latter hostname verifying mode was not implemented in Apache Qpid Proton-J versions 0.3 to 0.29.0, with attempts to use it resulting in an exception. This left only the option to verify the certificate is trusted, leaving such a client vulnerable to Man In The Middle (MITM) attack. Uses of the Proton-J protocol engine which do not utilise the optional transport TLS wrapper are not impacted, e.g. usage within Qpid JMS. Uses of Proton-J utilising the optional transport TLS wrapper layer that wish to enable hostname verification must be upgraded to version 0.30.0 or later and utilise the VerifyMode#VERIFY_PEER_NAME configuration, which is now the default for client mode usage unless configured otherwise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:proton-j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3'}, {'fixed': '0.30.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.29.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17187'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xvch-r4wf-h8w9'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/PROTON-1962'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/qpid-users/201811.mbox/%3CCAFitrpQSV73Vz7rJYfLJK7gvEymZSCR5ooWUeU8j4jzRydk-eg%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'https://qpid.apache.org/cves/CVE-2018-17187.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105935'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5xgh-643p-cp2g | 2022-09-21T22:28:56Z | 2018-11-21T22:19:59Z | null | ['CVE-2018-17574'] | Cross-site Scripting in yapi-vendor | An issue was discovered in YMFE YApi 1.3.23. There is stored XSS in the name field of a project. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'yapi-vendor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17574'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/520'}, {'type': 'PACKAGE', 'url': 'https://github.com/YMFE/yapi'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5xgh-643p-cp2g'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-26q7-g57v-mxcp | 2020-08-31T18:19:13Z | 2018-11-07T00:28:11Z | null | ['CVE-2017-16043'] | HTML Injection in shout | Affected versions of `shout` do not escape the `/topic` command in messages, and are therefore vulnerable to cross-site scripting.
## Recommendation
Update to version 0.50.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'shout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.44.0'}, {'fixed': '0.50.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.49.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16043'}, {'type': 'WEB', 'url': 'https://github.com/erming/shout/pull/344'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-26q7-g57v-mxcp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/322'}] | {'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7g2w-6r25-2j7p | 2023-09-07T18:15:41Z | 2018-11-01T14:51:33Z | null | ['CVE-2018-16461'] | Command Injection in libnmap | Versions of `libnmap` before 0.4.16 are vulnerable to command injection.
Proof of concept
```js
const nmap = require('libnmap');
const opts = {
range: [
'scanme.nmap.org',
"x.x.$(touch success.txt)"
]
};
nmap.scan(opts, function(err, report) {
if (err) throw new Error(err);
for (let item in report) {
console.log(JSON.stringify(report[item]));
}
});
```
## Recommendation
Update to version 0.4.16 or later | [] | [{'package': {'ecosystem': 'npm', 'name': 'libnmap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16461'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390865'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7g2w-6r25-2j7p'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/474.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/719'}] | {'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3hvm-hgpw-rx4j | 2023-09-12T20:40:50Z | 2018-11-06T23:11:10Z | null | ['CVE-2018-16475'] | Path Traversal in knightjs | All versions of `knightjs` are vulnerable to Path Traversal.
This vulnerability allows an attacker to read content of arbitrary files on the server due to lack of input validation.
## Recommendation
As there is currently no fix for this module we recommend not using this module in production environments. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'knightjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16475'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403707'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3hvm-hgpw-rx4j'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/743'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-23xp-j737-282v | 2023-09-07T22:55:00Z | 2018-11-06T23:12:30Z | null | ['CVE-2018-16473'] | Path Traversal in takeapeek | All versions of `takeapeek` are vulnerable to path traversal exposing files and directories.
## Recommendation
As no fix is currently available for this vulnerability is it is our recommendation to use another static file server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'takeapeek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16473'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403736'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-23xp-j737-282v'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/478.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/740'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wv26-rj8c-4r33 | 2022-09-14T22:00:43Z | 2018-11-06T23:15:13Z | null | ['CVE-2018-6874'] | Cross-Site Request Forgery (CSRF) in Auth0 | CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6874'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2018-6874'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wv26-rj8c-4r33'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103695'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3p4q-x8f3-p7vq | 2023-09-05T19:12:36Z | 2018-11-21T22:19:22Z | null | ['CVE-2018-19352'] | Jupyter Notebook XSS via directory name | Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19352'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/288b73e1edbf527740e273fcc69b889460871648'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3p4q-x8f3-p7vq'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst'}, {'type': 'WEB', 'url': 'https://pypi.org/project/notebook/#history'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c2fx-8r76-gh36 | 2020-06-16T21:29:59Z | 2018-11-06T23:14:22Z | null | ['CVE-2013-7323'] | High severity vulnerability that affects python-gnupg | python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in unspecified vectors. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.3.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7323'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2fx-8r76-gh36'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/243'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/244'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/294'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56616'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59031'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r3vr-prwv-86g9 | 2021-09-17T14:15:08Z | 2018-11-06T23:14:39Z | null | ['CVE-2014-1927'] | High severity vulnerability that affects python-gnupg | The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.6'}]}], 'versions': ['0.3.5']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1927'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/vinay.sajip/python-gnupg'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/issues/detail?id=98'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r3vr-prwv-86g9'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/245'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/294'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56616'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59031'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3rh7-vm4x-q2hp | 2023-09-12T18:40:34Z | 2018-11-09T17:49:22Z | null | ['CVE-2017-16055'] | sqlserver is malware | The `sqlserver` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sqlserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3rh7-vm4x-q2hp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/486'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2jc8-4r6g-282j | 2020-06-16T20:52:26Z | 2018-11-06T23:13:02Z | null | ['CVE-2014-1928'] | Moderate severity vulnerability that affects python-gnupg | The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.6'}]}], 'versions': ['0.3.5']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1928'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/issues/detail?id=98'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2jc8-4r6g-282j'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/246'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/294'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56616'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59031'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hg78-4f6x-99wq | 2023-08-28T12:46:14Z | 2018-11-15T15:58:58Z | null | ['CVE-2018-16470'] | Rack vulnerable to Denial of Service | There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.4'}, {'fixed': '2.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16470'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3172'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2018-16470.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/Dz4sRl-ktKk'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g68x-vvqq-pvw3 | 2023-09-08T21:34:45Z | 2018-11-21T22:19:50Z | null | ['CVE-2018-17960'] | Ckeditor XSS Vulnerability | CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste. It was possible to execute XSS inside the CKEditor source area after persuading the victim to: (i) switch CKEditor to source mode, then (ii) paste a specially crafted HTML code, prepared by the attacker, into the opened CKEditor source area, and (iii) switch back to WYSIWYG mode. Although this is an unlikely scenario, it is recommended to upgrade to the latest editor version. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ckeditor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17960'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/CKEditor-4.11-with-emoji-dropdown-and-auto-link-on-typing-released/'}, {'type': 'WEB', 'url': 'https://ckeditor.com/cke4/release/CKEditor-4.11.0'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g68x-vvqq-pvw3'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227030123/http://www.securityfocus.com/bid/109205'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vgrx-w6rg-8fqf | 2020-08-31T18:10:20Z | 2018-11-06T23:12:07Z | null | ['CVE-2016-10555'] | Forgeable Public/Private Tokens in jwt-simple | Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort.
