schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
11 values
aliases
stringlengths
2
20
summary
stringlengths
4
172
details
stringlengths
47
3.95k
severity
stringlengths
2
79
affected
stringlengths
76
3.32k
references
stringlengths
82
11.3k
database_specific
stringlengths
131
190
1.4.0
GHSA-8r98-rqg5-4vm3
2023-09-08T21:30:12Z
2019-02-18T23:56:50Z
null
['CVE-2016-10618']
node-browser downloads Resources over HTTP
Affected versions of `node-browser` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-browser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10618'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8r98-rqg5-4vm3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/214'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:36Z', 'nvd_published_at': None}
1.4.0
GHSA-4x5j-v9v9-w8gw
2021-01-08T19:52:32Z
2019-02-18T23:47:40Z
null
['CVE-2016-10614']
Downloads Resources over HTTP in httpsync
Affected versions of `httpsync` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `httpsync`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'httpsync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10614'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4x5j-v9v9-w8gw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/210'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:38Z', 'nvd_published_at': None}
1.4.0
GHSA-jppx-hw2f-8gx4
2023-09-07T18:26:30Z
2019-02-18T23:33:30Z
null
['CVE-2016-10609']
chromedriver126 downloads Resources over HTTP
Affected versions of `chromedriver126` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `chromedriver126`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'chromedriver126'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10609'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jppx-hw2f-8gx4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/203'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:03Z', 'nvd_published_at': None}
1.4.0
GHSA-x268-6jhm-2mx8
2023-09-07T22:29:08Z
2019-02-18T23:42:22Z
null
['CVE-2016-10675']
libsbmlsim downloads Resources over HTTP
Affected versions of `libsbmlsim` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libsbmlsim`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'libsbmlsim'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10675'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x268-6jhm-2mx8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/275'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:35Z', 'nvd_published_at': None}
1.4.0
GHSA-c4qp-h3m6-785f
2023-09-07T18:20:20Z
2019-02-18T23:51:59Z
null
['CVE-2016-10577']
ibm_db downloads Resources over HTTP
Affected versions of `ibm_db` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 1.0.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ibm_db'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10577'}, {'type': 'WEB', 'url': 'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c4qp-h3m6-785f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/163'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:14Z', 'nvd_published_at': None}
1.4.0
GHSA-wr2c-ppj9-f2fv
2021-01-08T01:15:00Z
2019-02-18T23:33:54Z
null
['CVE-2016-10601']
Downloads Resources over HTTP in webdrvr
Affected versions of `webdrvr` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdrvr`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'webdrvr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.43.0-1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10601'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wr2c-ppj9-f2fv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/193'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:05Z', 'nvd_published_at': None}
1.4.0
GHSA-8gf4-pcj6-54rp
2021-06-11T12:35:08Z
2019-02-18T23:47:53Z
null
['CVE-2016-10611']
Downloads Resources over HTTP in strider-sauce
Affected versions of `strider-sauce` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `strider-sauce`. ## Recommendation While the package author has created a patch for this vulnerability, they have not yet published it to npm or bumped the version number. In order to resolve the vulnerability, you will need to install the module manually from github: ``` npm install github:Strider-CD/strider-sauce#5ff6d65 ``` As this vulnerability does not have a version bump included with the patch, it is possible that you have received a report for a vulnerable package, yet have installed the patched version and are no longer vulnerable. If that is the case, this advisory can be disregarded.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'strider-sauce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10611'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8gf4-pcj6-54rp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/202'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:35Z', 'nvd_published_at': None}
1.4.0
GHSA-pp4v-55vr-9gxh
2023-09-12T18:42:41Z
2019-02-18T23:39:13Z
null
['CVE-2016-10527']
Regular Expression Denial of Service in riot-compiler
Affected versions of `riot-compiler` are susceptible to a regular expression denial of service vulnerability. ## Recommendation Update to version 2.3.22 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'riot-compiler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10527'}, {'type': 'WEB', 'url': 'https://github.com/riot/compiler/issues/46'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pp4v-55vr-9gxh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/86'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:41Z', 'nvd_published_at': None}
1.4.0
GHSA-hw4r-xr38-hm8j
2021-01-08T18:39:28Z
2019-02-18T23:47:59Z
null
['CVE-2016-10610']
Downloads Resources over HTTP in unicode-json
Affected versions of `unicode-json` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Install version 2.0.0 or greater.
[]
[{'package': {'ecosystem': 'npm', 'name': 'unicode-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10610'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hw4r-xr38-hm8j'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/206'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:11Z', 'nvd_published_at': None}
1.4.0
GHSA-h4mc-r4f4-hcf4
2022-08-03T21:15:02Z
2019-02-18T23:34:37Z
null
['CVE-2016-10589']
selenium-binaries downloads resources over HTTP
Versions of `selenium-binaries` prior to 0.15.0 insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-binaries`. ## Recommendation A fix for this vulnerability is available on the `master` branch of the repository as part of version 0.15.0. Another mitigation currently available is to use an alternate package, such as [selenium-webdriver](https://www.npmjs.com/package/selenium-webdriver), the official selenium bindings for node.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'selenium-binaries'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10589'}, {'type': 'WEB', 'url': 'https://github.com/spunjs/selenium-binaries/pull/33'}, {'type': 'WEB', 'url': 'https://github.com/spunjs/selenium-binaries/commit/be37e82a3c43a4f1679d66cf9467085ec9994c47'}, {'type': 'PACKAGE', 'url': 'https://github.com/spunjs/selenium-binaries'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-npm-selenium-binaries/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/175'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:48Z', 'nvd_published_at': None}
1.4.0
GHSA-2r5h-gh4x-8hp9
2020-08-31T18:11:21Z
2019-02-18T23:40:14Z
null
['CVE-2016-10552']
Resources Downloaded over Insecure Protocol in igniteui
Affected versions of `igniteui` download Javascript and CSS resources over an unencrypted HTTP connection. An attacker with a privileged network position can intercept and view or modify any content sent or recieved over an unencrypted HTTP connection. ## Recommendation The `igniteui` package has been deprecated by the package author and now exists under [`ignite-ui`](https://preview.npmjs.com/package/ignite-ui), which should be used in place of this package.
[]
[{'package': {'ecosystem': 'npm', 'name': 'igniteui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10552'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2r5h-gh4x-8hp9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/116'}]
{'cwe_ids': ['CWE-311'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:53Z', 'nvd_published_at': None}
1.4.0
GHSA-r36x-p5pv-9mfx
2023-09-12T18:32:15Z
2019-02-18T23:45:25Z
null
['CVE-2016-10652']
prebuild-lwip downloads Resources over HTTP
Affected versions of `prebuild-lwip` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'prebuild-lwip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10652'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r36x-p5pv-9mfx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/248'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:29Z', 'nvd_published_at': None}
1.4.0
GHSA-9v3m-8fp8-mj99
2023-08-25T23:40:57Z
2019-02-22T20:54:47Z
null
['CVE-2019-8331']
Bootstrap Vulnerable to Cross-Site Scripting
Versions of `bootstrap` prior to 3.4.1 for 3.x and 4.3.1 for 4.x are vulnerable to Cross-Site Scripting (XSS). The `data-template` attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript. ## Recommendation For `bootstrap` 4.x upgrade to 4.3.1 or later. For `bootstrap` 3.x upgrade to 3.4.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'bootstrap-sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Bootstrap.Less'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'bootstrap.sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap-sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8331'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/28236'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3024'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2019-8331.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/releases/tag/v3.4.1'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/releases/tag/v4.3.1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/18'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K24383845'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K24383845?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227083900/http://www.securityfocus.com/bid/107375'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-14'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/10'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/13'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:39Z', 'nvd_published_at': '2019-02-20T16:29:00Z'}
1.4.0
GHSA-jfgq-g48x-jq83
2021-01-08T18:35:18Z
2019-02-18T23:54:20Z
null
['CVE-2016-10562']
Downloads Resources over HTTP in iedriver
Affected versions of `iedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `iedriver`. ## Recommendation Update to iedriver version 3.0.0 or greater.
