schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 11
values | aliases
stringlengths 2
20
| summary
stringlengths 4
172
| details
stringlengths 47
3.95k
| severity
stringlengths 2
79
| affected
stringlengths 76
3.32k
| references
stringlengths 82
11.3k
| database_specific
stringlengths 131
190
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-8r98-rqg5-4vm3 | 2023-09-08T21:30:12Z | 2019-02-18T23:56:50Z | null | ['CVE-2016-10618'] | node-browser downloads Resources over HTTP | Affected versions of `node-browser` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-browser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10618'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8r98-rqg5-4vm3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/214'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4x5j-v9v9-w8gw | 2021-01-08T19:52:32Z | 2019-02-18T23:47:40Z | null | ['CVE-2016-10614'] | Downloads Resources over HTTP in httpsync | Affected versions of `httpsync` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `httpsync`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'httpsync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10614'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4x5j-v9v9-w8gw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/210'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jppx-hw2f-8gx4 | 2023-09-07T18:26:30Z | 2019-02-18T23:33:30Z | null | ['CVE-2016-10609'] | chromedriver126 downloads Resources over HTTP | Affected versions of `chromedriver126` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `chromedriver126`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'chromedriver126'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10609'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jppx-hw2f-8gx4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/203'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x268-6jhm-2mx8 | 2023-09-07T22:29:08Z | 2019-02-18T23:42:22Z | null | ['CVE-2016-10675'] | libsbmlsim downloads Resources over HTTP | Affected versions of `libsbmlsim` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libsbmlsim`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'libsbmlsim'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10675'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x268-6jhm-2mx8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/275'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c4qp-h3m6-785f | 2023-09-07T18:20:20Z | 2019-02-18T23:51:59Z | null | ['CVE-2016-10577'] | ibm_db downloads Resources over HTTP | Affected versions of `ibm_db` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Update to version 1.0.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ibm_db'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10577'}, {'type': 'WEB', 'url': 'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c4qp-h3m6-785f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/163'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wr2c-ppj9-f2fv | 2021-01-08T01:15:00Z | 2019-02-18T23:33:54Z | null | ['CVE-2016-10601'] | Downloads Resources over HTTP in webdrvr | Affected versions of `webdrvr` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdrvr`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'webdrvr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.43.0-1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10601'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wr2c-ppj9-f2fv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/193'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8gf4-pcj6-54rp | 2021-06-11T12:35:08Z | 2019-02-18T23:47:53Z | null | ['CVE-2016-10611'] | Downloads Resources over HTTP in strider-sauce | Affected versions of `strider-sauce` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `strider-sauce`.
## Recommendation
While the package author has created a patch for this vulnerability, they have not yet published it to npm or bumped the version number.
In order to resolve the vulnerability, you will need to install the module manually from github:
```
npm install github:Strider-CD/strider-sauce#5ff6d65
```
As this vulnerability does not have a version bump included with the patch, it is possible that you have received a report for a vulnerable package, yet have installed the patched version and are no longer vulnerable. If that is the case, this advisory can be disregarded. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'strider-sauce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10611'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8gf4-pcj6-54rp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/202'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pp4v-55vr-9gxh | 2023-09-12T18:42:41Z | 2019-02-18T23:39:13Z | null | ['CVE-2016-10527'] | Regular Expression Denial of Service in riot-compiler | Affected versions of `riot-compiler` are susceptible to a regular expression denial of service vulnerability.
## Recommendation
Update to version 2.3.22 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'riot-compiler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10527'}, {'type': 'WEB', 'url': 'https://github.com/riot/compiler/issues/46'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pp4v-55vr-9gxh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/86'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hw4r-xr38-hm8j | 2021-01-08T18:39:28Z | 2019-02-18T23:47:59Z | null | ['CVE-2016-10610'] | Downloads Resources over HTTP in unicode-json | Affected versions of `unicode-json` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Install version 2.0.0 or greater. | [] | [{'package': {'ecosystem': 'npm', 'name': 'unicode-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10610'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hw4r-xr38-hm8j'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/206'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h4mc-r4f4-hcf4 | 2022-08-03T21:15:02Z | 2019-02-18T23:34:37Z | null | ['CVE-2016-10589'] | selenium-binaries downloads resources over HTTP | Versions of `selenium-binaries` prior to 0.15.0 insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-binaries`.
## Recommendation
A fix for this vulnerability is available on the `master` branch of the repository as part of version 0.15.0.
Another mitigation currently available is to use an alternate package, such as [selenium-webdriver](https://www.npmjs.com/package/selenium-webdriver), the official selenium bindings for node.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'selenium-binaries'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10589'}, {'type': 'WEB', 'url': 'https://github.com/spunjs/selenium-binaries/pull/33'}, {'type': 'WEB', 'url': 'https://github.com/spunjs/selenium-binaries/commit/be37e82a3c43a4f1679d66cf9467085ec9994c47'}, {'type': 'PACKAGE', 'url': 'https://github.com/spunjs/selenium-binaries'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-npm-selenium-binaries/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/175'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2r5h-gh4x-8hp9 | 2020-08-31T18:11:21Z | 2019-02-18T23:40:14Z | null | ['CVE-2016-10552'] | Resources Downloaded over Insecure Protocol in igniteui | Affected versions of `igniteui` download Javascript and CSS resources over an unencrypted HTTP connection. An attacker with a privileged network position can intercept and view or modify any content sent or recieved over an unencrypted HTTP connection.
## Recommendation
The `igniteui` package has been deprecated by the package author and now exists under [`ignite-ui`](https://preview.npmjs.com/package/ignite-ui), which should be used in place of this package. | [] | [{'package': {'ecosystem': 'npm', 'name': 'igniteui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10552'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2r5h-gh4x-8hp9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/116'}] | {'cwe_ids': ['CWE-311'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r36x-p5pv-9mfx | 2023-09-12T18:32:15Z | 2019-02-18T23:45:25Z | null | ['CVE-2016-10652'] | prebuild-lwip downloads Resources over HTTP | Affected versions of `prebuild-lwip` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'prebuild-lwip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10652'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r36x-p5pv-9mfx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/248'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9v3m-8fp8-mj99 | 2023-08-25T23:40:57Z | 2019-02-22T20:54:47Z | null | ['CVE-2019-8331'] | Bootstrap Vulnerable to Cross-Site Scripting | Versions of `bootstrap` prior to 3.4.1 for 3.x and 4.3.1 for 4.x are vulnerable to Cross-Site Scripting (XSS). The `data-template` attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript.
## Recommendation
For `bootstrap` 4.x upgrade to 4.3.1 or later.
For `bootstrap` 3.x upgrade to 3.4.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'bootstrap-sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Bootstrap.Less'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'bootstrap.sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap-sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8331'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/28236'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3024'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2019-8331.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/releases/tag/v3.4.1'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/releases/tag/v4.3.1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/18'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K24383845'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K24383845?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227083900/http://www.securityfocus.com/bid/107375'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-14'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/10'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/13'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:39Z', 'nvd_published_at': '2019-02-20T16:29:00Z'} |
1.4.0 | GHSA-jfgq-g48x-jq83 | 2021-01-08T18:35:18Z | 2019-02-18T23:54:20Z | null | ['CVE-2016-10562'] | Downloads Resources over HTTP in iedriver | Affected versions of `iedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `iedriver`.