## Recommendation
Update to version 0.3.1 or later.
Additionally, be sure to always specify an algorithm in calls to `.decode()`. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jwt-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10555'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97'}, {'type': 'WEB', 'url': 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/87'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c7c7-xm8g-xm36 | 2022-09-14T21:59:56Z | 2018-11-01T14:48:29Z | null | ['CVE-2018-18830'] | Unrestricted Upload of File with Dangerous Type in mingsoft:ms-mcms | An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In the name parameter, change the suffix to jsp. In the response, the server returns the storage path of the file, which can be accessed to execute arbitrary JSP code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18830'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/IO0IQ'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c7c7-xm8g-xm36'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2mw7-wggm-m6w3 | 2022-09-14T22:05:59Z | 2018-11-21T22:22:46Z | null | ['CVE-2018-19183'] | Denial of Service in ethereumjs-vm | ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a "code: Buffer.from(my_code, 'hex')" attribute. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ethereumjs-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19183'}, {'type': 'WEB', 'url': 'https://github.com/ethereumjs/ethereumjs-vm/issues/386'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2mw7-wggm-m6w3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereumjs/ethereumjs-vm'}] | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qfjv-998w-q48f | 2021-09-16T19:56:56Z | 2018-11-06T23:15:46Z | null | ['CVE-2018-17186'] | High severity vulnerability that affects org.apache.syncope:syncope-core | An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17186'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qfjv-998w-q48f'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security#CVE-2018-17186:_XXE_on_BPMN_definitions'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jmf4-pq78-f8vj | 2021-09-14T19:47:15Z | 2018-11-21T22:24:50Z | null | ['CVE-2018-1314'] | Moderate severity vulnerability that affects org.apache.hive:hive-jdbc | In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1314'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jmf4-pq78-f8vj'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3da47dbcbf09697387f29d2f1aed970523b6b334d93afd3cced23727@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105884'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q257-vv4p-fg92 | 2023-09-08T23:24:59Z | 2018-11-09T17:49:34Z | null | ['CVE-2017-16005'] | Header Forgery in http-signature | Affected versions of `http-signature` contain a vulnerability which can allow an attacker in a privileged network position to modify header names and change the meaning of the request, without requiring an updated signature.
This problem occurs because vulnerable versions of `http-signature` sign the contents of headers, but not the header names.
## Proof of Concept
Consider this to be the initial, untampered request:
```http
POST /pay HTTP/1.1
Host: example.com
Date: Thu, 05 Jan 2012 21:31:40 GMT
X-Payment-Source: src@money.com
X-Payment-Destination: dst@money.com
Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-source x-payment-destination" MDyO5tSvin5...
```
And the request is intercepted and tampered as follows:
```http
X-Payment-Source: dst@money.com // Emails switched
X-Payment-Destination: src@money.com
Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-destination x-payment-source" MDyO5tSvin5...
```
In the resulting responses, both requests would pass signature verification without issue.
```
src@money.com\n
dst@money.com\n
```
## Recommendation
Update to version 0.10.0 or higher. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'http-signature'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16005'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-http-signature/issues/10'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q257-vv4p-fg92'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/318'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-38h8-x697-gh8q | 2023-09-07T20:13:49Z | 2018-11-09T17:45:30Z | null | ['CVE-2017-16024'] | Tmp files readable by other users in sync-exec | Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user.
## Recommendation
There is currently no direct patch for `sync-exec`, as the `child_process.execSync` function provided in Node.js v0.12.0 and later provides the same functionality natively.
The best mitigation currently is to update to Node.js v0.12.0 or later, and migrate all uses of `sync-exec` to `child_process.execSync()`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sync-exec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16024'}, {'type': 'WEB', 'url': 'https://github.com/gvarsanyi/sync-exec/issues/17'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/377.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38h8-x697-gh8q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/310'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Insecure_Temporary_File'}] | {'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rxmr-c9jm-7mm8 | 2022-09-14T22:07:44Z | 2018-11-21T22:24:22Z | null | ['CVE-2018-1284'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache hive | In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1284'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rxmr-c9jm-7mm8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/29184dbce4a37be2af36e539ecb479b1d27868f73ccfdff46c7174b4@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103750'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-32w7-9whp-cjp9 | 2022-09-14T22:08:57Z | 2018-11-29T21:30:56Z | null | ['CVE-2018-19443'] | Session Fixation in Tryton | The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tryton'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}], 'versions': ['5.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19443'}, {'type': 'WEB', 'url': 'https://bugs.tryton.org/issue7792'}, {'type': 'WEB', 'url': 'https://discuss.tryton.org/t/security-release-for-issue7792/830'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-32w7-9whp-cjp9'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9xgh-xgw5-p5cw | 2023-09-14T17:55:59Z | 2018-11-09T17:42:54Z | null | ['CVE-2017-16057'] | nodemssql is malware | The `nodemssql` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodemssql'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16057'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9xgh-xgw5-p5cw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/484'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x3g3-334f-q6h4 | 2023-09-08T19:44:37Z | 2018-11-09T17:41:15Z | null | ['CVE-2018-19056'] | Pandao editor.md vulnerable to DOM XSS | pandao Editor.md 1.5.0 has DOM XSS via input starting with a `<<` substring, which is mishandled during construction of an `A` element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.5.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19056'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/634'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x3g3-334f-q6h4'}, {'type': 'PACKAGE', 'url': 'https://github.com/pandao/editor.md'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g4xq-jx4w-4cjv | 2023-01-23T17:08:55Z | 2018-11-01T14:46:01Z | null | ['CVE-2018-16468'] | Loofah Cross-site Scripting vulnerability | In the Loofah gem for Ruby, through version 2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. Users are advised to upgrade to version 2.2.3.