[]
[{'package': {'ecosystem': 'npm', 'name': 'iedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10562'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfgq-g48x-jq83'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/174'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:16Z', 'nvd_published_at': None}
1.4.0
GHSA-hc94-2wfr-4pwf
2023-09-12T18:47:00Z
2019-02-18T23:40:19Z
null
['CVE-2016-10557']
appium-chromedriver downloads Resources over HTTP
Affected versions of `appium-chromedriver` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read items send over HTTP at will. In this case, that includes the chromedriver binary, which may result in remote code execution if overwritten with a malicious binary. ## Recommendation Update to version 2.9.4 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'appium-chromedriver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10557'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hc94-2wfr-4pwf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/162'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:54Z', 'nvd_published_at': None}
1.4.0
GHSA-vcph-57hv-89c4
2021-01-08T01:57:33Z
2019-02-18T23:42:11Z
null
['CVE-2016-10678']
Downloads Resources over HTTP in serc.js
Affected versions of `serc.js` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `serc.js`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'serc.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10678'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vcph-57hv-89c4'}, {'type': 'WEB', 'url': 'https://github.com/nowk/serc.js/blob/master/scripts/install.js#L5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/277'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:22Z', 'nvd_published_at': None}
1.4.0
GHSA-4v2c-g2xc-47fv
2021-01-08T19:53:43Z
2019-02-18T23:54:38Z
null
['CVE-2016-10682']
Downloads Resources over HTTP in massif
Affected versions of `massif` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `massif`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'massif'}, 'versions': ['0.0.1-1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10682'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4v2c-g2xc-47fv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/290'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:10Z', 'nvd_published_at': None}
1.4.0
GHSA-722q-3g9x-vp8q
2021-01-08T19:18:41Z
2019-02-18T23:54:41Z
null
['CVE-2016-10666']
Downloads Resources over HTTP in tomita-parser
Affected versions of `tomita-parser` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita-parser`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'tomita-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10666'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-722q-3g9x-vp8q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/261'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:50Z', 'nvd_published_at': None}
1.4.0
GHSA-mgr2-3mpv-43gc
2021-09-16T20:55:30Z
2019-02-18T23:47:37Z
null
['CVE-2016-10616']
Downloads Resources over HTTP in openframe-image
Affected versions of `openframe-image` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'openframe-image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10616'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenframeProject/Openframe-Image'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mgr2-3mpv-43gc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/218'}]
{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:06Z', 'nvd_published_at': None}
1.4.0
GHSA-w9mf-24h3-9wxf
2021-01-08T01:56:52Z
2019-02-18T23:41:58Z
null
['CVE-2016-10689']
Downloads Resources over HTTP in windows-iedriver
Affected versions of `windows-iedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-iedriver`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'windows-iedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.48.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10689'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w9mf-24h3-9wxf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/293'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:00Z', 'nvd_published_at': None}
1.4.0
GHSA-gc6c-5v9w-xmhw
2021-01-08T18:48:13Z
2019-02-18T23:51:27Z
null
['CVE-2016-10580']
Downloads Resources over HTTP in nodewebkit
Affected versions of `nodewebkit` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodewebkit`. ## Recommendation No patch is currently available, and the package author has deprecated this package. The best path forward in mitigating this vulnerability is to use the [official installer](https://www.npmjs.com/nw) instead of this package, as per the package author's instructions.
[]
[{'package': {'ecosystem': 'npm', 'name': 'nodewebkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10580'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gc6c-5v9w-xmhw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/173'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:46Z', 'nvd_published_at': None}
1.4.0
GHSA-4pf7-579w-f4gm
2023-09-07T20:13:05Z
2019-02-18T23:57:04Z
null
['CVE-2016-10633']
dwebp-bin downloads Resources over HTTP
Affected versions of `dwebp-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dwebp-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'dwebp-bin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10633'}, {'type': 'PACKAGE', 'url': 'https://github.com/1000ch/dwebp-bin'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4pf7-579w-f4gm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/232'}]
{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:42Z', 'nvd_published_at': None}
1.4.0
GHSA-qjf4-7642-c57p
2021-01-08T21:18:41Z
2019-02-18T23:51:52Z
null
['CVE-2016-10578']
Downloads Resources over HTTP in unicode
Affected versions of `unicode` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 9.0.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'unicode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10578'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qjf4-7642-c57p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/161'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:12Z', 'nvd_published_at': None}
1.4.0
GHSA-97gv-3p2c-xw7j
2022-02-11T17:08:46Z
2019-02-18T23:39:06Z
null
['CVE-2016-10524']
Denial of Service and Content Injection in i18n-node-angular
Versions of `i18n-node-angular` prior to 1.4.0 are affected by denial of service and cross-site scripting vulnerabilities. The vulnerabilities exist in a REST endpoint that was created for development purposes, but was not disabled in production in affected versions. ## Recommendation Update to version 1.4.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'i18n-node-angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10524'}, {'type': 'WEB', 'url': 'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-97gv-3p2c-xw7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/oliversalzburg/i18n-node-angular'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/80'}]
{'cwe_ids': ['CWE-400', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:47Z', 'nvd_published_at': '2018-05-31T20:29:00Z'}
1.4.0
GHSA-g3r2-65gc-qpqc
2021-01-08T18:50:02Z
2019-02-18T23:38:45Z
null
['CVE-2016-10523']
Denial of Service in mqtt-packet
Versions of `mqtt-packet` prior to 3.4.6, or 4.x prior to 4.0.5 are affected by a denial of service vulnerability wherein specific sequences of MQTT packets can crash the application. ## Recommendation Version 3.x: Update to version 3.4.6 or later. Version 4.x: Update to version 4.0.5 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10523'}, {'type': 'WEB', 'url': 'https://github.com/mcollina/mosca/issues/393'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/mqtt-packet/pull/8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g3r2-65gc-qpqc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/75'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:00Z', 'nvd_published_at': None}
1.4.0
GHSA-m2w9-rm58-mhm9
2021-01-08T18:32:04Z
2019-02-18T23:47:06Z
null
['CVE-2016-10640']
Downloads Resources over HTTP in node-thulac
Affected versions of `node-thulac` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-thulac`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-thulac'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10640'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m2w9-rm58-mhm9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/236'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:38Z', 'nvd_published_at': None}
1.4.0
GHSA-7c9w-qmrq-ff8r
2020-08-31T18:35:12Z
2019-02-07T18:14:21Z
null
['CVE-2018-16479']
Path Traversal in http-live-simulator
Versions of `http-live-simulator` prior to 1.0.7 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. For example: `curl --path-as-is http://localhost:8080//../../../../etc/passwd`. ## Recommendation Upgrade to version 1.0.7
[]
[{'package': {'ecosystem': 'npm', 'name': 'http-live-simulator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16479'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/411405'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7c9w-qmrq-ff8r'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/486.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/772'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:23Z', 'nvd_published_at': None}
1.4.0
GHSA-7xvg-m3vx-2hhv
2021-01-08T19:13:15Z
2019-02-18T23:50:26Z
null
['CVE-2016-10600']
Downloads Resources over HTTP in webrtc-native
Affected versions of `webrtc-native` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webrtc-native`. ## Recommendation No direct patch is currently available for this vulnerability. However, if the native components of `webrtc-native` are built from source, this avoids download the precompiled binary, therefore mitigating the insecure download. The package author has provided instructions for building from source [here](https://github.com/vmolsa/webrtc-native/wiki/Getting-started#building-from-source).