## Recommendation
Update to iedriver version 3.0.0 or greater. | [] | [{'package': {'ecosystem': 'npm', 'name': 'iedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10562'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfgq-g48x-jq83'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/174'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hc94-2wfr-4pwf | 2023-09-12T18:47:00Z | 2019-02-18T23:40:19Z | null | ['CVE-2016-10557'] | appium-chromedriver downloads Resources over HTTP | Affected versions of `appium-chromedriver` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read items send over HTTP at will. In this case, that includes the chromedriver binary, which may result in remote code execution if overwritten with a malicious binary.
## Recommendation
Update to version 2.9.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'appium-chromedriver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10557'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hc94-2wfr-4pwf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/162'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vcph-57hv-89c4 | 2021-01-08T01:57:33Z | 2019-02-18T23:42:11Z | null | ['CVE-2016-10678'] | Downloads Resources over HTTP in serc.js | Affected versions of `serc.js` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `serc.js`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'serc.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10678'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vcph-57hv-89c4'}, {'type': 'WEB', 'url': 'https://github.com/nowk/serc.js/blob/master/scripts/install.js#L5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/277'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4v2c-g2xc-47fv | 2021-01-08T19:53:43Z | 2019-02-18T23:54:38Z | null | ['CVE-2016-10682'] | Downloads Resources over HTTP in massif | Affected versions of `massif` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `massif`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'massif'}, 'versions': ['0.0.1-1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10682'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4v2c-g2xc-47fv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/290'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-722q-3g9x-vp8q | 2021-01-08T19:18:41Z | 2019-02-18T23:54:41Z | null | ['CVE-2016-10666'] | Downloads Resources over HTTP in tomita-parser | Affected versions of `tomita-parser` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita-parser`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'tomita-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10666'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-722q-3g9x-vp8q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/261'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mgr2-3mpv-43gc | 2021-09-16T20:55:30Z | 2019-02-18T23:47:37Z | null | ['CVE-2016-10616'] | Downloads Resources over HTTP in openframe-image | Affected versions of `openframe-image` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'openframe-image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10616'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenframeProject/Openframe-Image'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mgr2-3mpv-43gc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/218'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w9mf-24h3-9wxf | 2021-01-08T01:56:52Z | 2019-02-18T23:41:58Z | null | ['CVE-2016-10689'] | Downloads Resources over HTTP in windows-iedriver | Affected versions of `windows-iedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-iedriver`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'windows-iedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.48.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10689'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w9mf-24h3-9wxf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/293'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gc6c-5v9w-xmhw | 2021-01-08T18:48:13Z | 2019-02-18T23:51:27Z | null | ['CVE-2016-10580'] | Downloads Resources over HTTP in nodewebkit | Affected versions of `nodewebkit` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodewebkit`.
## Recommendation
No patch is currently available, and the package author has deprecated this package.
The best path forward in mitigating this vulnerability is to use the [official installer](https://www.npmjs.com/nw) instead of this package, as per the package author's instructions. | [] | [{'package': {'ecosystem': 'npm', 'name': 'nodewebkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10580'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gc6c-5v9w-xmhw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/173'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4pf7-579w-f4gm | 2023-09-07T20:13:05Z | 2019-02-18T23:57:04Z | null | ['CVE-2016-10633'] | dwebp-bin downloads Resources over HTTP | Affected versions of `dwebp-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dwebp-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'dwebp-bin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10633'}, {'type': 'PACKAGE', 'url': 'https://github.com/1000ch/dwebp-bin'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4pf7-579w-f4gm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/232'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qjf4-7642-c57p | 2021-01-08T21:18:41Z | 2019-02-18T23:51:52Z | null | ['CVE-2016-10578'] | Downloads Resources over HTTP in unicode | Affected versions of `unicode` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Update to version 9.0.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'unicode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10578'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qjf4-7642-c57p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/161'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-97gv-3p2c-xw7j | 2022-02-11T17:08:46Z | 2019-02-18T23:39:06Z | null | ['CVE-2016-10524'] | Denial of Service and Content Injection in i18n-node-angular | Versions of `i18n-node-angular` prior to 1.4.0 are affected by denial of service and cross-site scripting vulnerabilities. The vulnerabilities exist in a REST endpoint that was created for development purposes, but was not disabled in production in affected versions.
## Recommendation
Update to version 1.4.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'i18n-node-angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10524'}, {'type': 'WEB', 'url': 'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-97gv-3p2c-xw7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/oliversalzburg/i18n-node-angular'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/80'}] | {'cwe_ids': ['CWE-400', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:47Z', 'nvd_published_at': '2018-05-31T20:29:00Z'} |
1.4.0 | GHSA-g3r2-65gc-qpqc | 2021-01-08T18:50:02Z | 2019-02-18T23:38:45Z | null | ['CVE-2016-10523'] | Denial of Service in mqtt-packet | Versions of `mqtt-packet` prior to 3.4.6, or 4.x prior to 4.0.5 are affected by a denial of service vulnerability wherein specific sequences of MQTT packets can crash the application.
## Recommendation
Version 3.x: Update to version 3.4.6 or later.
Version 4.x: Update to version 4.0.5 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10523'}, {'type': 'WEB', 'url': 'https://github.com/mcollina/mosca/issues/393'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/mqtt-packet/pull/8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g3r2-65gc-qpqc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/75'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m2w9-rm58-mhm9 | 2021-01-08T18:32:04Z | 2019-02-18T23:47:06Z | null | ['CVE-2016-10640'] | Downloads Resources over HTTP in node-thulac | Affected versions of `node-thulac` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-thulac`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'node-thulac'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10640'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m2w9-rm58-mhm9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/236'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7c9w-qmrq-ff8r | 2020-08-31T18:35:12Z | 2019-02-07T18:14:21Z | null | ['CVE-2018-16479'] | Path Traversal in http-live-simulator | Versions of `http-live-simulator` prior to 1.0.7 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. For example: `curl --path-as-is http://localhost:8080//../../../../etc/passwd`.
## Recommendation
Upgrade to version 1.0.7 | [] | [{'package': {'ecosystem': 'npm', 'name': 'http-live-simulator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16479'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/411405'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7c9w-qmrq-ff8r'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/486.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/772'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7xvg-m3vx-2hhv | 2021-01-08T19:13:15Z | 2019-02-18T23:50:26Z | null | ['CVE-2016-10600'] | Downloads Resources over HTTP in webrtc-native | Affected versions of `webrtc-native` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webrtc-native`.
## Recommendation
No direct patch is currently available for this vulnerability.
However, if the native components of `webrtc-native` are built from source, this avoids download the precompiled binary, therefore mitigating the insecure download.