See https://github.com/flavorjones/loofah/issues/154 for more details. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16468'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/154'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4364'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vcr5-xr9h-mvc5 | 2023-09-01T20:54:16Z | 2018-11-06T23:12:48Z | null | ['CVE-2014-1929'] | python-gnupg vulnerable to shell injection | python-gnupg 0.3.5 and 0.3.6 allow for shell injection via a failure to escape backslashes in the `shell_quote()` function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1929'}, {'type': 'WEB', 'url': 'https://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/2014-June/028512.html'}, {'type': 'WEB', 'url': 'https://code.google.com/archive/p/python-gnupg/issues/98'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vcr5-xr9h-mvc5'}, {'type': 'PACKAGE', 'url': 'https://github.com/vsajip/python-gnupg'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228170437/http://www.securityfocus.com/bid/65539'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2014/02/04/3'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2014/02/04/4'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/245'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/335'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jf2m-435m-mxw8 | 2022-09-14T22:08:10Z | 2018-11-21T22:24:34Z | null | ['CVE-2018-1282'] | SQL Injection in hive-jdbc | This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows carefully crafted arguments to be used to bypass the argument escaping/cleanup that JDBC driver does in PreparedStatement implementation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.1'}, {'fixed': '2.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1282'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jf2m-435m-mxw8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/74bd2bff1827febb348dfb323986fa340d3bb97a315ab93c3ccc8299@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103751'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wg85-p6j7-gp3w | 2023-09-07T00:08:31Z | 2018-11-21T22:21:25Z | null | ['CVE-2018-19057'] | SimpleMDE XSS Vulnerability | SimpleMDE 1.11.2 has XSS via an onerror attribute of a crafted IMG element, or via certain input with `[` and `(` characters, which is mishandled during construction of an `A` element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'simplemde'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19057'}, {'type': 'WEB', 'url': 'https://github.com/sparksuite/simplemde-markdown-editor/issues/721'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg85-p6j7-gp3w'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparksuite/simplemde-markdown-editor'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q3jg-4c82-j4xh | 2022-09-14T22:09:19Z | 2018-11-29T21:30:30Z | null | ['CVE-2018-15795'] | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Pivotal CredHub Service Broker | Pivotal CredHub Service Broker, versions prior to 1.1.0, uses a guessable form of random number generation in creating service broker's UAA client. A remote malicious user may guess the client secret and obtain or modify credentials for users of the CredHub Service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.credhub:spring-credhub-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15795'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q3jg-4c82-j4xh'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-15795'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105915'}] | {'cwe_ids': ['CWE-338'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-phg2-9c5g-m4q7 | 2022-09-14T22:04:46Z | 2018-11-21T22:19:30Z | null | ['CVE-2018-17190'] | Remote Code Execution in spark-core | In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected.
# Mitigation
Enable authentication on any Spark standalone cluster that is not otherwise secured from unwanted access, for example by network-level restrictions. Use spark.authenticate and related security properties described at https://spark.apache.org/docs/latest/security.html | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17190'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-phg2-9c5g-m4q7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201903-21'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105976'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xqqr-p362-6rmc | 2023-09-12T21:11:28Z | 2018-11-09T17:44:20Z | null | ['CVE-2017-16029'] | Directory Traversal in hostr | Affected versions of `hostr` are vulnerable to directory traversal which allows attackers to read files outside the current directory by sending `../` in the url path for GET requests.
## Recommendation
Upgrade to version 2.3.6 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'hostr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16029'}, {'type': 'WEB', 'url': 'https://github.com/henrytseng/hostr/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/henrytseng/hostr/issues/8)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqqr-p362-6rmc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/303'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cfw5-v7cw-69cw | 2021-09-09T17:08:40Z | 2018-11-09T17:49:49Z | null | ['CVE-2018-1337'] | Critical severity vulnerability that affects org.apache.directory.api:apache-ldap-api | In Apache LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (including the credentials when sending a BIND request). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.directory.api:apache-ldap-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1337'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfw5-v7cw-69cw'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d66081195e9a02ee7cc20fb243b60467d1419586eed28297d820768f@%3Cdev.directory.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0e645b3f6ca977dc60b7cec231215c59a9471736c2402c1fef5a0616@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1815fb5b0c345f571c740e7a1b48d7477647edd4ffcf9d5321e69446@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1a258430d820a90ff9d4558319296cc517ff2252327d7b3546d16749@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4da40aa50cfdb2158898f2bc6df81feec1d42c6a06db6537d5cc0496@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55e74532e7f9e84ecfa56b4e0a50a5fe0ba6f7a76880520e4400b0d7@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r56b304fb9960c869995efbb31da3b9b7c6d53ee31f7f7048eb80434b@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104744'}] | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8rhc-48pp-52gr | 2021-09-07T20:33:02Z | 2018-11-09T17:43:25Z | null | ['CVE-2017-12612'] | High severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 | In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit or spark-shell. The attacker would be able to execute code as the user that ran the Spark application. Users are encouraged to update to version 2.1.2, 2.2.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12612'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8rhc-48pp-52gr'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/spark-dev/201709.mbox/%3CCAEccTyy-1yYuhdNgkBUg0sr9NeaZSrBKkBePdTNZbxXZNTAR-g%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100823'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jhgp-hvj6-x2p2 | 2023-09-12T18:44:07Z | 2018-11-06T23:12:01Z | null | ['CVE-2018-16474'] | Stored Cross-Site Scripting in tianma-static | All versions of `tianma-static` are vulnerable to stored cross-site scripting (XSS). The vulnerability is exploitable if a user can control the name of a file that is served by `tianma-static`
## Recommendation
As no fix is available for this vulnerability at this time it is our recommendation to use another static file server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tianma-static'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16474'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403692'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhgp-hvj6-x2p2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/741'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j7c4-2xj8-wm7r | 2022-09-14T22:51:45Z | 2018-11-01T14:49:30Z | null | ['CVE-2015-5159'] | Improper Input Validation in kdcproxy | python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'kdcproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5159'}, {'type': 'WEB', 'url': 'https://github.com/latchset/kdcproxy/commit/f274aa6787cb8b3ec1cc12c440a56665b7231882'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1245200'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j7c4-2xj8-wm7r'}, {'type': 'PACKAGE', 'url': 'https://github.com/latchset/kdcproxy'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hhrp-qm88-xjr3 | 2023-09-07T18:23:41Z | 2018-11-21T22:19:41Z | null | ['CVE-2018-19289'] | Valine HTML Injection | An issue was discovered in Valine v1.3.3. It allows HTML injection, which can be exploited for JavaScript execution via an EMBED element in conjunction with a .pdf file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19289'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/127'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/commit/32d4d5e68df804f0eabb1a2bebbbf9459e31c2b7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hhrp-qm88-xjr3'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w4r4-65mg-45x2 | 2022-12-06T16:40:49Z | 2018-11-09T17:41:46Z | null | ['CVE-2018-11770'] | org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 Improper Authentication vulnerability | From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting 'spark.authenticate.secret' when running the REST APIs, to make this clear. Future 2.4.x versions will also disable the REST API by default in the standalone master by changing the default value of 'spark.master.rest.enabled' to 'false'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '2.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '2.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11770'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485%40%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485@%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://spark.apache.org/security.html#CVE-2018-11770'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227114942/http://www.securityfocus.com/bid/105097'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:32Z', 'nvd_published_at': '2018-08-13T16:29:00Z'} |
1.4.0 | GHSA-9xw9-pvgv-6p76 | 2023-09-13T19:36:45Z | 2018-11-09T17:47:52Z | null | ['CVE-2017-16014'] | Insufficient Error Handling in http-proxy | Affected versions of `http-proxy` are vulnerable to a denial of service attack, wherein an attacker can force an error which will cause the server to crash.