[]
[{'package': {'ecosystem': 'npm', 'name': 'webrtc-native'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10600'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7xvg-m3vx-2hhv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/176'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:47Z', 'nvd_published_at': None}
1.4.0
GHSA-wj36-v8j4-pc7c
2022-09-14T22:42:42Z
2019-02-07T18:16:03Z
null
['CVE-2018-16483']
Authentication Bypass by Spoofing in express-cart
A deficiency in the access control in module express-cart <=1.1.5 allows unprivileged users to add new users to the application as administrators.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16483'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/343626'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wj36-v8j4-pc7c'}]
{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:40Z', 'nvd_published_at': None}
1.4.0
GHSA-mg8r-9g6j-hwv9
2021-09-15T18:58:17Z
2019-02-18T23:39:00Z
null
['CVE-2016-10525']
Authentication Bypass in hapi-auth-jwt2
Versions of `hapi-auth-jwt2` prior to version 5.1.2 are affected by a complete authentication bypass vulnerability when in the `try` authentication mode. ## Recommendation Update to version 5.1.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hapi-auth-jwt2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.1'}, {'fixed': '5.1.2'}]}], 'versions': ['5.1.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10525'}, {'type': 'WEB', 'url': 'https://github.com/dwyl/hapi-auth-jwt2/issues/111'}, {'type': 'WEB', 'url': 'https://github.com/dwyl/hapi-auth-jwt2/pull/112'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mg8r-9g6j-hwv9'}, {'type': 'PACKAGE', 'url': 'https://github.com/dwyl/hapi-auth-jwt2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/81'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:04Z', 'nvd_published_at': None}
1.4.0
GHSA-gmxv-xf2q-6j8m
2023-09-13T19:48:12Z
2019-02-07T18:16:16Z
null
['CVE-2018-16484']
Cross-Site Scripting in m-server
Versions of `m-server` before 1.4.2 are vulnerable to stored cross-site scripting. This vulnerability is exploitable if an attacker is able to control the name of a file that `m-server` is serving. ## Recommendation Update to version 1.4.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'm-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16484'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319794'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gmxv-xf2q-6j8m'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/467.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/729'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:41Z', 'nvd_published_at': None}
1.4.0
GHSA-xj6f-x7jm-85ff
2023-09-11T18:33:13Z
2019-02-18T23:41:54Z
null
['CVE-2016-10690']
openframe-ascii-image downloads Resources over HTTP
Affected versions of `openframe-ascii-image` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-ascii-image`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'openframe-ascii-image'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10690'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xj6f-x7jm-85ff'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/298'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:37Z', 'nvd_published_at': None}
1.4.0
GHSA-v5v3-8jqf-vg27
2021-01-08T01:57:37Z
2019-02-18T23:54:22Z
null
['CVE-2016-10558']
Downloads Resources over HTTP in aerospike
Affected versions of `aerospike` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `aerospike`. ## Recommendation Update to version 2.4.2 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'aerospike'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10558'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v5v3-8jqf-vg27'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/167'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:51Z', 'nvd_published_at': None}
1.4.0
GHSA-6v7p-j23v-4xmw
2023-09-12T20:31:02Z
2019-02-18T23:48:03Z
null
['CVE-2016-10608']
robot-js downloads Resources over HTTP
Affected versions of `robot-js` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `robot-js`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'robot-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10608'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6v7p-j23v-4xmw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/201'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:15Z', 'nvd_published_at': None}
1.4.0
GHSA-5w4p-h4gm-3w26
2021-01-08T19:47:58Z
2019-02-18T23:50:53Z
null
['CVE-2016-10592']
Downloads Resources over HTTP in jser-stat
Affected versions of `jser-stat` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jser-stat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10592'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5w4p-h4gm-3w26'}, {'type': 'WEB', 'url': 'https://github.com/jser/stat-js/blob/master/data/url-mapping.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/188'}]
{'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:26Z', 'nvd_published_at': None}
1.4.0
GHSA-vqmr-957g-r7w3
2023-09-07T00:06:15Z
2019-02-12T15:36:39Z
null
['CVE-2017-18355']
Rendertron discloses absolute paths of files
Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18355'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vqmr-957g-r7w3'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:12Z', 'nvd_published_at': None}
1.4.0
GHSA-2hpj-g53m-9gj6
2023-09-08T20:52:07Z
2019-02-18T23:58:03Z
null
['CVE-2016-10583']
closure-util downloads Resources over HTTP
Affected versions of `closure-util` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closure-util`. ## Recommendation To mitigate this issue: 1. Install the package using npm's `--ignore-scripts` flag. 2. Navigate to the package directory, and open `default-config.json` in a text editor 3. Change the download URLs in the `compiler_url` and `library_url` to `https` equivalents 4. run `npm i` in the package directory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'closure-util'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0-beta.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10583'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2hpj-g53m-9gj6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/165'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:08Z', 'nvd_published_at': None}
1.4.0
GHSA-59m2-j944-839w
2023-09-07T20:12:38Z
2019-02-18T23:45:13Z
null
['CVE-2016-10655']
clang-extra downloads Resources over HTTP
Affected versions of `clang-extra` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `clang-extra`. ## Recommendation No patch is currently available for this vulnerability. The package author stated that no patch is possible until llvm provides HTTPS support, and a patch would be possible if that ever happened in the future. The best mitigation option is to reduce the risk of exploitation as much as possible. This can be done by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'clang-extra'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10655'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-59m2-j944-839w'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/265'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:22Z', 'nvd_published_at': None}
1.4.0
GHSA-735c-r4vc-6gm9
2021-09-16T20:41:21Z
2019-02-18T23:56:45Z
null
['CVE-2016-10613']
Downloads Resources over HTTP in bionode-sra
Affected versions of `bionode-sra` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. The author of this package has suggested using [urllib-sync](https://www.npmjs.com/package/urllib-sync). Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'bionode-sra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10613'}, {'type': 'PACKAGE', 'url': 'https://github.com/bionode/bionode-sra'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/211'}]
{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:02Z', 'nvd_published_at': None}
1.4.0
GHSA-f757-9c4x-chff
2023-09-13T22:48:59Z
2019-02-18T23:54:44Z
null
['CVE-2016-10659']
poco downloads Resources over HTTP
Affected versions of `poco` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `poco`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'poco'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10659'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f757-9c4x-chff'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/271'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:54Z', 'nvd_published_at': None}
1.4.0
GHSA-2wrq-wmqf-8vcc
2020-08-31T18:14:19Z
2019-02-18T23:35:48Z
null
['CVE-2016-10565']
Downloads Resources over HTTP in operadriver
operadriver is a Opera Driver for Selenium. operadriver versions below 0.2.3 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. ## Recommendation Update to version 0.2.3 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'operadriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10565'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2wrq-wmqf-8vcc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/196'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:10Z', 'nvd_published_at': None}
1.4.0
GHSA-45j8-pm75-5v8x
2020-08-31T18:42:22Z
2019-02-07T18:18:04Z
null
['CVE-2018-16493']
Path Traversal in simplehttpserver
Versions of `simplehttpserver` prior to 0.2.1 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. ## Recommendation Upgrade to version 0.2.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'static-resource-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16493'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/357109'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/432600'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-45j8-pm75-5v8x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/967'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/968'}]
{'cwe_ids': ['CWE-548'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:24Z', 'nvd_published_at': None}
1.4.0
GHSA-jh5w-6964-x5cf
2020-08-31T18:12:58Z
2019-02-18T23:58:05Z
null
['CVE-2016-10579']
Downloads Resources over HTTP in chromedriver
Affected versions of `chromedriver` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This may result in arbitrary code execution if an attacker intercepts and modifies the downloaded binary file, replacing it with a malicious one. ## Recommendation Update to version 2.26.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'chromedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.26.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10579'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jh5w-6964-x5cf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/160'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:26Z', 'nvd_published_at': None}
1.4.0
GHSA-7r8m-45gc-m2c8
2021-01-08T19:14:34Z
2019-02-18T23:52:14Z
null
['CVE-2016-10572']
Downloads Resources over HTTP in mongodb-instance
Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mongodb-instance`. ## Recommendation Update to version 0.0.3 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'mongodb-instance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572'}, {'type': 'WEB', 'url': 'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7r8m-45gc-m2c8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/235'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:26Z', 'nvd_published_at': None}
1.4.0
GHSA-hv96-xxx2-5v7w
2021-06-10T23:26:24Z
2019-02-18T23:51:04Z
null
['CVE-2016-10588']
Downloads Resources over HTTP in nw
Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`. ## Recommendation Update to version 0.23.6-1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nw'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.6-1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.23.6-sdk'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10588'}, {'type': 'WEB', 'url': 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hv96-xxx2-5v7w'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/166'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:58Z', 'nvd_published_at': None}
1.4.0
GHSA-f5mh-hq6h-whxv
2021-01-08T21:04:46Z
2019-02-18T23:38:29Z
null
['CVE-2016-10561']
Directory Traversal in bitty
Affected versions of `bitty` are vulnerable to directory traversal via the URL path in GET requests. ## Recommendation The `bitty` package is not currently maintained, and has not seen an update since 2015. At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality, such as [serve](https://www.npmjs.com/package/serve).