The package author has provided instructions for building from source [here](https://github.com/vmolsa/webrtc-native/wiki/Getting-started#building-from-source). | [] | [{'package': {'ecosystem': 'npm', 'name': 'webrtc-native'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10600'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7xvg-m3vx-2hhv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/176'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wj36-v8j4-pc7c | 2022-09-14T22:42:42Z | 2019-02-07T18:16:03Z | null | ['CVE-2018-16483'] | Authentication Bypass by Spoofing in express-cart | A deficiency in the access control in module express-cart <=1.1.5 allows unprivileged users to add new users to the application as administrators. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16483'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/343626'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wj36-v8j4-pc7c'}] | {'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mg8r-9g6j-hwv9 | 2021-09-15T18:58:17Z | 2019-02-18T23:39:00Z | null | ['CVE-2016-10525'] | Authentication Bypass in hapi-auth-jwt2 | Versions of `hapi-auth-jwt2` prior to version 5.1.2 are affected by a complete authentication bypass vulnerability when in the `try` authentication mode.
## Recommendation
Update to version 5.1.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hapi-auth-jwt2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.1'}, {'fixed': '5.1.2'}]}], 'versions': ['5.1.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10525'}, {'type': 'WEB', 'url': 'https://github.com/dwyl/hapi-auth-jwt2/issues/111'}, {'type': 'WEB', 'url': 'https://github.com/dwyl/hapi-auth-jwt2/pull/112'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mg8r-9g6j-hwv9'}, {'type': 'PACKAGE', 'url': 'https://github.com/dwyl/hapi-auth-jwt2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/81'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gmxv-xf2q-6j8m | 2023-09-13T19:48:12Z | 2019-02-07T18:16:16Z | null | ['CVE-2018-16484'] | Cross-Site Scripting in m-server | Versions of `m-server` before 1.4.2 are vulnerable to stored cross-site scripting. This vulnerability is exploitable if an attacker is able to control the name of a file that `m-server` is serving.
## Recommendation
Update to version 1.4.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'm-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16484'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319794'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gmxv-xf2q-6j8m'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/467.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/729'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xj6f-x7jm-85ff | 2023-09-11T18:33:13Z | 2019-02-18T23:41:54Z | null | ['CVE-2016-10690'] | openframe-ascii-image downloads Resources over HTTP | Affected versions of `openframe-ascii-image` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-ascii-image`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'openframe-ascii-image'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10690'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xj6f-x7jm-85ff'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/298'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v5v3-8jqf-vg27 | 2021-01-08T01:57:37Z | 2019-02-18T23:54:22Z | null | ['CVE-2016-10558'] | Downloads Resources over HTTP in aerospike | Affected versions of `aerospike` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `aerospike`.
## Recommendation
Update to version 2.4.2 or later | [] | [{'package': {'ecosystem': 'npm', 'name': 'aerospike'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10558'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v5v3-8jqf-vg27'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/167'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6v7p-j23v-4xmw | 2023-09-12T20:31:02Z | 2019-02-18T23:48:03Z | null | ['CVE-2016-10608'] | robot-js downloads Resources over HTTP | Affected versions of `robot-js` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `robot-js`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'robot-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10608'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6v7p-j23v-4xmw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/201'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5w4p-h4gm-3w26 | 2021-01-08T19:47:58Z | 2019-02-18T23:50:53Z | null | ['CVE-2016-10592'] | Downloads Resources over HTTP in jser-stat | Affected versions of `jser-stat` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jser-stat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10592'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5w4p-h4gm-3w26'}, {'type': 'WEB', 'url': 'https://github.com/jser/stat-js/blob/master/data/url-mapping.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/188'}] | {'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vqmr-957g-r7w3 | 2023-09-07T00:06:15Z | 2019-02-12T15:36:39Z | null | ['CVE-2017-18355'] | Rendertron discloses absolute paths of files | Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18355'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vqmr-957g-r7w3'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2hpj-g53m-9gj6 | 2023-09-08T20:52:07Z | 2019-02-18T23:58:03Z | null | ['CVE-2016-10583'] | closure-util downloads Resources over HTTP | Affected versions of `closure-util` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closure-util`.
## Recommendation
To mitigate this issue:
1. Install the package using npm's `--ignore-scripts` flag.
2. Navigate to the package directory, and open `default-config.json` in a text editor
3. Change the download URLs in the `compiler_url` and `library_url` to `https` equivalents
4. run `npm i` in the package directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'closure-util'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0-beta.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10583'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2hpj-g53m-9gj6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/165'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-59m2-j944-839w | 2023-09-07T20:12:38Z | 2019-02-18T23:45:13Z | null | ['CVE-2016-10655'] | clang-extra downloads Resources over HTTP | Affected versions of `clang-extra` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `clang-extra`.
## Recommendation
No patch is currently available for this vulnerability. The package author stated that no patch is possible until llvm provides HTTPS support, and a patch would be possible if that ever happened in the future.
The best mitigation option is to reduce the risk of exploitation as much as possible. This can be done by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'clang-extra'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10655'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-59m2-j944-839w'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/265'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-735c-r4vc-6gm9 | 2021-09-16T20:41:21Z | 2019-02-18T23:56:45Z | null | ['CVE-2016-10613'] | Downloads Resources over HTTP in bionode-sra | Affected versions of `bionode-sra` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available. The author of this package has suggested using [urllib-sync](https://www.npmjs.com/package/urllib-sync).
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'bionode-sra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10613'}, {'type': 'PACKAGE', 'url': 'https://github.com/bionode/bionode-sra'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/211'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f757-9c4x-chff | 2023-09-13T22:48:59Z | 2019-02-18T23:54:44Z | null | ['CVE-2016-10659'] | poco downloads Resources over HTTP | Affected versions of `poco` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `poco`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'poco'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10659'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f757-9c4x-chff'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/271'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2wrq-wmqf-8vcc | 2020-08-31T18:14:19Z | 2019-02-18T23:35:48Z | null | ['CVE-2016-10565'] | Downloads Resources over HTTP in operadriver | operadriver is a Opera Driver for Selenium.
operadriver versions below 0.2.3 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
## Recommendation
Update to version 0.2.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'operadriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10565'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2wrq-wmqf-8vcc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/196'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-45j8-pm75-5v8x | 2020-08-31T18:42:22Z | 2019-02-07T18:18:04Z | null | ['CVE-2018-16493'] | Path Traversal in simplehttpserver | Versions of `simplehttpserver` prior to 0.2.1 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to version 0.2.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'static-resource-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16493'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/357109'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/432600'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-45j8-pm75-5v8x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/967'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/968'}] | {'cwe_ids': ['CWE-548'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jh5w-6964-x5cf | 2020-08-31T18:12:58Z | 2019-02-18T23:58:05Z | null | ['CVE-2016-10579'] | Downloads Resources over HTTP in chromedriver | Affected versions of `chromedriver` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This may result in arbitrary code execution if an attacker intercepts and modifies the downloaded binary file, replacing it with a malicious one.
## Recommendation
Update to version 2.26.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'chromedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.26.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10579'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jh5w-6964-x5cf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/160'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7r8m-45gc-m2c8 | 2021-01-08T19:14:34Z | 2019-02-18T23:52:14Z | null | ['CVE-2016-10572'] | Downloads Resources over HTTP in mongodb-instance | Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mongodb-instance`.
## Recommendation
Update to version 0.0.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'mongodb-instance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572'}, {'type': 'WEB', 'url': 'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7r8m-45gc-m2c8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/235'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hv96-xxx2-5v7w | 2021-06-10T23:26:24Z | 2019-02-18T23:51:04Z | null | ['CVE-2016-10588'] | Downloads Resources over HTTP in nw | Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`.