## Recommendation
Update to version 0.7.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'http-proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.6.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16014'}, {'type': 'WEB', 'url': 'https://github.com/nodejitsu/node-http-proxy/pull/101'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9xw9-pvgv-6p76'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/323'}] | {'cwe_ids': ['CWE-703'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v3vf-2r98-xw8w | 2022-09-14T22:51:27Z | 2018-11-06T23:17:25Z | null | ['CVE-2018-1322'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache syncope-cope | An administrator with user search entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can recover sensitive security values using the fiql and orderby parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1322'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v3vf-2r98-xw8w'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45400/'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security.html#CVE-2018-1322:_Information_disclosure_via_FIQL_and_ORDER_BY_sorting'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103507'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wg96-3933-j2w5 | 2023-09-08T23:10:15Z | 2018-11-09T17:45:55Z | null | ['CVE-2017-16017'] | Cross-Site Scripting in sanitize-html | Affected versions of `sanitize-html` are vulnerable to cross-site scripting.
## Proof of Concept:
`<IMG SRC= onmouseover="alert('XSS');">`
produces the following:
`<img src="onmouseover="alert('XSS');"" />`
This is definitely invalid HTML, but would suggest that it's being interpreted incorrectly by the parser.
## Recommendation
Update to version 1.2.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16017'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/pull/20'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg96-3933-j2w5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/155'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5r2p-j47h-mhpg | 2023-08-28T12:48:11Z | 2018-11-15T15:59:08Z | null | ['CVE-2018-16471'] | Rack vulnerable to Cross-site Scripting | There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16471'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2018-16471.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/NAalCee8n6o'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4089-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ghgj-3xqr-6jfm | 2022-09-14T01:06:27Z | 2018-11-09T17:50:00Z | null | ['CVE-2015-2080'] | Jetty vulnerable to exposure of sensitive information to unauthenticated remote users | The exception handling code in Eclipse Jetty prior to 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.9.v20150224'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.8.v20150217'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2080'}, {'type': 'WEB', 'url': 'https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ghgj-3xqr-6jfm'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190307-0005/'}, {'type': 'WEB', 'url': 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html'}, {'type': 'WEB', 'url': 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00075.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151804.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2015/Mar/12'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/534755/100/1600/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/72768'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1031800'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p639-xxv5-j383 | 2022-09-14T22:07:19Z | 2018-11-21T22:24:08Z | null | ['CVE-2018-1315'] | Incorrect Permission Assignment for Critical Resource in Apache hive | In Apache Hive 2.1.0 to 2.3.2, when 'COPY FROM FTP' statement is run using HPL/SQL extension to Hive, a compromised/malicious FTP server can cause the file to be written to an arbitrary location on the cluster where the command is run from. This is because FTP client code in HPL/SQL does not verify the destination location of the downloaded file. This does not affect hive cli user and hiveserver2 user as hplsql is a separate command line script and needs to be invoked differently. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1315'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p639-xxv5-j383'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d5da94ef60312c01a8d2348466680d1b5fb70702c71a3e84e94f7933@%3Cdev.hive.apache.org%3E'}] | {'cwe_ids': ['CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9jm3-5835-537m | 2023-09-13T19:36:05Z | 2018-11-01T14:48:50Z | null | ['CVE-2018-16462'] | Command Injection in apex-publish-static-files | Versions of `apex-publish-static-files` before 2.0.1 are vulnerable to command injection. This is exploitable if user input is passed into the `connectString` option in the `publish` method.
## Recommendation
Update to version 2.0.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'apex-publish-static-files'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16462'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/405694'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9jm3-5835-537m'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/475.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/718'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qw3g-35hc-fcrh | 2023-09-12T21:05:41Z | 2018-11-09T17:45:38Z | null | ['CVE-2017-16018'] | Cross-Site Scripting (XSS) in restify | Affected versions of `restify` are susceptible to a cross-site scripting vulnerability when using URL encoded script tags in a non-existent URL.
## Proof of Concept:
Request
```
https://localhost:3000/no5_such3_file7.pl?%22%3E%3Cscript%3Ealert(73541);%3C/script%3E
```
Will be included in response:
```<script>alert(73541);</script>```
## Recommendation
Update to version 4.1.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'restify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16018'}, {'type': 'WEB', 'url': 'https://github.com/restify/node-restify/issues/1018'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qw3g-35hc-fcrh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/314'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7xfp-9c55-5vqj | 2023-09-12T18:48:46Z | 2018-11-09T17:44:01Z | null | ['CVE-2017-16026'] | Remote Memory Exposure in request | Affected versions of `request` will disclose local system memory to remote systems in certain circumstances. When a multipart request is made, and the type of `body` is `number`, then a buffer of that size will be allocated and sent to the remote server as the body.