[]
[{'package': {'ecosystem': 'npm', 'name': 'bitty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10561'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f5mh-hq6h-whxv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/150'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:49Z', 'nvd_published_at': None}
1.4.0
GHSA-747p-jfqv-f43r
2021-06-11T14:04:48Z
2019-02-18T23:47:26Z
null
['CVE-2016-10626']
Downloads Resources over HTTP in mystem3
Affected versions of `mystem3` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem3`. ## Recommendation Update to version 1.0.8 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mystem3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10626'}, {'type': 'WEB', 'url': 'https://github.com/koorchik/node-mystem3/commit/4bd31c0e0110afc327c414d7ebfc2ffe738cbad2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-747p-jfqv-f43r'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/229'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:20Z', 'nvd_published_at': None}
1.4.0
GHSA-mq7g-6rv4-pj95
2021-01-08T18:26:10Z
2019-02-18T23:35:23Z
null
['CVE-2016-10569']
Downloads Resources over HTTP in embedza
Affected versions of `embedza` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `embedza`. ## Recommendation Update to version 1.2.4 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'embedza'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10569'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mq7g-6rv4-pj95'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/187'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:57Z', 'nvd_published_at': None}
1.4.0
GHSA-xg5r-8j97-2wrj
2020-08-31T18:10:25Z
2019-02-18T23:39:22Z
null
['CVE-2016-10528']
Directory Traversal in restafary
Affected versions of `restafary` are susceptible to a directory traversal vulnerability when a root path is specified in the configuration. Proof of Concept ``` curl -i -s -k -X 'GET' -H 'Authorization: Basic YWRtaW46cGFzc3dvcmQ=' 'http://localhost:8000/api/v1/fs/..%2f..%2fetc/passwd' ``` ## Recommendation Update to version 1.6.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'restafary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10528'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xg5r-8j97-2wrj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/89'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:10Z', 'nvd_published_at': None}
1.4.0
GHSA-5pq8-2q24-mj3p
2021-01-08T19:48:52Z
2019-02-18T23:45:03Z
null
['CVE-2016-10660']
Downloads Resources over HTTP in fis-parser-sass-bin
Affected versions of `fis-parser-sass-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-parser-sass-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'fis-parser-sass-bin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10660'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5pq8-2q24-mj3p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/269'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:56Z', 'nvd_published_at': None}
1.4.0
GHSA-h466-j336-74wx
2023-09-07T18:22:30Z
2019-02-07T18:17:26Z
null
['CVE-2018-16490']
Prototype Pollution in mpath
Versions of `mpath` before 0.5.1 are vulnerable to prototype pollution. Provided certain input `mpath` can add or modify properties of the `Object` prototype. These properties will be present on all objects. ## Recommendation Update to version `0.5.1` or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mpath'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16490'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390860'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h466-j336-74wx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/779'}]
{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:42Z', 'nvd_published_at': None}
1.4.0
GHSA-g2pf-qjgf-6fw3
2021-09-16T20:41:43Z
2019-02-18T23:33:42Z
null
['CVE-2016-10607']
Downloads Resources over HTTP in openframe-glslviewer
Affected versions of `openframe-glslviewer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-glslviewer`. ## Recommendation No patch is currently available for this vulnerability, and the package hasn't been updated since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'openframe-glslviewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10607'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenframeProject/Openframe-glslViewer'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g2pf-qjgf-6fw3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/208'}]
{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:55Z', 'nvd_published_at': None}
1.4.0
GHSA-x56r-5r34-qg74
2023-09-11T18:32:24Z
2019-02-18T23:47:47Z
null
['CVE-2016-10612']
dalek-browser-ie-canary downloads Resources over HTTP
Affected versions of `dalek-browser-ie-canary` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie-canary`. ## Recommendation No patch is currently available for this vulnerability, and the package author has marked the package as deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'dalek-browser-ie-canary'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4-2014-04-04-12-11-49'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10612'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x56r-5r34-qg74'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/205'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:09Z', 'nvd_published_at': None}
1.4.0
GHSA-q43m-ffwr-rpcc
2021-01-08T18:18:07Z
2019-02-18T23:58:24Z
null
['CVE-2016-10534']
SSL Validation Defaults to False in electron-packager
Affected versions of `electron-packager` configure the generated application to disable SSL certificate verification by default. This could allow an attacker with a privileged network position to launch a Man In The Middle (MITM) attack on the install process, intercepting the step where electron-packager downloads Electron for supported target platforms and architectures, and replacing the valid download with a tampered malicious one. This only affects users using the electron-packager CLI. The strict-ssl option defaults to true for the node.js API. ## Recommendation 1. Update to version 7.0.0 or later. 2. Delete the `electron-download` cache folder, which is by default located at `~/.electron`.