## Recommendation
Update to version 0.23.6-1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nw'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.6-1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.23.6-sdk'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10588'}, {'type': 'WEB', 'url': 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hv96-xxx2-5v7w'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/166'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f5mh-hq6h-whxv | 2021-01-08T21:04:46Z | 2019-02-18T23:38:29Z | null | ['CVE-2016-10561'] | Directory Traversal in bitty | Affected versions of `bitty` are vulnerable to directory traversal via the URL path in GET requests.
## Recommendation
The `bitty` package is not currently maintained, and has not seen an update since 2015.
At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality, such as [serve](https://www.npmjs.com/package/serve). | [] | [{'package': {'ecosystem': 'npm', 'name': 'bitty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10561'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f5mh-hq6h-whxv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/150'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-747p-jfqv-f43r | 2021-06-11T14:04:48Z | 2019-02-18T23:47:26Z | null | ['CVE-2016-10626'] | Downloads Resources over HTTP in mystem3 | Affected versions of `mystem3` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem3`.
## Recommendation
Update to version 1.0.8 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mystem3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10626'}, {'type': 'WEB', 'url': 'https://github.com/koorchik/node-mystem3/commit/4bd31c0e0110afc327c414d7ebfc2ffe738cbad2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-747p-jfqv-f43r'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/229'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mq7g-6rv4-pj95 | 2021-01-08T18:26:10Z | 2019-02-18T23:35:23Z | null | ['CVE-2016-10569'] | Downloads Resources over HTTP in embedza | Affected versions of `embedza` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `embedza`.
## Recommendation
Update to version 1.2.4 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'embedza'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10569'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mq7g-6rv4-pj95'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/187'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xg5r-8j97-2wrj | 2020-08-31T18:10:25Z | 2019-02-18T23:39:22Z | null | ['CVE-2016-10528'] | Directory Traversal in restafary | Affected versions of `restafary` are susceptible to a directory traversal vulnerability when a root path is specified in the configuration.
Proof of Concept
```
curl -i -s -k -X 'GET' -H 'Authorization: Basic YWRtaW46cGFzc3dvcmQ=' 'http://localhost:8000/api/v1/fs/..%2f..%2fetc/passwd'
```
## Recommendation
Update to version 1.6.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'restafary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10528'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xg5r-8j97-2wrj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/89'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5pq8-2q24-mj3p | 2021-01-08T19:48:52Z | 2019-02-18T23:45:03Z | null | ['CVE-2016-10660'] | Downloads Resources over HTTP in fis-parser-sass-bin | Affected versions of `fis-parser-sass-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-parser-sass-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'fis-parser-sass-bin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10660'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5pq8-2q24-mj3p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/269'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h466-j336-74wx | 2023-09-07T18:22:30Z | 2019-02-07T18:17:26Z | null | ['CVE-2018-16490'] | Prototype Pollution in mpath | Versions of `mpath` before 0.5.1 are vulnerable to prototype pollution. Provided certain input `mpath` can add or modify properties of the `Object` prototype. These properties will be present on all objects.
## Recommendation
Update to version `0.5.1` or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mpath'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16490'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390860'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h466-j336-74wx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/779'}] | {'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g2pf-qjgf-6fw3 | 2021-09-16T20:41:43Z | 2019-02-18T23:33:42Z | null | ['CVE-2016-10607'] | Downloads Resources over HTTP in openframe-glslviewer | Affected versions of `openframe-glslviewer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-glslviewer`.
## Recommendation
No patch is currently available for this vulnerability, and the package hasn't been updated since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'openframe-glslviewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10607'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenframeProject/Openframe-glslViewer'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g2pf-qjgf-6fw3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/208'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x56r-5r34-qg74 | 2023-09-11T18:32:24Z | 2019-02-18T23:47:47Z | null | ['CVE-2016-10612'] | dalek-browser-ie-canary downloads Resources over HTTP | Affected versions of `dalek-browser-ie-canary` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie-canary`.
## Recommendation
No patch is currently available for this vulnerability, and the package author has marked the package as deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'dalek-browser-ie-canary'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4-2014-04-04-12-11-49'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10612'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x56r-5r34-qg74'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/205'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q43m-ffwr-rpcc | 2021-01-08T18:18:07Z | 2019-02-18T23:58:24Z | null | ['CVE-2016-10534'] | SSL Validation Defaults to False in electron-packager | Affected versions of `electron-packager` configure the generated application to disable SSL certificate verification by default.
This could allow an attacker with a privileged network position to launch a Man In The Middle (MITM) attack on the install process, intercepting the step where electron-packager downloads Electron for supported target platforms and architectures, and replacing the valid download with a tampered malicious one.
This only affects users using the electron-packager CLI. The strict-ssl option defaults to true for the node.js API.
## Recommendation
1. Update to version 7.0.0 or later.
2. Delete the `electron-download` cache folder, which is by default located at `~/.electron`. | [] | [{'package': {'ecosystem': 'npm', 'name': 'electron-packager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.1'}, {'fixed': '7.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10534'}, {'type': 'WEB', 'url': 'https://github.com/electron-userland/electron-packager/issues/333'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q43m-ffwr-rpcc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/104'}] | {'cwe_ids': ['CWE-295'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9jf3-f2pg-7868 | 2023-09-11T21:50:14Z | 2019-02-18T23:57:01Z | null | ['CVE-2016-10629'] | nw-with-arm downloads Resources over HTTP | Affected versions of `nw-with-arm` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw-with-arm`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nw-with-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10629'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9jf3-f2pg-7868'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/226'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7p6h-3fmw-539q | 2023-09-11T18:11:23Z | 2019-02-18T23:47:27Z | null | ['CVE-2016-10624'] | selenium-chromedriver Downloads Resources over HTTP | Affected versions of `selenium-chromedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-chromedriver`.
## Recommendation
No patch is currently available for this vulnerability, and the author has marked the package as deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'selenium-chromedriver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10624'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7p6h-3fmw-539q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/222'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qx9m-27wh-7fjg | 2021-01-08T01:58:11Z | 2019-02-18T23:57:03Z | null | ['CVE-2016-10631'] | Downloads Resources over HTTP in jvminstall | Affected versions of `jvminstall` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jvminstall`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jvminstall'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10631'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qx9m-27wh-7fjg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/225'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h7pc-85cg-wmch | 2021-01-08T18:42:35Z | 2019-02-18T23:35:10Z | null | ['CVE-2016-10575'] | Downloads Resources over HTTP in kindlegen | Affected versions of `kindlegen` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `kindlegen`.
## Recommendation
Update to version 1.1.0 or greater. | [] | [{'package': {'ecosystem': 'npm', 'name': 'kindlegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10575'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h7pc-85cg-wmch'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/251'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mq76-m7gv-xhfm | 2023-09-07T20:37:17Z | 2019-02-18T23:34:00Z | null | ['CVE-2016-10599'] | sauce-connect downloads Resources over HTTP | Affected versions of `sauce-connect` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `sauce-connect`.