## Proof of Concept
```js
var request = require('request');
var http = require('http');
var serveFunction = function (req, res){
req.on('data', function (data) {
console.log(data)
});
res.end();
};
var server = http.createServer(serveFunction);
server.listen(8000);
request({
method: "POST",
uri: 'http://localhost:8000',
multipart: [{body:500}]
},function(err,res,body){});
```
## Recommendation
Update to version 2.68.0 or later | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.49.0'}, {'fixed': '2.68.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.6'}, {'fixed': '2.68.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.47.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16026'}, {'type': 'WEB', 'url': 'https://github.com/request/request/issues/1904'}, {'type': 'WEB', 'url': 'https://github.com/request/request/pull/2018'}, {'type': 'WEB', 'url': 'https://github.com/request/request/pull/2022'}, {'type': 'WEB', 'url': 'https://github.com/request/request/commit/29d81814bc16bc79cb112b4face8be6fc00061dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/request/request'}] | {'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fwx5-5fqj-jv98 | 2020-08-31T18:18:39Z | 2018-11-09T17:46:30Z | null | ['CVE-2017-16022'] | Cross-Site Scripting in morris.js | Affected versions of `morris.js` are vulnerable to cross-site scripting attacks in labels that appear when hovering over a particular point on a generated graph. The text content of these labels is not escaped, so if control over the labels is obtained, script can be injected. The script will run on the client side whenever that specific graph is loaded.
## Recommendation
A patch for this vulnerability was created in 2014, but has still not been published to npm. In order to mitigate this issue effectively, install the library from github via:
```
npm i morrisjs/morris.js -s
``` | [] | [{'package': {'ecosystem': 'npm', 'name': 'morris.js'}, 'versions': ['0.5.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16022'}, {'type': 'WEB', 'url': 'https://github.com/morrisjs/morris.js/pull/464'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fwx5-5fqj-jv98'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/307'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mh6f-8j2x-4483 | 2021-09-15T20:08:26Z | 2018-11-26T23:58:21Z | null | [] | Critical severity vulnerability that affects event-stream and flatmap-stream | The NPM package `flatmap-stream` is considered malicious. A malicious actor added this package as a dependency to the NPM `event-stream` package in version `3.3.6`. Users of `event-stream` are encouraged to downgrade to the last non-malicious version, `3.3.4`, or upgrade to the latest 4.x version.
Users of `flatmap-stream` are encouraged to remove the dependency entirely.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'event-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.6'}, {'fixed': '4.0.0'}]}], 'versions': ['3.3.6']}, {'package': {'ecosystem': 'npm', 'name': 'flatmap-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dominictarr/event-stream/issues/116'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mh6f-8j2x-4483'}, {'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/event-stream'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vwjj-2852-3765 | 2023-09-07T18:28:05Z | 2018-11-09T17:46:27Z | null | ['CVE-2017-16015'] | Cross-Site Scripting in forms | Affected versions of `forms` do not properly escape HTML in generated forms, which may result in cross-site scripting.
## Recommendation
Update to version 1.3.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'forms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16015'}, {'type': 'WEB', 'url': 'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vwjj-2852-3765'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/158'}] | {'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rrfq-g5fq-fc9c | 2022-09-14T22:08:31Z | 2018-11-21T22:25:04Z | null | ['CVE-2018-11777'] | Improper Authentication in hive:hive-exec | In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11777'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrfq-g5fq-fc9c'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/963c8e2516405c9b532b4add16c03b2c5db621e0c83e80f45049cbbb@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105886'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f9cm-qmx5-m98h | 2023-09-07T20:34:10Z | 2018-11-01T14:45:42Z | null | ['CVE-2018-16469'] | Prototype Pollution in merge | Versions of `merge` before 1.2.1 are vulnerable to prototype pollution. The `merge.recursive` function can be tricked into adding or modifying properties of the Object prototype.
## Recommendation
Update to version 1.2.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'merge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16469'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/381194'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f9cm-qmx5-m98h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/722'}] | {'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qr28-7j6p-9hmv | 2023-03-27T22:21:10Z | 2018-11-09T17:47:45Z | null | ['CVE-2017-1000042'] | Content Injection via TileJSON attribute in mapbox.js | Versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios.
If `L.mapbox.map` or `L.mapbox.tileLayer` are used to load untrusted TileJSON content from a non-Mapbox URL, it is possible for a malicious user with control over the TileJSON content to inject script content into the "attribution" value of the TileJSON which will be executed in the context of the page using Mapbox.js.
## Recommendation
Version 2.x: Update to version 2.1.7 or later.
Version 1.x: Update to version 1.6.5 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mapbox-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mapbox-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000042'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/54327'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qr28-7j6p-9hmv'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mapbox-rails/CVE-2017-1000042.yml'}, {'type': 'WEB', 'url': 'https://nodesecurity.io/advisories/49'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/49'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:39Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-mwcv-m549-5cm8 | 2023-09-11T18:23:24Z | 2018-11-01T14:47:43Z | null | ['CVE-2017-16062'] | node-tkinter is malware | The `node-tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-tkinter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16062'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mwcv-m549-5cm8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/501'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mrmf-qwxg-7c3h | 2023-09-08T19:51:45Z | 2018-11-09T17:48:20Z | null | ['CVE-2017-16006'] | XSS in Data URI in remarkable | Affected versions of `remarkable` are vulnerable to cross-site scripting. Vulnerable versions of the package allow the use of `data:` URIs in links, and can therefore execute javascript.
## Proof of Concept
```markdown
[link](data:text/html,<script>alert('0')</script>)
```
## Recommendation
Update to v1.7.0 or later | [] | [{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16006'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/227'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mrmf-qwxg-7c3h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/319'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-79mx-88w7-8f7q | 2021-09-02T21:06:02Z | 2018-11-06T23:12:49Z | null | ['CVE-2014-9772'] | XSS Filter Bypass via Encoded URL in validator | Versions of `validator` prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability.
## Proof of Concept
The xss() function removes the word "javascript" when contained inside an attribute.
However, it does not properly handle cases where characters have been hex-encoded.
As a result, it is possible to build an input that bypasses the filter but which the browser will accept as valid JavaScript.
For example:
```<a href="javascript:...">abc</a>```
will render as:
```<a href="javascript:...">abc</a>```
## Recommendation
The package author has decided to remove the xss filter functionality in the latest version of this module. If this feature is not currently being used, you are not affected by the vulnerability. If it is being used, updating to the latest version of the module will break your application.
In order for affected users to mitigate this vulnerability, it is necessary to use an [alternative package](https://www.npmjs.com/search?q=xss%20filter&page=1&ranking=optimal) that provides similar functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772'}, {'type': 'WEB', 'url': 'https://github.com/chriso/validator.js/issues/181'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-79mx-88w7-8f7q'}, {'type': 'PACKAGE', 'url': 'https://github.com/chriso/validator.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/43'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97102'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xc6g-ggrc-qq4r | 2023-09-08T23:04:54Z | 2018-11-09T17:47:23Z | null | ['CVE-2017-16016'] | Cross-Site Scripting in sanitize-html | Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`.