[]
[{'package': {'ecosystem': 'npm', 'name': 'electron-packager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.1'}, {'fixed': '7.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10534'}, {'type': 'WEB', 'url': 'https://github.com/electron-userland/electron-packager/issues/333'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q43m-ffwr-rpcc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/104'}]
{'cwe_ids': ['CWE-295'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:47Z', 'nvd_published_at': None}
1.4.0
GHSA-9jf3-f2pg-7868
2023-09-11T21:50:14Z
2019-02-18T23:57:01Z
null
['CVE-2016-10629']
nw-with-arm downloads Resources over HTTP
Affected versions of `nw-with-arm` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw-with-arm`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nw-with-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10629'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9jf3-f2pg-7868'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/226'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:54Z', 'nvd_published_at': None}
1.4.0
GHSA-7p6h-3fmw-539q
2023-09-11T18:11:23Z
2019-02-18T23:47:27Z
null
['CVE-2016-10624']
selenium-chromedriver Downloads Resources over HTTP
Affected versions of `selenium-chromedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-chromedriver`. ## Recommendation No patch is currently available for this vulnerability, and the author has marked the package as deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'selenium-chromedriver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10624'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7p6h-3fmw-539q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/222'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:02Z', 'nvd_published_at': None}
1.4.0
GHSA-qx9m-27wh-7fjg
2021-01-08T01:58:11Z
2019-02-18T23:57:03Z
null
['CVE-2016-10631']
Downloads Resources over HTTP in jvminstall
Affected versions of `jvminstall` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jvminstall`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jvminstall'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10631'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qx9m-27wh-7fjg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/225'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:11Z', 'nvd_published_at': None}
1.4.0
GHSA-h7pc-85cg-wmch
2021-01-08T18:42:35Z
2019-02-18T23:35:10Z
null
['CVE-2016-10575']
Downloads Resources over HTTP in kindlegen
Affected versions of `kindlegen` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `kindlegen`. ## Recommendation Update to version 1.1.0 or greater.
[]
[{'package': {'ecosystem': 'npm', 'name': 'kindlegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10575'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h7pc-85cg-wmch'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/251'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:25Z', 'nvd_published_at': None}
1.4.0
GHSA-mq76-m7gv-xhfm
2023-09-07T20:37:17Z
2019-02-18T23:34:00Z
null
['CVE-2016-10599']
sauce-connect downloads Resources over HTTP
Affected versions of `sauce-connect` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `sauce-connect`. ## Recommendation No patch is currently available for this vulnerability, and this package has not been updated since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sauce-connect'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10599'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mq76-m7gv-xhfm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/186'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:55Z', 'nvd_published_at': None}
1.4.0
GHSA-9c2p-jw8p-f84v
2023-09-11T21:48:29Z
2019-02-18T23:54:24Z
null
['CVE-2016-10556']
SQL Injection in sequelize
Affected versions of `sequelize` cast arrays to strings and fail to properly escape the resulting SQL statement, resulting in a SQL injection vulnerability. ## Proof of Concept In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped. Example Query: ``` database.query('SELECT * FROM TestTable WHERE Name IN (:names)', { replacements: { names: directCopyOfUserInput } }); ``` If the user inputs the value of `:names` as: ``` ["test", "'); DELETE TestTable WHERE Id = 1 --')"] ``` The resulting SQL statement will be: ```sql SELECT Id FROM Table WHERE Name IN ('test', '\'); DELETE TestTable WHERE Id = 1 --') ``` As the backslash has no special meaning in PostgreSQL, MSSQL, or SQLite, the statement will delete the record in TestTable with an Id of 1. ## Recommendation Update to version 3.20.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.20.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.19.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10556'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/5671'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/23952a2b020cc3571f090e67dae7feb084e1be71'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commits/v3.20.0?after=62e4dacb28a779a190a3e042b971dcd8c7926e49+34&branch=v3.20.0&qualified_name=refs%2Ftags%2Fv3.20.0'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:12Z', 'nvd_published_at': None}
1.4.0
GHSA-cvx3-pqmj-x57x
2023-09-05T23:25:04Z
2019-02-18T23:47:13Z
null
['CVE-2016-10634']
scalajs-standalone-bin Downloads Resources over HTTP
Affected versions of `scalajs-standalone-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scalajs-standalone-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'scalajs-standalone-bin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10634'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cvx3-pqmj-x57x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/231'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:59Z', 'nvd_published_at': None}
1.4.0
GHSA-5qfv-rr79-chx5
2022-11-17T18:22:53Z
2019-08-27T17:37:33Z
null
['CVE-2019-15488']
Cross-site Scripting in Ignite Realtime Openfire
Ignite Realtime Openfire before 4.4.1 has reflected XSS via an LDAP setup test.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:xmppserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15488'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/pull/1441'}, {'type': 'PACKAGE', 'url': 'https://github.com/igniterealtime/Openfire'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/compare/cd0a573...5e5d9e5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T16:49:15Z', 'nvd_published_at': '2019-08-23T13:15:00Z'}
1.4.0
GHSA-f5f4-m7qp-w6gc
2023-09-11T20:37:33Z
2019-08-27T17:40:33Z
null
['CVE-2019-15477']
Cross-site Scripting in Jooby
Jooby before 1.6.4 has XSS via the default error handler.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jooby:jooby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15477'}, {'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/pull/1368'}, {'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/commit/34856a738829d8fedca4ed27bd6ff413af87186f'}, {'type': 'PACKAGE', 'url': 'https://github.com/jooby-project/jooby'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:11:57Z', 'nvd_published_at': '2019-08-23T13:15:00Z'}
1.4.0
GHSA-3gm7-v7vw-866c
2021-03-31T21:07:31Z
2019-08-01T19:17:35Z
null
['CVE-2019-0193']
XML External Entity (XXE) Injection in Apache Solr
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0193'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-13669'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a76d4b4ded9c@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/42cc4d334ba33905b872a0aa00d6a481391951c8b1450f01b077ce74@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/55880d48e38ba9e8c41a3b9e41051dbfdef63b86b0cfeb32967edf03@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7143983363f0ba463475be4a8b775077070a08dbf075449b7beb51ee@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9b0e7a7e3e18d0724f511403b364fc082ff56e3134d84cfece1c82fc@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a6e3c09dba52b86d3a1273f82425973e1b0623c415d0e4f121d89eab@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85f735fad06a0fb46e74b7e6e9ce7ded20b59637cd9f993310f814d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33aed7ad4ee9833c4190a44e2b106efd2deb19504b85e012175540f6@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb34d820c21f1708c351f9035d6bc7daf80bfb6ef99b34f7af1d2f699@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00025.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T19:07:49Z', 'nvd_published_at': '2019-08-01T14:15:00Z'}
1.4.0
GHSA-66rh-8fw6-59q6
2022-08-03T16:21:27Z
2019-08-21T16:15:13Z
null
['CVE-2019-10745']
assign-deep Vulnerable to Prototype Pollution
Versions of `assign-deep` prior to 1.0.1 and 0.4.8 are vulnerable to Prototype Pollution. The `assign` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation Upgrade to versions 1.0.1, 0.4.8, or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'assign-deep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'assign-deep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10745'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/assign-deep/commit/8e3cc4a34246733672c71e96532105384937e56c'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/assign-deep/commit/90bf1c551d05940898168d04066bbf15060f50cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/jonschlinkert/assign-deep'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1014'}]
{'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T15:53:43Z', 'nvd_published_at': '2019-08-20T19:15:00Z'}
1.4.0
GHSA-cwqq-w8c3-r2jw
2021-08-17T21:57:17Z
2019-08-23T00:04:56Z
null
['CVE-2019-14262']
Uncontrolled Resource Consumption in MetadataExtractor
MetadataExtractor 2.1.0 allows stack consumption.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'MetadataExtractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14262'}, {'type': 'WEB', 'url': 'https://github.com/drewnoakes/metadata-extractor-dotnet/pull/190'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T15:04:25Z', 'nvd_published_at': '2019-07-25T05:15:00Z'}