## Recommendation
No patch is currently available for this vulnerability, and this package has not been updated since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sauce-connect'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10599'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mq76-m7gv-xhfm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/186'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9c2p-jw8p-f84v | 2023-09-11T21:48:29Z | 2019-02-18T23:54:24Z | null | ['CVE-2016-10556'] | SQL Injection in sequelize | Affected versions of `sequelize` cast arrays to strings and fail to properly escape the resulting SQL statement, resulting in a SQL injection vulnerability.
## Proof of Concept
In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped.
Example Query:
```
database.query('SELECT * FROM TestTable WHERE Name IN (:names)', {
replacements: {
names: directCopyOfUserInput
}
});
```
If the user inputs the value of `:names` as:
```
["test", "'); DELETE TestTable WHERE Id = 1 --')"]
```
The resulting SQL statement will be:
```sql
SELECT Id FROM Table WHERE Name IN ('test', '\'); DELETE TestTable WHERE Id = 1 --')
```
As the backslash has no special meaning in PostgreSQL, MSSQL, or SQLite, the statement will delete the record in TestTable with an Id of 1.
## Recommendation
Update to version 3.20.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.20.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.19.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10556'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/5671'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/23952a2b020cc3571f090e67dae7feb084e1be71'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commits/v3.20.0?after=62e4dacb28a779a190a3e042b971dcd8c7926e49+34&branch=v3.20.0&qualified_name=refs%2Ftags%2Fv3.20.0'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cvx3-pqmj-x57x | 2023-09-05T23:25:04Z | 2019-02-18T23:47:13Z | null | ['CVE-2016-10634'] | scalajs-standalone-bin Downloads Resources over HTTP | Affected versions of `scalajs-standalone-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scalajs-standalone-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'scalajs-standalone-bin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10634'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cvx3-pqmj-x57x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/231'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5qfv-rr79-chx5 | 2022-11-17T18:22:53Z | 2019-08-27T17:37:33Z | null | ['CVE-2019-15488'] | Cross-site Scripting in Ignite Realtime Openfire | Ignite Realtime Openfire before 4.4.1 has reflected XSS via an LDAP setup test. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:xmppserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15488'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/pull/1441'}, {'type': 'PACKAGE', 'url': 'https://github.com/igniterealtime/Openfire'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/compare/cd0a573...5e5d9e5'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T16:49:15Z', 'nvd_published_at': '2019-08-23T13:15:00Z'} |
1.4.0 | GHSA-f5f4-m7qp-w6gc | 2023-09-11T20:37:33Z | 2019-08-27T17:40:33Z | null | ['CVE-2019-15477'] | Cross-site Scripting in Jooby | Jooby before 1.6.4 has XSS via the default error handler. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jooby:jooby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15477'}, {'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/pull/1368'}, {'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/commit/34856a738829d8fedca4ed27bd6ff413af87186f'}, {'type': 'PACKAGE', 'url': 'https://github.com/jooby-project/jooby'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:11:57Z', 'nvd_published_at': '2019-08-23T13:15:00Z'} |
1.4.0 | GHSA-3gm7-v7vw-866c | 2021-03-31T21:07:31Z | 2019-08-01T19:17:35Z | null | ['CVE-2019-0193'] | XML External Entity (XXE) Injection in Apache Solr | In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0193'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-13669'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a76d4b4ded9c@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/42cc4d334ba33905b872a0aa00d6a481391951c8b1450f01b077ce74@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/55880d48e38ba9e8c41a3b9e41051dbfdef63b86b0cfeb32967edf03@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7143983363f0ba463475be4a8b775077070a08dbf075449b7beb51ee@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9b0e7a7e3e18d0724f511403b364fc082ff56e3134d84cfece1c82fc@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a6e3c09dba52b86d3a1273f82425973e1b0623c415d0e4f121d89eab@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85f735fad06a0fb46e74b7e6e9ce7ded20b59637cd9f993310f814d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33aed7ad4ee9833c4190a44e2b106efd2deb19504b85e012175540f6@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb34d820c21f1708c351f9035d6bc7daf80bfb6ef99b34f7af1d2f699@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00025.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T19:07:49Z', 'nvd_published_at': '2019-08-01T14:15:00Z'} |
1.4.0 | GHSA-66rh-8fw6-59q6 | 2022-08-03T16:21:27Z | 2019-08-21T16:15:13Z | null | ['CVE-2019-10745'] | assign-deep Vulnerable to Prototype Pollution | Versions of `assign-deep` prior to 1.0.1 and 0.4.8 are vulnerable to Prototype Pollution. The `assign` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
## Recommendation
Upgrade to versions 1.0.1, 0.4.8, or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'assign-deep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'assign-deep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10745'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/assign-deep/commit/8e3cc4a34246733672c71e96532105384937e56c'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/assign-deep/commit/90bf1c551d05940898168d04066bbf15060f50cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/jonschlinkert/assign-deep'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1014'}] | {'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T15:53:43Z', 'nvd_published_at': '2019-08-20T19:15:00Z'} |
1.4.0 | GHSA-cwqq-w8c3-r2jw | 2021-08-17T21:57:17Z | 2019-08-23T00:04:56Z | null | ['CVE-2019-14262'] | Uncontrolled Resource Consumption in MetadataExtractor | MetadataExtractor 2.1.0 allows stack consumption. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'MetadataExtractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14262'}, {'type': 'WEB', 'url': 'https://github.com/drewnoakes/metadata-extractor-dotnet/pull/190'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T15:04:25Z', 'nvd_published_at': '2019-07-25T05:15:00Z'} |
1.4.0 | GHSA-rch7-f4h5-x9rj | 2021-08-17T21:32:42Z | 2019-08-23T00:04:52Z | null | [] | Identity Spoofing in libp2p-secio | Affected versions of `libp2p-secio` does not correctly verify that the `PeerId` of `DstPeer` matches the `PeerId` discovered in the crypto handshake, resulting in a high severity identity spoofing vulnerability.