## Proof of Concept
```js
var sanitizeHtml = require('sanitize-html');
var dirty = '!<textarea></textarea><svg/onload=prompt`xs`></textarea>!';
var clean = sanitizeHtml(dirty, {
allowedTags: [ 'textarea' ]
});
console.log(clean);
// !<textarea></textarea><svg/onload=prompt`xs`></textarea>!
```
## Recommendation
Update to version 1.11.4 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16016'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/issues/100'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xc6g-ggrc-qq4r'}, {'type': 'WEB', 'url': 'https://npmjs.com/package/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/154'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9h9c-f287-c6vp | 2022-09-14T22:02:16Z | 2018-11-06T23:16:18Z | null | ['CVE-2018-17184'] | Improper Control of Interaction Frequency in Apache syncope-core | A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected JavaScript code is executed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17184'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9h9c-f287-c6vp'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security#CVE-2018-17184:_Stored_XSS'}] | {'cwe_ids': ['CWE-799'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f89g-whpf-6q9m | 2023-09-08T23:59:04Z | 2018-11-09T17:46:56Z | null | ['CVE-2017-16008'] | Cross-Site Scripting in i18next | Affected versions of `i18next` allow untrusted user input to be injected into dictionary key names, resulting in a cross-site scripting vulnerability.
## Proof of Concept
```js
var init = i18n.init({debug: true}, function(){
var test = i18n.t('__firstName__ __lastName__', {
escapeInterpolation: true,
firstName: '__lastNameHTML__',
lastName: '<script>',
});
console.log(test);
});
// equals "<script> <script>"
```
## Recommendation
Update to version 1.10.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'i18next'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16008'}, {'type': 'WEB', 'url': 'https://github.com/i18next/i18next/pull/443'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f89g-whpf-6q9m'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/325'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hc9w-4p87-j549 | 2023-02-04T00:15:03Z | 2018-11-07T20:46:25Z | null | ['CVE-2018-16472'] | Prototype Pollution in cached-path-relative | Version of `cached-path-relative` before 1.0.2 are vulnerable to prototype pollution.
## Recommendation
Update to version 1.0.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'cached-path-relative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16472'}, {'type': 'WEB', 'url': 'https://github.com/ashaffer/cached-path-relative/issues/3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390847'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hc9w-4p87-j549'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/480.json'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00006.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/739'}] | {'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:57Z', 'nvd_published_at': '2018-11-06T19:29:00Z'} |
1.4.0 | GHSA-q8xj-8xg3-w432 | 2022-09-14T22:03:57Z | 2018-11-09T17:41:35Z | null | ['CVE-2018-18854'] | Uncontrolled Resource Consumption in spray-json | Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of many JSON object fields (with keys that have the same hash code). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18854'}, {'type': 'WEB', 'url': 'https://github.com/spray/spray-json/issues/277'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q8xj-8xg3-w432'}, {'type': 'PACKAGE', 'url': 'https://github.com/spray/spray-jso'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7hjp-97g3-rq93 | 2022-09-14T21:59:33Z | 2018-11-01T14:47:04Z | null | ['CVE-2018-18831'] | Path Traversal in minsoft:ms-mcms | An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18831'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/IO0K0'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7hjp-97g3-rq93'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w4x9-4f5x-8jj8 | 2020-06-16T21:59:37Z | 2018-11-21T22:23:29Z | null | ['CVE-2014-0228'] | Low severity vulnerability that affects org.apache.hive:hive-exec, org.apache.hive:hive, and org.apache.hive:hive-service | Apache Hive before 0.13.1, when in SQL standards based authorization mode, does not properly check the file permissions for (1) import and (2) export statements, which allows remote authenticated users to obtain sensitive information via a crafted URI. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w4x9-4f5x-8jj8'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hive-user/201406.mbox/%3CCABgNGzeN7E+9d=YV5yvnKA7wmSx1op_avtUjPcPtDaR6DLJM6g@mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/127091/Apache-Hive-0.13.0-Authorization-Failure.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/532418/100/0/threaded'}] | {'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3rhm-67j6-42jq | 2022-09-14T19:18:31Z | 2018-11-09T17:50:40Z | null | ['CVE-2017-18239'] | Exposure of Sensitive information in authentikat-jwt | A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.jason-goodwin:authentikat-jwt_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18239'}, {'type': 'WEB', 'url': 'https://github.com/jasongoodwin/authentikat-jwt/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/jasongoodwin/authentikat-jwt/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3rhm-67j6-42jq'}, {'type': 'PACKAGE', 'url': 'https://github.com/jasongoodwin/authentikat-jwt'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f94m-mqhr-mc29 | 2022-09-14T22:04:18Z | 2018-11-09T17:42:26Z | null | ['CVE-2018-18853'] | Uncontrolled Resource Consumption in spray-json when parsing decimal digit fields | Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of a field composed of many decimal digits. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18853'}, {'type': 'WEB', 'url': 'https://github.com/spray/spray-json/issues/278'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f94m-mqhr-mc29'}, {'type': 'PACKAGE', 'url': 'https://github.com/spray/spray-json'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qv2v-m59f-v5fw | 2021-09-16T21:04:32Z | 2018-11-07T00:29:37Z | null | ['CVE-2017-16031'] | Insecure randomness in socket.io | Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization.
## Recommendation
Update to v0.9.7 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'socket.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/issues/856'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/pull/857'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qv2v-m59f-v5fw'}, {'type': 'PACKAGE', 'url': 'https://github.com/socketio/socket.io'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/321'}] | {'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vqgp-4jgj-5j64 | 2023-09-01T10:05:11Z | 2018-11-21T22:23:04Z | null | ['CVE-2018-18920'] | Py-EVM is vulnerable to arbitrary bytecode injection | Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'py-evm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0a33'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18920'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/py-evm/issues/1448'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vqgp-4jgj-5j64'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/py-evm'}, {'type': 'WEB', 'url': 'https://twitter.com/AlexanderFisher/status/1060923428641878019'}, {'type': 'WEB', 'url': 'https://twitter.com/NettaLab/status/1060889400102383617'}, {'type': 'WEB', 'url': 'https://www.reddit.com/r/ethereum/comments/9vkk2g/netta_labs_claim_to_have_found_a_vulnerability_in/e9d3wyx/'}] | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-49qr-xh3w-h436 | 2023-09-05T18:42:33Z | 2018-11-21T22:15:47Z | null | ['CVE-2018-19351'] | Jupyter Notebook XSS via untrusted notebooks | Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPostHandler do not set a Content Security Policy to prevent this. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19351'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-49qr-xh3w-h436'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/jupyter/hWzu2BSsplY'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html'}, {'type': 'WEB', 'url': 'https://pypi.org/project/notebook/#history'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hfj4-96f7-6r5g | 2023-09-12T21:02:01Z | 2018-11-09T17:49:11Z | null | ['CVE-2017-0931'] | Cross-Site Scripting in html-janitor | Versions of `html-janitor` prior to 2.0.2 (all current versions) are vulnerable to cross-site scripting (XSS).