1.4.0
GHSA-rch7-f4h5-x9rj
2021-08-17T21:32:42Z
2019-08-23T00:04:52Z
null
[]
Identity Spoofing in libp2p-secio
Affected versions of `libp2p-secio` does not correctly verify that the `PeerId` of `DstPeer` matches the `PeerId` discovered in the crypto handshake, resulting in a high severity identity spoofing vulnerability. ## Recommendation Update to version 0.9.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'libp2p-secio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/libp2p/js-libp2p-secio/pull/95'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:libp2p-secio:20180115'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/558'}]
{'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T14:56:33Z', 'nvd_published_at': None}
1.4.0
GHSA-v9qg-3j8p-r63v
2021-05-10T18:17:48Z
2019-08-06T01:43:31Z
null
['CVE-2019-14235']
Uncontrolled Recursion in Django
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14235'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Aug/15'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4498'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}]
{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:34:47Z', 'nvd_published_at': '2019-08-02T15:15:00Z'}
1.4.0
GHSA-mfwh-gqx8-c787
2021-05-05T22:58:08Z
2019-08-06T01:43:40Z
null
['CVE-2019-10088']
Allocation of Resources Without Limits or Throttling in Apache Tika
A carefully crafted or corrupt zip file can cause an OOM in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Users should upgrade to 1.22 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7'}, {'fixed': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10088'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1c63555609b737c20d1bbfa4a3e73ec488e3408a84e2f5e47e1b7e08@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:42:46Z', 'nvd_published_at': '2019-08-02T19:15:00Z'}
1.4.0
GHSA-6r97-cj55-9hrq
2021-08-17T20:41:46Z
2019-08-16T14:00:34Z
null
['CVE-2019-14234']
SQL Injection in Django
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14234'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/4f5b58f5cd3c57fee9972ab074f8dc6895d8f387'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/ed682a24fca774818542757651bfba576c3fc3ef'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/f74b3ae3628c26e1b4f8db3d13a91d52a833a975'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-09T15:26:25Z', 'nvd_published_at': '2019-08-09T13:15:00Z'}
1.4.0
GHSA-4q98-wr72-h35w
2021-08-17T22:16:39Z
2019-08-27T17:41:33Z
null
['CVE-2019-12400']
Improper input validation in Apache Santuario XML Security for Java
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.santuario:xmlsec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.3'}, {'fixed': '2.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12400'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8e814b925bf580bc527d96ff51e72ffe5bdeaa4b8bf5b89498cab24c@%3Cdev.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/edaa7edb9c58e5f5bd0c950f2b6232b62b15f5c44ad803e8728308ce@%3Cdev.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r107bffb06a5e27457fe9af7dfe3a233d0d36c6c2f5122f117eb7f626@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcdc0da94fe21b26493eae47ca987a290bdf90c721a7a42491fdd41d4@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf82be0a7c98cd3545e20817bb96ed05551ea0020acbaf9a469fef402@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf958cea96236de8829940109ae07e870aa3d59235345421e4924ff03@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190910-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:17:13Z', 'nvd_published_at': '2019-08-23T21:15:00Z'}
1.4.0
GHSA-4mq5-mj59-qq9c
2021-05-05T22:55:27Z
2019-08-06T01:43:38Z
null
['CVE-2019-10093']
Allocation of Resources Without Limits or Throttling in Apache Tika
In Apache Tika 1.19 to 1.21, a carefully crafted 2003ml or 2006ml file could consume all available SAXParsers in the pool and lead to very long hangs. Apache Tika users should upgrade to 1.22 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-parsers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19'}, {'fixed': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10093'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a5a44eff1b9eda3bc69d22943a1030c43d376380c75d3ab04d0c1a21@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:42:09Z', 'nvd_published_at': '2019-08-02T19:15:00Z'}
1.4.0
GHSA-65p8-3hm4-h9h8
2021-08-17T21:23:49Z
2019-08-23T00:04:48Z
null
[]
Denial of Service in rgb2hex
All versions of `rgb2hex` are vulnerable to Regular Expression Denial of Service (ReDoS) when an attacker can pass in a specially crafted invalid color value. ## Recommendation Update to version 0.1.6 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'rgb2hex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/319629'}, {'type': 'WEB', 'url': 'https://github.com/christian-bromann/rgb2hex/blob/v0.1.0/index.js#L25'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:rgb2hex:20180429'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/647'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T14:26:35Z', 'nvd_published_at': None}
1.4.0
GHSA-25pc-85qf-6j69
2021-08-17T20:24:21Z
2019-08-01T19:17:53Z
null
['CVE-2018-11779']
Deserialization of Untrusted Data in Apache Storm
In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-kafka-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11779'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3e4f704c4bd9296405a07a0290b8cbb6cbf5046e277efe6d93280a98@%3Cuser.storm.apache.org%3E'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T17:52:52Z', 'nvd_published_at': '2019-07-26T00:15:00Z'}
1.4.0
GHSA-6fpp-rgj9-8rwc
2023-09-13T17:18:23Z
2019-08-01T19:18:00Z
null
['CVE-2019-14379']
Deserialization of untrusted data in FasterXML jackson-databind
SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2, 2.8.11.4, and 2.7.9.6 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.9.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14379'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2387'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/ad418eeb974e357f2797aef64aa0e3ffaaa6125b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:2824'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2743'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3046'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3050'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3292'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3297'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3901'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.1...jackson-databind-2.9.9.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2766188be238a446a250ef76801037d452979152d85bce5e46805815@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/525bcf949a4b0da87a375cbad2680b8beccde749522f24c49befe7fb@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6788e4c991f75b89d290ad06b463fcd30bcae99fee610345a35b7bc6@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/689c6bcc6c7612eee71e453a115a4c8581e7b718537025d4b265783d@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/75f482fdc84abe6d0c8f438a76437c335a7bbeb5cddd4d70b4bc0cbf@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/859815b2e9f1575acbb2b260b73861c16ca49bca627fa0c46419051f@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8723b52c2544e6cb804bc8a36622c584acd1bd6c53f2b6034c9fea54@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/99944f86abefde389da9b4040ea2327c6aa0b53a2ff9352bd4cfec17@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d161ff3d59c5a8213400dd6afb1cce1fac4f687c32d1e0c0bfbfaa2d@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e25e734c315f70d8876a846926cfe3bfa1a4888044f146e844caf72f@%3Ccommits.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f17f63b0f8a57e4a5759e01d25cffc0548f0b61ff5c6bfd704ad2f2a@%3Ccommits.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00011.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190814-0001/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213189'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Mar/23'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T15:38:02Z', 'nvd_published_at': '2019-07-29T12:15:00Z'}
1.4.0
GHSA-gq9m-qvpx-68hc
2023-08-31T09:34:57Z
2019-08-21T16:15:24Z
null
['CVE-2019-14806']
Pallets Werkzeug Insufficient Entropy
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'werkzeug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14806'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/blob/7fef41b120327d3912fbe12fb64f1951496fcf3e/src/werkzeug/debug/__init__.py#L168'}, {'type': 'WEB', 'url': 'https://palletsprojects.com/blog/werkzeug-0-15-3-released/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00047.html'}]
{'cwe_ids': ['CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T16:01:59Z', 'nvd_published_at': '2019-08-09T15:15:00Z'}
1.4.0
GHSA-xc6x-cq47-9chw
2021-08-26T15:33:46Z
2019-08-16T14:03:35Z
null
['CVE-2019-1258']
Vulnerability in Azure Active Directory Authentication Library
An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens, aka 'Azure Active Directory Authentication Library Elevation of Privilege Vulnerability'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'microsoft.identitymodel.clients.activedirectory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1258'}, {'type': 'PACKAGE', 'url': 'https://github.com/AzureAD/azure-activedirectory-library-for-dotnet'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1258'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-15T15:29:27Z', 'nvd_published_at': None}
1.4.0
GHSA-w69w-jvc7-wjgv
2023-09-25T10:52:27Z
2019-08-01T19:18:16Z
null
['CVE-2019-10184']
Undertow Missing Authorization when requesting a protected directory without trailing slash
undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-servlet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10184'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/794'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/5fa7ac68c0e4251c93056d9982db5e794e04ebfa'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3046'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3050'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10184'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/UNDERTOW-1578'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0016/'}]
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T15:23:26Z', 'nvd_published_at': '2019-07-25T21:15:00Z'}
1.4.0
GHSA-65rm-h285-5cc5
2023-08-31T09:13:38Z
2019-08-16T14:02:35Z
null
['CVE-2019-12855']
Improper Certificate Validation in Twisted
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12855'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/pull/1147'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://twistedmatrix.com/trac/ticket/9561'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-12T15:06:23Z', 'nvd_published_at': '2019-06-16T12:29:00Z'}
1.4.0
GHSA-333g-rpr4-7hxq
2023-08-28T21:39:41Z
2019-08-20T14:29:03Z
null
['CVE-2019-15224']
rest-client Gem Contains Malicious Code
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Users of an affected version should consider downgrading to the last non-affected version of 1.6.9, or upgrading to 1.7.x. Additionally, a set of other minor gems have been partially or completely yanked and are included in this advisory. These include cron_parser, coin_base, blockchain_wallet, awesome-bot, doge-coin, capistrano-colors, bitcoin_vanity, lita_coin, coming-soon, and omniauth_amazon.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rest-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.10'}, {'fixed': '1.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.13'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'cron_parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.13'}, {'last_affected': '1.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cron_parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.1.4']}, {'package': {'ecosystem': 'RubyGems', 'name': 'coin_base'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'blockchain_wallet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'awesome-bot'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'doge-coin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'capistrano-colors'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'bitcoin_vanity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'coming-soon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'omniauth_amazon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15224'}, {'type': 'WEB', 'url': 'https://github.com/rest-client/rest-client/issues/713'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/wiki/Gems-yanked-and-accounts-locked#19-aug-2019'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/blockchain_wallet/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/coin_base/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doge-coin/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lita_coin/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth_amazon/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rest-client/CVE-2019-15224.yml'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-20T14:27:19Z', 'nvd_published_at': '2019-08-19T23:15:00Z'}
1.4.0
GHSA-8j4w-5fw4-rm27
2021-08-17T22:18:25Z
2019-08-27T17:45:33Z
null
['CVE-2019-10750']
Prototype Pollution in deeply
Versions of `deeply` prior to 1.0.1 are vulnerable to Prototype Pollution. The package fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation Upgrade to version 3.1.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'deeply'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10750'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DEEPLY-451026'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1030'}]
{'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:28:49Z', 'nvd_published_at': None}
1.4.0
GHSA-4p8f-mmfj-r45g
2023-08-25T20:28:23Z
2019-08-21T16:15:04Z
null
['CVE-2018-20975']
Cross-site scripting in fat_free_crm
Fat Free CRM before 0.18.1 has XSS in the `tags_helpe`r in `app/helpers/tags_helper.rb`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20975'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/compare/v0.17.3...v0.18.1'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.18.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fat_free_crm/CVE-2018-20975.yml'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T15:48:24Z', 'nvd_published_at': '2019-08-20T13:15:00Z'}
1.4.0
GHSA-xqh8-5j36-4556
2022-06-15T18:39:04Z
2019-08-26T16:59:45Z
null
['CVE-2019-15658']
SQL Injection in connect-pg-simple
### Impact An unlikely SQL injection if the case of an unsanitized table name input. ### Patches The user should upgrade to `6.0.1`. Due to its low impact a backport has not been made to the `5.x` branch. ### Workarounds If there is no likelihood that the `tableName` or `schemaName` options sent to the constructor could be of an unsanitized nature, then no workaround is needed. Else the input could be sanitized and escaped before sending it in. Take note though that such an escaping would need to be removed when upgrading to `6.0.1` or later, to avoid double escaping. ### References * [Security issue disclosure](https://github.com/voxpelli/node-connect-pg-simple/issues/151) ### For more information If you have any questions or comments about this advisory: * Open an issue in [voxpelli/node-connect-pg-simple](https://github.com/voxpelli/node-connect-pg-simple) * Email maintainer at [pelle@kodfabrik.se](mailto:pelle@kodfabrik.se)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'connect-pg-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/voxpelli/node-connect-pg-simple/security/advisories/GHSA-xqh8-5j36-4556'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15658'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqh8-5j36-4556'}, {'type': 'PACKAGE', 'url': 'https://github.com/voxpelli/node-connect-pg-simple'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONNECTPGSIMPLE-460154'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1153'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:11Z', 'nvd_published_at': None}
1.4.0
GHSA-jvpp-hxjj-5ccc
2021-08-17T20:27:34Z
2019-08-01T19:17:45Z
null
['CVE-2015-7559']
Improper Input Validation and Missing Authentication for Critical Function in Apache ActiveMQ
It was found that the Apache ActiveMQ client before 5.15.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.15.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7559'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7559'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-6470'}]
{'cwe_ids': ['CWE-20', 'CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T19:05:30Z', 'nvd_published_at': '2019-08-01T14:15:00Z'}
1.4.0
GHSA-fpqp-v323-44xv
2021-08-17T20:42:32Z
2019-08-16T14:01:35Z
null
['CVE-2019-12397']
Cross-site scripting in Apache Ranger
Policy import functionality in Apache Ranger 0.7.0 to 1.2.0 is vulnerable to a cross-site scripting issue. Upgrade to 2.0.0 or later version of Apache Ranger with the fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12397'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ab2de1adad96f5dbd19d976b28715dfc60dbe75e82a74f48be8ef695@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cbc6346708ef2b9ffb2555637311bf6294923c609c029389fa39de8f@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/08/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-09T15:38:43Z', 'nvd_published_at': '2019-08-08T18:15:00Z'}
1.4.0
GHSA-mm7m-xg4h-6m52
2021-05-05T22:59:41Z
2019-08-06T01:43:35Z
null
['CVE-2019-10094']
Allocation of Resources Without Limits or Throttling in Apache Tika
A carefully crafted package/compressed file that, when unzipped/uncompressed yields the same file (a quine), causes a StackOverflowError in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Apache Tika users should upgrade to 1.22 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7'}, {'fixed': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10094'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fe876a649d9d36525dd097fe87ff4dcb3b82bb0fbb3a3d71fb72ef61@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:41:24Z', 'nvd_published_at': '2019-08-02T19:15:00Z'}
1.4.0
GHSA-8cpw-73f2-w58m
2021-08-17T22:13:00Z
2019-08-27T17:38:33Z
null
['CVE-2019-15482']
Cross-Site Scripting in selectize-plugin-a11y
Versions of `selectize-plugin-a11y ` prior to 1.1.0 are vulnerable to Cross-Site Scripting. The `accessibility.liveRegion.speak` function does not sanitize the `msg` variable before rendering it as HTML. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 1.1.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'selectize-plugin-a11y'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15482'}, {'type': 'WEB', 'url': 'https://github.com/SLMNBJ/selectize-plugin-a11y/pull/9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1145'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/selectize-plugin-a11y/v/1.1.0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:01:49Z', 'nvd_published_at': None}
1.4.0
GHSA-c4qh-4vgv-qc6g
2023-09-05T13:07:51Z
2019-08-06T01:43:29Z
null
['CVE-2019-14232']
Django Denial-of-service in django.utils.text.Truncator
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If `django.utils.text.Truncator`'s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14232'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/django/PYSEC-2019-11.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Aug/15'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4498'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:34:33Z', 'nvd_published_at': None}