## Recommendation
Update to version 0.9.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'libp2p-secio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/libp2p/js-libp2p-secio/pull/95'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:libp2p-secio:20180115'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/558'}] | {'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T14:56:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v9qg-3j8p-r63v | 2021-05-10T18:17:48Z | 2019-08-06T01:43:31Z | null | ['CVE-2019-14235'] | Uncontrolled Recursion in Django | An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14235'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Aug/15'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4498'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}] | {'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:34:47Z', 'nvd_published_at': '2019-08-02T15:15:00Z'} |
1.4.0 | GHSA-mfwh-gqx8-c787 | 2021-05-05T22:58:08Z | 2019-08-06T01:43:40Z | null | ['CVE-2019-10088'] | Allocation of Resources Without Limits or Throttling in Apache Tika | A carefully crafted or corrupt zip file can cause an OOM in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Users should upgrade to 1.22 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7'}, {'fixed': '1.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10088'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1c63555609b737c20d1bbfa4a3e73ec488e3408a84e2f5e47e1b7e08@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:42:46Z', 'nvd_published_at': '2019-08-02T19:15:00Z'} |
1.4.0 | GHSA-6r97-cj55-9hrq | 2021-08-17T20:41:46Z | 2019-08-16T14:00:34Z | null | ['CVE-2019-14234'] | SQL Injection in Django | An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14234'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/4f5b58f5cd3c57fee9972ab074f8dc6895d8f387'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/ed682a24fca774818542757651bfba576c3fc3ef'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/f74b3ae3628c26e1b4f8db3d13a91d52a833a975'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-09T15:26:25Z', 'nvd_published_at': '2019-08-09T13:15:00Z'} |
1.4.0 | GHSA-4q98-wr72-h35w | 2021-08-17T22:16:39Z | 2019-08-27T17:41:33Z | null | ['CVE-2019-12400'] | Improper input validation in Apache Santuario XML Security for Java | In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.santuario:xmlsec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.3'}, {'fixed': '2.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12400'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8e814b925bf580bc527d96ff51e72ffe5bdeaa4b8bf5b89498cab24c@%3Cdev.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/edaa7edb9c58e5f5bd0c950f2b6232b62b15f5c44ad803e8728308ce@%3Cdev.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r107bffb06a5e27457fe9af7dfe3a233d0d36c6c2f5122f117eb7f626@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcdc0da94fe21b26493eae47ca987a290bdf90c721a7a42491fdd41d4@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf82be0a7c98cd3545e20817bb96ed05551ea0020acbaf9a469fef402@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf958cea96236de8829940109ae07e870aa3d59235345421e4924ff03@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190910-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:17:13Z', 'nvd_published_at': '2019-08-23T21:15:00Z'} |
1.4.0 | GHSA-4mq5-mj59-qq9c | 2021-05-05T22:55:27Z | 2019-08-06T01:43:38Z | null | ['CVE-2019-10093'] | Allocation of Resources Without Limits or Throttling in Apache Tika | In Apache Tika 1.19 to 1.21, a carefully crafted 2003ml or 2006ml file could consume all available SAXParsers in the pool and lead to very long hangs. Apache Tika users should upgrade to 1.22 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-parsers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19'}, {'fixed': '1.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10093'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a5a44eff1b9eda3bc69d22943a1030c43d376380c75d3ab04d0c1a21@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}] | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:42:09Z', 'nvd_published_at': '2019-08-02T19:15:00Z'} |
1.4.0 | GHSA-65p8-3hm4-h9h8 | 2021-08-17T21:23:49Z | 2019-08-23T00:04:48Z | null | [] | Denial of Service in rgb2hex | All versions of `rgb2hex` are vulnerable to Regular Expression Denial of Service (ReDoS) when an attacker can pass in a specially crafted invalid color value.
## Recommendation
Update to version 0.1.6 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'rgb2hex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/319629'}, {'type': 'WEB', 'url': 'https://github.com/christian-bromann/rgb2hex/blob/v0.1.0/index.js#L25'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:rgb2hex:20180429'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/647'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T14:26:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-25pc-85qf-6j69 | 2021-08-17T20:24:21Z | 2019-08-01T19:17:53Z | null | ['CVE-2018-11779'] | Deserialization of Untrusted Data in Apache Storm | In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-kafka-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11779'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3e4f704c4bd9296405a07a0290b8cbb6cbf5046e277efe6d93280a98@%3Cuser.storm.apache.org%3E'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T17:52:52Z', 'nvd_published_at': '2019-07-26T00:15:00Z'} |
1.4.0 | GHSA-6fpp-rgj9-8rwc | 2023-09-13T17:18:23Z | 2019-08-01T19:18:00Z | null | ['CVE-2019-14379'] | Deserialization of untrusted data in FasterXML jackson-databind | SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2, 2.8.11.4, and 2.7.9.6 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.9.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14379'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2387'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/ad418eeb974e357f2797aef64aa0e3ffaaa6125b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:2824'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2743'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3046'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3050'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3292'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3297'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3901'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.1...jackson-databind-2.9.9.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2766188be238a446a250ef76801037d452979152d85bce5e46805815@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/525bcf949a4b0da87a375cbad2680b8beccde749522f24c49befe7fb@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6788e4c991f75b89d290ad06b463fcd30bcae99fee610345a35b7bc6@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/689c6bcc6c7612eee71e453a115a4c8581e7b718537025d4b265783d@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/75f482fdc84abe6d0c8f438a76437c335a7bbeb5cddd4d70b4bc0cbf@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/859815b2e9f1575acbb2b260b73861c16ca49bca627fa0c46419051f@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8723b52c2544e6cb804bc8a36622c584acd1bd6c53f2b6034c9fea54@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/99944f86abefde389da9b4040ea2327c6aa0b53a2ff9352bd4cfec17@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d161ff3d59c5a8213400dd6afb1cce1fac4f687c32d1e0c0bfbfaa2d@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e25e734c315f70d8876a846926cfe3bfa1a4888044f146e844caf72f@%3Ccommits.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f17f63b0f8a57e4a5759e01d25cffc0548f0b61ff5c6bfd704ad2f2a@%3Ccommits.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00011.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190814-0001/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213189'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Mar/23'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T15:38:02Z', 'nvd_published_at': '2019-07-29T12:15:00Z'} |
1.4.0 | GHSA-gq9m-qvpx-68hc | 2023-08-31T09:34:57Z | 2019-08-21T16:15:24Z | null | ['CVE-2019-14806'] | Pallets Werkzeug Insufficient Entropy | Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'werkzeug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14806'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/blob/7fef41b120327d3912fbe12fb64f1951496fcf3e/src/werkzeug/debug/__init__.py#L168'}, {'type': 'WEB', 'url': 'https://palletsprojects.com/blog/werkzeug-0-15-3-released/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00047.html'}] | {'cwe_ids': ['CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T16:01:59Z', 'nvd_published_at': '2019-08-09T15:15:00Z'} |
1.4.0 | GHSA-xc6x-cq47-9chw | 2021-08-26T15:33:46Z | 2019-08-16T14:03:35Z | null | ['CVE-2019-1258'] | Vulnerability in Azure Active Directory Authentication Library | An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens, aka 'Azure Active Directory Authentication Library Elevation of Privilege Vulnerability'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'microsoft.identitymodel.clients.activedirectory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1258'}, {'type': 'PACKAGE', 'url': 'https://github.com/AzureAD/azure-activedirectory-library-for-dotnet'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1258'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-15T15:29:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w69w-jvc7-wjgv | 2023-09-25T10:52:27Z | 2019-08-01T19:18:16Z | null | ['CVE-2019-10184'] | Undertow Missing Authorization when requesting a protected directory without trailing slash | undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-servlet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10184'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/794'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/5fa7ac68c0e4251c93056d9982db5e794e04ebfa'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3046'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3050'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10184'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/UNDERTOW-1578'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0016/'}] | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T15:23:26Z', 'nvd_published_at': '2019-07-25T21:15:00Z'} |
1.4.0 | GHSA-65rm-h285-5cc5 | 2023-08-31T09:13:38Z | 2019-08-16T14:02:35Z | null | ['CVE-2019-12855'] | Improper Certificate Validation in Twisted | In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12855'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/pull/1147'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://twistedmatrix.com/trac/ticket/9561'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-12T15:06:23Z', 'nvd_published_at': '2019-06-16T12:29:00Z'} |
1.4.0 | GHSA-333g-rpr4-7hxq | 2023-08-28T21:39:41Z | 2019-08-20T14:29:03Z | null | ['CVE-2019-15224'] | rest-client Gem Contains Malicious Code | The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.