This is exploitable if user-controlled data is passed into the modules `clean()` function.
## Recommendation
No fix is currently available for this vulnerability. It is recommended to use an alternative module for HTML sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'html-janitor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0931'}, {'type': 'WEB', 'url': 'https://github.com/guardian/html-janitor/issues/34'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/308155'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hfj4-96f7-6r5g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/576'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vxp9-wv2f-wqmw | 2022-09-14T22:03:32Z | 2018-11-09T17:40:56Z | null | ['CVE-2018-8021'] | Deserialization of Untrusted Data in superset | Versions of Superset prior to 0.23 used an unsafe load method from the pickle library to deserialize data leading to possible remote code execution. Note Superset 0.23 was released prior to any Superset release under the Apache Software Foundation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'superset'}, 'ecosystem_specific': {'affected_functions': ['superset.models.core.Dashboard.import_obj', 'superset.views.core.DashboardModelView.download_dashboards', 'superset.views.core.Superset.import_dashboards']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8021'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/pull/4243'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/commit/2c72a7ae4fc0a8bac1f037a79efa90e1c5549710'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45933/'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5mhv-9qw8-j63g | 2023-09-11T16:18:34Z | 2018-11-09T17:43:03Z | null | ['CVE-2017-16056'] | mssql.js is malware | The `mssql.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mssql.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16056'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5mhv-9qw8-j63g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/485'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9fg5-f5pj-rwcc | 2023-09-11T21:49:09Z | 2018-11-09T17:43:52Z | null | ['CVE-2017-16058'] | gruntcli is malware | The `gruntcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'gruntcli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16058'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9fg5-f5pj-rwcc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/498'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9p47-w5xp-f4xr | 2023-09-13T22:23:39Z | 2018-11-09T17:48:37Z | null | ['CVE-2017-16003'] | windows-build-tools downloads Resources over HTTP | Affected versions of `windows-build-tools` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-build-tools`.
## Recommendation
Update to version 1.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'windows-build-tools'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16003'}, {'type': 'WEB', 'url': 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90'}, {'type': 'WEB', 'url': 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9p47-w5xp-f4xr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/304'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-83r3-c79w-f6wc | 2021-09-03T22:28:49Z | 2018-11-21T22:23:49Z | null | ['CVE-2015-7521'] | High severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service | The authorization framework in Apache Hive 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0 and 1.2.1, on clusters protected by Ranger and SqlStdHiveAuthorization, allows attackers to bypass intended parent table access restrictions via unspecified partition-level operations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7521'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-83r3-c79w-f6wc'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hive-user/201601.mbox/%3C20160128205008.2154F185EB%40minotaur.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/135836/Apache-Hive-Authorization-Bypass.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/28/12'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/537549/100/0/threaded'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3p8f-j2vw-7hw9 | 2023-09-07T22:49:48Z | 2018-11-09T17:43:44Z | null | ['CVE-2017-16059'] | mssql-node is malware | The `mssql-node` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this module is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mssql-node'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16059'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3p8f-j2vw-7hw9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/480'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q69p-5h74-w36f | 2023-03-27T22:19:37Z | 2018-11-09T17:48:34Z | null | ['CVE-2017-1000043'] | Content Injection via TileJSON Name in mapbox.js | Versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios.
If `L.mapbox.map` or `L.mapbox.shareControl` are used in a manner that gives users control of the TileJSON content, it is possible to inject script content into the name value of the TileJSON. After clicking on the share control, the malicious code will execute in the context of the page using Mapbox.js.
## Recommendation
Version 1.x: Update to version 1.6.6 or later.
Version 2.x: Update to version 2.2.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mapbox-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mapbox-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000043'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/99245'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q69p-5h74-w36f'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mapbox-rails/CVE-2017-1000043.yml'}, {'type': 'WEB', 'url': 'https://nodesecurity.io/advisories/74'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/74'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:13Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-r34r-f84j-5x4x | 2021-09-17T14:13:37Z | 2018-11-09T17:43:08Z | null | ['CVE-2017-7678'] | Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 | In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7678'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r34r-f84j-5x4x'}, {'type': 'WEB', 'url': 'http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99603'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h29f-7f56-j8wh | 2023-01-23T21:16:39Z | 2018-02-20T19:23:20Z | null | ['CVE-2018-7212'] | Sinatra Path Traversal vulnerability | An issue was discovered in `rack-protection/lib/rack/protection/path_traversal.rb` in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sinatra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.beta1'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7212'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/pull/1379'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/commit/6ad721abcfe36334108dcdd05d046c361e1b7a9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sinatra/sinatra'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2r9c-46v3-43fc | 2021-01-08T20:59:00Z | 2018-08-17T20:28:13Z | null | ['CVE-2016-10688'] | Downloads Resources over HTTP in haxe3 | Affected versions of `haxe3` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe3`.
## Recommendation
No patch is currently available for this vulnerability. This vulnerability has been left unpatched for several years, despite active maintenance on the package. Because of this, it appears that the package author has accepted the risk, and is unlikely to patch this package in the future.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'haxe3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10688'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2r9c-46v3-43fc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/294'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5p9f-55j8-922m | 2020-06-17T15:14:35Z | 2018-08-13T20:49:10Z | null | [] | Moderate severity vulnerability that affects doorkeeper | Withdrawn, accidental duplicate publish.
The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5p9f-55j8-922m'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9cp3-fh5x-xfcj | 2023-03-31T15:44:11Z | 2018-08-09T20:55:46Z | null | ['CVE-2017-16098'] | Regular Expression Denial of Service in charset | Affected versions of `charset` are susceptible to a regular expression denial of service.
The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.
If node was compiled using the `-DHTTP_MAX_HEADER_SIZE` however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.