1.4.0
GHSA-hfmf-q43v-2ffj
2021-08-17T22:08:26Z
2019-08-23T21:42:18Z
null
['CVE-2019-9154']
Improper Key Verification in openpgp
Versions of `openpgp` prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The `openpgp` package does not verify whether a subpacket is hashed. Furthermore, due to the order of parsing a signature packet information from unhashed subpackets overwrites information from hashed subpackets. This may allow an attacker to modify the contents of a key certification signature or revocation signature. Doing so could convince a victim to use an obsolete key for encryption. An attack require a victim to import a manipulated key or update an existing key with a manipulated version. ## Recommendation Upgrade to version 4.2.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9154'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/797'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/47138eed61473e13ee8f05931119d3e10542c5e1'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460247'}, {'type': 'WEB', 'url': 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1161'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:41:08Z', 'nvd_published_at': None}
1.4.0
GHSA-qwqc-28w3-fww6
2021-08-17T22:06:12Z
2019-08-23T21:42:20Z
null
['CVE-2019-9153']
Message Signature Bypass in openpgp
Versions of `openpgp` prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type `text`. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as `standalone` or `timestamp`). For example, an attacker that captures a `standalone` signature packet from a victim can construct arbitrary signed messages that would be verified correctly. ## Recommendation Upgrade to version 4.2.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9153'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/816'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460248'}, {'type': 'WEB', 'url': 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1160'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:40:54Z', 'nvd_published_at': None}
1.4.0
GHSA-x65c-4fgj-5fc3
2021-08-17T21:58:07Z
2019-08-23T00:05:00Z
null
['CVE-2019-14653']
Cross-site Scripting in pandao
pandao Editor.md 1.5.0 allows XSS via an attribute of an ABBR or SUP element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'versions': ['1.5.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14653'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/715'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T15:07:56Z', 'nvd_published_at': '2019-08-03T14:15:00Z'}
1.4.0
GHSA-h5jv-4p7w-64jg
2023-09-05T13:10:54Z
2019-08-06T01:43:33Z
null
['CVE-2019-14233']
Django Denial-of-service in strip_tags()
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14233'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Aug/15'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4498'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:36:05Z', 'nvd_published_at': '2019-08-02T15:15:00Z'}
1.4.0
GHSA-77jf-fjjf-xcww
2021-07-27T21:15:18Z
2019-08-23T21:42:22Z
null
['CVE-2019-9155']
Invalid Curve Attack in openpgp
Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key. ## Recommendation Upgrade to version 4.3.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9155'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/853'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460225'}, {'type': 'WEB', 'url': 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1159'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}]
{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:39:35Z', 'nvd_published_at': '2019-08-22T16:15:00Z'}
1.4.0
GHSA-jp6r-xcjj-5h7r
2021-08-17T22:11:11Z
2019-08-27T17:36:32Z
null
['CVE-2019-15532']
Cross-Site Scripting in cyberchef
Versions of `cyberchef` prior to 8.31.3 are vulnerable to Cross-Site Scripting. In `Text Encoding Brute Force` the table rows are created by concatenating the `value` variable unsanitized in the HTML code. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 8.31.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'cyberchef'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.31.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15532'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/issues/539'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/issues/544'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/compare/v8.31.1...v8.31.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CYBERCHEF-460296'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1149'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T15:50:14Z', 'nvd_published_at': None}
1.4.0
GHSA-xjjg-vmw6-c2p9
2021-08-17T22:17:50Z
2019-08-27T17:44:33Z
null
['CVE-2019-10751']
Open Redirect in httpie
All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'httpie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10751'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107'}]
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:27:00Z', 'nvd_published_at': '2019-08-23T17:15:00Z'}
1.4.0
GHSA-vx6v-2rg6-865h
2023-04-20T21:51:43Z
2019-08-27T17:39:33Z
null
['CVE-2019-15486']
Cross-site Scripting in django-js-reverse
django-js-reverse (aka Django JS Reverse) before 0.9.1 has XSS via js_reverse_inline.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-js-reverse'}, 'ecosystem_specific': {'affected_functions': ['django_js_reverse.core.generate_js']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15486'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/pull/81'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/commit/78d6aff2276f2d341f643b095515f8aaba5e67c2'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/commit/a3b57d1e4424e2fadabcd526d170c4868d55159c'}, {'type': 'PACKAGE', 'url': 'https://github.com/ierror/django-js-reverse'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/compare/v0.9.0...v0.9.1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:04:03Z', 'nvd_published_at': '2019-08-23T13:15:00Z'}
1.4.0
GHSA-mr7p-25v2-35wr
2023-08-30T19:56:34Z
2019-08-23T21:53:51Z
null
['CVE-2019-14751']
NLTK Vulnerable To Path Traversal
NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a `../` (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nltk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14751'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/commit/f59d7ed8df2e0e957f7f247fe218032abdbe9a10'}, {'type': 'WEB', 'url': 'https://github.com/mssalvatore/CVE-2019-14751_PoC'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/blob/3.4.5/ChangeLog'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QI4IJGLZQ5S7C5LNRNROHAO2P526XE3D/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGZSSEJH7RHH3RBUEVWWYT75QU67J7SE/'}, {'type': 'WEB', 'url': 'https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00054.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00001.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:48:38Z', 'nvd_published_at': '2019-08-22T16:15:00Z'}
1.4.0
GHSA-3gx7-xhv7-5mx3
2021-08-31T21:04:30Z
2019-08-26T16:59:56Z
null
['CVE-2019-15657']
Arbitrary Code Execution in eslint-utils
Versions of `eslint-utils` >=1.2.0 or <1.4.1 are vulnerable to Arbitrary Code Execution. The `getStaticValue` does not properly sanitize user input allowing attackers to supply malicious input that executes arbitrary code during the linting process. The `getStringIfConstant` and `getPropertyName` functions are not affected. ## Recommendation Upgrade to version 1.4.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'eslint-utils'}, 'ecosystem_specific': {'affected_functions': ['eslint-utils.getStaticValue']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mysticatea/eslint-utils/security/advisories/GHSA-3gx7-xhv7-5mx3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15657'}, {'type': 'WEB', 'url': 'https://github.com/mysticatea/eslint-utils/commit/08158db1c98fd71cf0f32ddefbc147e2620e724c'}, {'type': 'WEB', 'url': 'https://eslint.org/blog/2019/08/eslint-v6.2.1-released'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3gx7-xhv7-5mx3'}, {'type': 'PACKAGE', 'url': 'https://github.com/mysticatea/eslint-utils'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1118'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:11Z', 'nvd_published_at': None}
1.4.0
GHSA-cr5j-953j-xw5p
2023-08-28T14:05:24Z
2019-08-19T19:27:23Z
null
['CVE-2019-5477']
Nokogiri Command Injection Vulnerability
A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rexical'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5477'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1915'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/5d30128343573a9428c86efc758ba2c66e9f12dc'}, {'type': 'WEB', 'url': 'https://github.com/tenderlove/rexical/commit/a652474dbc66be350055db3e8f9b3a7b3fd75926'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/650835'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-5477.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexical/CVE-2019-5477.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg00019.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-05'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4175-1/'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-19T19:26:57Z', 'nvd_published_at': '2019-08-16T16:15:00Z'}
1.4.0
GHSA-8rf6-w2mx-4xjh
2021-12-03T14:37:54Z
2019-08-19T23:45:47Z
2019-08-20T14:13:17Z
['CVE-2019-15149']
TODO
** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'mitogen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15149'}, {'type': 'WEB', 'url': 'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/dw/mitogen'}, {'type': 'WEB', 'url': 'https://mitogen.networkgenomics.com/changelog.html#v0-2-8-2019-08-18'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-19T23:45:21Z', 'nvd_published_at': '2019-08-18T20:15:00Z'}