Users of an affected version should consider downgrading to the last non-affected version of 1.6.9, or upgrading to 1.7.x.
Additionally, a set of other minor gems have been partially or completely yanked and are included in this advisory.
These include cron_parser, coin_base, blockchain_wallet, awesome-bot, doge-coin, capistrano-colors, bitcoin_vanity, lita_coin, coming-soon, and omniauth_amazon. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rest-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.10'}, {'fixed': '1.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.13'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'cron_parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.13'}, {'last_affected': '1.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cron_parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.1.4']}, {'package': {'ecosystem': 'RubyGems', 'name': 'coin_base'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'blockchain_wallet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'awesome-bot'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'doge-coin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'capistrano-colors'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'bitcoin_vanity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'coming-soon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'omniauth_amazon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15224'}, {'type': 'WEB', 'url': 'https://github.com/rest-client/rest-client/issues/713'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/wiki/Gems-yanked-and-accounts-locked#19-aug-2019'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/blockchain_wallet/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/coin_base/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doge-coin/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lita_coin/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth_amazon/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rest-client/CVE-2019-15224.yml'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-20T14:27:19Z', 'nvd_published_at': '2019-08-19T23:15:00Z'} |
1.4.0 | GHSA-8j4w-5fw4-rm27 | 2021-08-17T22:18:25Z | 2019-08-27T17:45:33Z | null | ['CVE-2019-10750'] | Prototype Pollution in deeply | Versions of `deeply` prior to 1.0.1 are vulnerable to Prototype Pollution. The package fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
## Recommendation
Upgrade to version 3.1.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'deeply'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10750'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DEEPLY-451026'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1030'}] | {'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:28:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4p8f-mmfj-r45g | 2023-08-25T20:28:23Z | 2019-08-21T16:15:04Z | null | ['CVE-2018-20975'] | Cross-site scripting in fat_free_crm | Fat Free CRM before 0.18.1 has XSS in the `tags_helpe`r in `app/helpers/tags_helper.rb`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20975'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/compare/v0.17.3...v0.18.1'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.18.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fat_free_crm/CVE-2018-20975.yml'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T15:48:24Z', 'nvd_published_at': '2019-08-20T13:15:00Z'} |
1.4.0 | GHSA-xqh8-5j36-4556 | 2022-06-15T18:39:04Z | 2019-08-26T16:59:45Z | null | ['CVE-2019-15658'] | SQL Injection in connect-pg-simple | ### Impact
An unlikely SQL injection if the case of an unsanitized table name input.
### Patches
The user should upgrade to `6.0.1`. Due to its low impact a backport has not been made to the `5.x` branch.
### Workarounds
If there is no likelihood that the `tableName` or `schemaName` options sent to the constructor could be of an unsanitized nature, then no workaround is needed. Else the input could be sanitized and escaped before sending it in. Take note though that such an escaping would need to be removed when upgrading to `6.0.1` or later, to avoid double escaping.
### References
* [Security issue disclosure](https://github.com/voxpelli/node-connect-pg-simple/issues/151)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [voxpelli/node-connect-pg-simple](https://github.com/voxpelli/node-connect-pg-simple)
* Email maintainer at [pelle@kodfabrik.se](mailto:pelle@kodfabrik.se)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'connect-pg-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/voxpelli/node-connect-pg-simple/security/advisories/GHSA-xqh8-5j36-4556'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15658'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqh8-5j36-4556'}, {'type': 'PACKAGE', 'url': 'https://github.com/voxpelli/node-connect-pg-simple'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONNECTPGSIMPLE-460154'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1153'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jvpp-hxjj-5ccc | 2021-08-17T20:27:34Z | 2019-08-01T19:17:45Z | null | ['CVE-2015-7559'] | Improper Input Validation and Missing Authentication for Critical Function in Apache ActiveMQ | It was found that the Apache ActiveMQ client before 5.15.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.15.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7559'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7559'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-6470'}] | {'cwe_ids': ['CWE-20', 'CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T19:05:30Z', 'nvd_published_at': '2019-08-01T14:15:00Z'} |
1.4.0 | GHSA-fpqp-v323-44xv | 2021-08-17T20:42:32Z | 2019-08-16T14:01:35Z | null | ['CVE-2019-12397'] | Cross-site scripting in Apache Ranger | Policy import functionality in Apache Ranger 0.7.0 to 1.2.0 is vulnerable to a cross-site scripting issue. Upgrade to 2.0.0 or later version of Apache Ranger with the fix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12397'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ab2de1adad96f5dbd19d976b28715dfc60dbe75e82a74f48be8ef695@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cbc6346708ef2b9ffb2555637311bf6294923c609c029389fa39de8f@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/08/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-09T15:38:43Z', 'nvd_published_at': '2019-08-08T18:15:00Z'} |
1.4.0 | GHSA-mm7m-xg4h-6m52 | 2021-05-05T22:59:41Z | 2019-08-06T01:43:35Z | null | ['CVE-2019-10094'] | Allocation of Resources Without Limits or Throttling in Apache Tika | A carefully crafted package/compressed file that, when unzipped/uncompressed yields the same file (a quine), causes a StackOverflowError in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Apache Tika users should upgrade to 1.22 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7'}, {'fixed': '1.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10094'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fe876a649d9d36525dd097fe87ff4dcb3b82bb0fbb3a3d71fb72ef61@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:41:24Z', 'nvd_published_at': '2019-08-02T19:15:00Z'} |
1.4.0 | GHSA-8cpw-73f2-w58m | 2021-08-17T22:13:00Z | 2019-08-27T17:38:33Z | null | ['CVE-2019-15482'] | Cross-Site Scripting in selectize-plugin-a11y | Versions of `selectize-plugin-a11y ` prior to 1.1.0 are vulnerable to Cross-Site Scripting. The `accessibility.liveRegion.speak` function does not sanitize the `msg` variable before rendering it as HTML. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 1.1.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'selectize-plugin-a11y'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15482'}, {'type': 'WEB', 'url': 'https://github.com/SLMNBJ/selectize-plugin-a11y/pull/9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1145'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/selectize-plugin-a11y/v/1.1.0'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:01:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c4qh-4vgv-qc6g | 2023-09-05T13:07:51Z | 2019-08-06T01:43:29Z | null | ['CVE-2019-14232'] | Django Denial-of-service in django.utils.text.Truncator | An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If `django.utils.text.Truncator`'s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14232'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/django/PYSEC-2019-11.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Aug/15'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4498'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:34:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hfmf-q43v-2ffj | 2021-08-17T22:08:26Z | 2019-08-23T21:42:18Z | null | ['CVE-2019-9154'] | Improper Key Verification in openpgp | Versions of `openpgp` prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The `openpgp` package does not verify whether a subpacket is hashed. Furthermore, due to the order of parsing a signature packet information from unhashed subpackets overwrites information from hashed subpackets. This may allow an attacker to modify the contents of a key certification signature or revocation signature. Doing so could convince a victim to use an obsolete key for encryption. An attack require a victim to import a manipulated key or update an existing key with a manipulated version.