## Recommendation
Update to version 1.0.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'charset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16098'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/charset/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/charset/pull/11'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/charset/commit/effda0c48c51b47a47f4cad7db0c51ee7407cc1b'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-modules/charset'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3fhf-6939-qg8p | 2023-09-05T21:42:43Z | 2018-08-13T20:47:22Z | null | ['CVE-2015-1820'] | rest-client Gem Vulnerable to Session Fixation | REST client for Ruby (aka rest-client) versions 1.6.1.a until 1.8.0 allow remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rest-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.1.a'}, {'fixed': '1.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1820'}, {'type': 'WEB', 'url': 'https://github.com/rest-client/rest-client/issues/369'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1205291'}, {'type': 'PACKAGE', 'url': 'https://github.com/rest-client/rest-client'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/rest-client/versions/1.6.1.a'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228080106/http://www.securityfocus.com/bid/73295'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/03/24/3'}] | {'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fv9m-f7w4-889c | 2023-09-09T00:00:04Z | 2018-08-06T21:43:03Z | null | ['CVE-2017-16207'] | discordi.js is malware | The `discordi.js` package is malware that attempts to discover and exfiltrate a user's [Discord](https://discordapp.com/) credentials, sending them to pastebin.
All versions have been unpublished from the npm registry.
## Recommendation
Do not install / use this module. It has been unpublished from the npm registry but may exist in some caches. Any users that logged into Discord using this library will need to change their credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'discordi.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16207'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fv9m-f7w4-889c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/545'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j49g-mp79-5vm5 | 2023-09-07T18:25:01Z | 2018-08-06T20:06:29Z | null | ['CVE-2017-16203'] | coffe-script is malware | The `coffe-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `coffe-script` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'coffe-script'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16203'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j49g-mp79-5vm5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/543'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-22gq-x6pg-752j | 2023-09-07T22:47:17Z | 2018-08-29T23:45:41Z | null | ['CVE-2017-16065'] | openssl.js is malware | The `openssl.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'openssl.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16065'}, {'type': 'PACKAGE', 'url': 'https://github.com/DigitalArsenal/openssl.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/504'}] | {'cwe_ids': ['CWE-433', 'CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:50:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hx46-vwmx-wx95 | 2021-12-02T23:14:01Z | 2018-08-13T20:48:25Z | null | [] | High severity vulnerability that affects actionpack | Withdrawn, accidental duplicate publish.
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hx46-vwmx-wx95'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cwp3-834g-x79g | 2020-06-16T21:39:02Z | 2018-08-21T17:07:36Z | null | [] | Moderate severity vulnerability that affects archive-tar-minitar and minitar | Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'minitar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'archive-tar-minitar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cwp3-834g-x79g'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2wpq-vvw6-67wr | 2023-09-11T22:23:56Z | 2018-08-29T23:38:35Z | null | ['CVE-2017-16070'] | nodecaffe is malware | The `nodecaffe` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodecaffe'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16070'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/509'}] | {'cwe_ids': ['CWE-433', 'CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m3q7-rj8g-m457 | 2023-01-26T21:07:48Z | 2018-08-28T22:33:24Z | null | ['CVE-2015-7565'] | ember-source Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.11.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ember-source/CVE-2015-7565.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY'}, {'type': 'WEB', 'url': 'http://emberjs.com/blog/2016/01/14/security-releases-ember-1-11-4-1-12-2-1-13-12-2-0-3-2-1-2-2-2-1.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f599-5m7p-hcpf | 2023-03-01T01:34:41Z | 2018-08-13T20:45:32Z | null | ['CVE-2018-3769'] | grape subject to Cross-site Scripting | The grape rubygem suffers from a cross-site scripting (XSS) vulnerability via "format" parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'grape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3769'}, {'type': 'WEB', 'url': 'https://github.com/ruby-grape/grape/issues/1762'}, {'type': 'WEB', 'url': 'https://github.com/ruby-grape/grape/pull/1763'}, {'type': 'WEB', 'url': 'https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/grape/CVE-2018-3769.yml'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:43Z', 'nvd_published_at': '2018-07-05T16:29:00Z'} |
1.4.0 | GHSA-3wxq-7r8m-qpmg | 2023-09-07T18:33:27Z | 2018-08-29T23:56:30Z | null | ['CVE-2017-16068'] | ffmepg is malware | The `ffmepg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ffmepg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16068'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3wxq-7r8m-qpmg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/507'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gf7h-vg5v-cch6 | 2023-09-11T18:57:28Z | 2018-08-06T20:03:21Z | null | ['CVE-2017-16198'] | Directory Traversal in ritp | Affected versions of `ritp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ritp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16198'}, {'type': 'PACKAGE', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ritp'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gf7h-vg5v-cch6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/432'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wqh4-27cc-j8f2 | 2023-09-11T18:31:53Z | 2018-08-29T23:36:48Z | null | ['CVE-2017-16069'] | nodeffmpeg is malware | The `nodeffmpeg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodeffmpeg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16069'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wqh4-27cc-j8f2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/508'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c9rj-pgxv-84jc | 2023-09-08T21:32:49Z | 2018-08-06T20:12:46Z | null | ['CVE-2017-16206'] | cofee-script is malware | The `cofee-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `cofee-script` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'cofee-script'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16206'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9rj-pgxv-84jc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/540'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2pwf-xwr3-hp55 | 2021-12-02T23:14:26Z | 2018-08-13T20:48:52Z | null | [] | Moderate severity vulnerability that affects actionview | Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2pwf-xwr3-hp55'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x489-jjwm-52g7 | 2023-07-05T20:45:12Z | 2018-08-28T22:34:15Z | null | ['CVE-2015-7225'] | Tinfoil Devise-two-factor does not "burn" a successfully validated one-time password (OTP) | Tinfoil Devise-two-factor before 2.0.0 does not strictly follow [RFC 6238 § 5.2 ](https://datatracker.ietf.org/doc/html/rfc6238#section-5.2) and does not "burn" a successfully validated one-time password (aka OTP), which allows physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or "shoulder surfing", and replaying the OTP in the current time-step. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'devise-two-factor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7225'}, {'type': 'WEB', 'url': 'https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x489-jjwm-52g7'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/devise-two-factor/CVE-2015-7225.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinfoil/devise-two-factor'}, {'type': 'WEB', 'url': 'https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210122192452/https://www.securityfocus.com/bid/76789/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/20/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09/06/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09/17/2'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5rc6-2r3r-fv79 | 2023-09-13T19:09:51Z | 2018-08-15T19:25:47Z | null | ['CVE-2016-10644'] | slimerjs-edge downloads Resources over HTTP | Affected versions of `slimerjs-edge` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `slimerjs-edge`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'slimerjs-edge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10644'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5rc6-2r3r-fv79'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/243'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:16Z', 'nvd_published_at': None} |
End of preview. Expand
in Dataset Viewer.
README.md exists but content is empty.
Use the Edit dataset card button to edit it.
- Downloads last month
- 30