## Recommendation
Upgrade to version 4.2.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9154'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/797'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/47138eed61473e13ee8f05931119d3e10542c5e1'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460247'}, {'type': 'WEB', 'url': 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1161'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}] | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:41:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qwqc-28w3-fww6 | 2021-08-17T22:06:12Z | 2019-08-23T21:42:20Z | null | ['CVE-2019-9153'] | Message Signature Bypass in openpgp | Versions of `openpgp` prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type `text`. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as `standalone` or `timestamp`). For example, an attacker that captures a `standalone` signature packet from a victim can construct arbitrary signed messages that would be verified correctly.
## Recommendation
Upgrade to version 4.2.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9153'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/816'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460248'}, {'type': 'WEB', 'url': 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1160'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}] | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:40:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x65c-4fgj-5fc3 | 2021-08-17T21:58:07Z | 2019-08-23T00:05:00Z | null | ['CVE-2019-14653'] | Cross-site Scripting in pandao | pandao Editor.md 1.5.0 allows XSS via an attribute of an ABBR or SUP element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'versions': ['1.5.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14653'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/715'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T15:07:56Z', 'nvd_published_at': '2019-08-03T14:15:00Z'} |
1.4.0 | GHSA-h5jv-4p7w-64jg | 2023-09-05T13:10:54Z | 2019-08-06T01:43:33Z | null | ['CVE-2019-14233'] | Django Denial-of-service in strip_tags() | An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14233'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Aug/15'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4498'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:36:05Z', 'nvd_published_at': '2019-08-02T15:15:00Z'} |
1.4.0 | GHSA-77jf-fjjf-xcww | 2021-07-27T21:15:18Z | 2019-08-23T21:42:22Z | null | ['CVE-2019-9155'] | Invalid Curve Attack in openpgp | Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key.
## Recommendation
Upgrade to version 4.3.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9155'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/853'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460225'}, {'type': 'WEB', 'url': 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1159'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}] | {'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:39:35Z', 'nvd_published_at': '2019-08-22T16:15:00Z'} |
1.4.0 | GHSA-jp6r-xcjj-5h7r | 2021-08-17T22:11:11Z | 2019-08-27T17:36:32Z | null | ['CVE-2019-15532'] | Cross-Site Scripting in cyberchef | Versions of `cyberchef` prior to 8.31.3 are vulnerable to Cross-Site Scripting. In `Text Encoding Brute Force` the table rows are created by concatenating the `value` variable unsanitized in the HTML code. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 8.31.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'cyberchef'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.31.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15532'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/issues/539'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/issues/544'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/compare/v8.31.1...v8.31.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CYBERCHEF-460296'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1149'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T15:50:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xjjg-vmw6-c2p9 | 2021-08-17T22:17:50Z | 2019-08-27T17:44:33Z | null | ['CVE-2019-10751'] | Open Redirect in httpie | All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'httpie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10751'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107'}] | {'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:27:00Z', 'nvd_published_at': '2019-08-23T17:15:00Z'} |
1.4.0 | GHSA-vx6v-2rg6-865h | 2023-04-20T21:51:43Z | 2019-08-27T17:39:33Z | null | ['CVE-2019-15486'] | Cross-site Scripting in django-js-reverse | django-js-reverse (aka Django JS Reverse) before 0.9.1 has XSS via js_reverse_inline. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-js-reverse'}, 'ecosystem_specific': {'affected_functions': ['django_js_reverse.core.generate_js']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15486'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/pull/81'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/commit/78d6aff2276f2d341f643b095515f8aaba5e67c2'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/commit/a3b57d1e4424e2fadabcd526d170c4868d55159c'}, {'type': 'PACKAGE', 'url': 'https://github.com/ierror/django-js-reverse'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/compare/v0.9.0...v0.9.1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:04:03Z', 'nvd_published_at': '2019-08-23T13:15:00Z'} |
1.4.0 | GHSA-mr7p-25v2-35wr | 2023-08-30T19:56:34Z | 2019-08-23T21:53:51Z | null | ['CVE-2019-14751'] | NLTK Vulnerable To Path Traversal | NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a `../` (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nltk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14751'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/commit/f59d7ed8df2e0e957f7f247fe218032abdbe9a10'}, {'type': 'WEB', 'url': 'https://github.com/mssalvatore/CVE-2019-14751_PoC'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/blob/3.4.5/ChangeLog'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QI4IJGLZQ5S7C5LNRNROHAO2P526XE3D/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGZSSEJH7RHH3RBUEVWWYT75QU67J7SE/'}, {'type': 'WEB', 'url': 'https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00054.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00001.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:48:38Z', 'nvd_published_at': '2019-08-22T16:15:00Z'} |
1.4.0 | GHSA-3gx7-xhv7-5mx3 | 2021-08-31T21:04:30Z | 2019-08-26T16:59:56Z | null | ['CVE-2019-15657'] | Arbitrary Code Execution in eslint-utils | Versions of `eslint-utils` >=1.2.0 or <1.4.1 are vulnerable to Arbitrary Code Execution. The `getStaticValue` does not properly sanitize user input allowing attackers to supply malicious input that executes arbitrary code during the linting process. The `getStringIfConstant` and `getPropertyName` functions are not affected.
## Recommendation
Upgrade to version 1.4.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'eslint-utils'}, 'ecosystem_specific': {'affected_functions': ['eslint-utils.getStaticValue']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mysticatea/eslint-utils/security/advisories/GHSA-3gx7-xhv7-5mx3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15657'}, {'type': 'WEB', 'url': 'https://github.com/mysticatea/eslint-utils/commit/08158db1c98fd71cf0f32ddefbc147e2620e724c'}, {'type': 'WEB', 'url': 'https://eslint.org/blog/2019/08/eslint-v6.2.1-released'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3gx7-xhv7-5mx3'}, {'type': 'PACKAGE', 'url': 'https://github.com/mysticatea/eslint-utils'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1118'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cr5j-953j-xw5p | 2023-08-28T14:05:24Z | 2019-08-19T19:27:23Z | null | ['CVE-2019-5477'] | Nokogiri Command Injection Vulnerability | A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rexical'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5477'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1915'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/5d30128343573a9428c86efc758ba2c66e9f12dc'}, {'type': 'WEB', 'url': 'https://github.com/tenderlove/rexical/commit/a652474dbc66be350055db3e8f9b3a7b3fd75926'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/650835'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-5477.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexical/CVE-2019-5477.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg00019.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-05'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4175-1/'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-19T19:26:57Z', 'nvd_published_at': '2019-08-16T16:15:00Z'} |
1.4.0 | GHSA-8rf6-w2mx-4xjh | 2021-12-03T14:37:54Z | 2019-08-19T23:45:47Z | 2019-08-20T14:13:17Z | ['CVE-2019-15149'] | TODO | ** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'mitogen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15149'}, {'type': 'WEB', 'url': 'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/dw/mitogen'}, {'type': 'WEB', 'url': 'https://mitogen.networkgenomics.com/changelog.html#v0-2-8-2019-08-18'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-19T23:45:21Z', 'nvd_published_at': '2019-08-18T20:15:00Z'} |