schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 24
values | aliases
stringlengths 2
20
| summary
stringlengths 9
130
⌀ | details
stringlengths 34
11.7k
| severity
stringlengths 2
92
| affected
stringlengths 73
3.22k
| references
stringlengths 64
21.2k
| database_specific
stringlengths 131
202
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-w9hw-v97w-g5f5 | 2021-10-01T20:43:23Z | 2020-09-04T16:43:14Z | null | [] | Malicious Package in bitconi-ops | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bitconi-ops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1368'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2xw5-3767-qxvm | 2021-09-30T22:07:45Z | 2020-09-11T21:21:20Z | null | [] | Malicious Package in ng-ui-library | Version 1.0.987 of `ng-ui-library` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ng-ui-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.987'}, {'fixed': '1.0.990'}]}], 'versions': ['1.0.987']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/940'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fx6f-fpfv-5hmc | 2023-07-27T20:11:54Z | 2020-09-03T19:10:12Z | null | [] | Malicious Package in uploader-plugin | Version 1.0.2 of `uploader-plugin` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 1.0.1 | [] | [{'package': {'ecosystem': 'npm', 'name': 'uploader-plugin'}, 'versions': ['1.0.2']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1100'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-48gc-5j93-5cfq | 2020-08-31T18:42:15Z | 2020-09-11T21:15:54Z | null | [] | Path Traversal in serve | Versions of `serve` prior to 10.1.2 are vulnerable to Path Traversal. Explicitly ignored folders can be accessed through relative paths, which allows attackers to access hidden folders and files.
## Recommendation
Upgrade to version 10.1.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/486933'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/965'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cgvm-rvfv-c92r | 2021-10-01T21:01:46Z | 2020-09-03T17:05:51Z | null | [] | Malicious Package in ecuvre | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ecuvre'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1396'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p32g-242c-76h3 | 2023-07-27T00:09:19Z | 2020-09-11T21:14:49Z | null | [] | Malicious Package in geoheat | Version 1.3.2 of `geoheat` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 1.3.1 | [] | [{'package': {'ecosystem': 'npm', 'name': 'geoheat'}, 'versions': ['1.3.2']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/932'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wm7q-rxch-43mx | 2020-08-31T18:29:10Z | 2020-09-01T19:38:33Z | null | [] | Byass due to validation before canonicalization in serve | Versions of `serve` before 6.5.2 are vulnerable to the bypass of the ignore functionality. The bypass is possible because validation happens before canonicalization of paths and filenames.
Example:
Here we have a server that ignores the file test.txt.
```
const serve = require('serve')
const server = serve(__dirname, {
port: 1337,
ignore: ['test.txt']
})
```
Using the URL encoded form of a letter (%65 instead of e) attacker can bypass the ignore control accessing the file.
`curl http://localhost:1337/t%65st.txt`
Additionally this technique can be used to get directory listings of ignored directories.
## Recommendation
Update to version 6.5.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/308721'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/594'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:29:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qv8q-v995-72gr | 2022-09-19T22:54:59Z | 2020-09-09T17:29:38Z | null | [] | personnummer/csharp vulnerable to Improper Input Validation | This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.
The vulnerability is determined to be low severity.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
[C#](https://github.com/advisories/GHSA-qv8q-v995-72gr) 3.0.2
D 3.0.1
[Dart](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm) 3.0.3
Elixir 3.0.0
[Go](https://github.com/advisories/GHSA-hv53-vf5m-8q94) 3.0.1
[Java](https://github.com/advisories/GHSA-q3vw-4jx3-rrr2) 3.3.0
[JavaScript](https://github.com/advisories/GHSA-vpgc-7h78-gx8f) 3.1.0
Kotlin 1.1.0
Lua 3.0.1
[PHP](https://github.com/advisories/GHSA-2p6g-gjp8-ggg9) 3.0.2
Perl 3.0.0
[Python](https://github.com/advisories/GHSA-rxq3-5249-8hgg) 3.0.2
[Ruby](https://github.com/advisories/GHSA-vp9c-fpxx-744v) 3.0.1
[Rust](https://github.com/advisories/GHSA-28r9-pq4c-wp3c) 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev) | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'Personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/personnummer/csharp/security/advisories/GHSA-qv8q-v995-72gr'}, {'type': 'WEB', 'url': 'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/csharp/'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Personnummer/'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-04T16:35:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x45v-pvpg-hcrh | 2021-09-30T20:27:05Z | 2020-09-03T19:54:36Z | null | [] | Malicious Package in mysql-koa | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mysql-koa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1136'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mpjf-8cmf-p789 | 2020-08-31T18:34:28Z | 2020-09-01T21:25:46Z | null | [] | Cross-Site Scripting in jingo | Versions of `jingo` prior to 1.9.2 are vulnerable to Cross-Site Scripting (XSS). If malicious input such as `<script>alert(1)</script>` is placed in the content of a wiki page, Jingo does not properly encode the input and it is executed instead of rendered as text.
## Recommendation
Upgrade to version 1.9.2 | [] | [{'package': {'ecosystem': 'npm', 'name': 'jingo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/750'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4m3j-h8f2-4xh4 | 2021-10-01T20:58:35Z | 2020-09-03T19:41:31Z | null | [] | Malicious Package in coinstrig | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'coinstrig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1384'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j899-348x-h3rq | 2021-09-30T20:27:53Z | 2020-09-03T19:57:54Z | null | [] | Malicious Package in serializes | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'serializes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1139'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6mrq-7r7m-hh4p | 2021-09-30T16:21:58Z | 2020-09-03T22:52:58Z | null | [] | Malicious Package in hs-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hs-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1275'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cr67-78jr-j94p | 2020-08-31T18:46:25Z | 2020-09-03T18:14:47Z | null | [] | Local File Inclusion in domokeeper | All versions of `domokeeper` are vulnerable to Local File Inclusion. The `/plugin/` route passes a GET parameter unsanitized to a `require()` call. It then returns the output of `require()` in the server response. This may allow attackers to load unintended code in the application. It also allows attackers to exfiltrate information in `.json` files.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'domokeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1075'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f8vf-6hwg-hw55 | 2021-10-01T20:38:33Z | 2020-09-04T15:38:21Z | null | [] | Malicious Package in bictore-lib | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bictore-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1357'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jqvv-r4w3-8f7w | 2021-10-01T20:38:02Z | 2020-09-04T15:35:00Z | null | [] | Malicious Package in bictoind-rpc | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bictoind-rpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1355'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-94m7-w873-6wwf | 2023-07-27T20:34:14Z | 2020-09-01T20:28:56Z | null | [] | Malicious Package in modlibrary | Version 0.1.1 of `modlibrary` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 0.1.0 | [] | [{'package': {'ecosystem': 'npm', 'name': 'modlibrary'}, 'versions': ['0.1.1']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/631'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8gv6-g7vp-hr34 | 2023-09-12T18:51:19Z | 2020-09-01T18:58:47Z | null | ['CVE-2017-16047'] | mysqljs is malware | The `mysqljs` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mysqljs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16047'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/494'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:25:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cfwc-xjfp-44jg | 2020-08-31T18:59:23Z | 2020-09-04T17:19:48Z | null | [] | Command Injection in gnuplot | All versions of `gnuplot` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory:
```
var gnuplot = require('gnuplot');
const title = '"\nset title system("touch testing")\n#';
gnuplot()
.set('term png')
.set('output "out.png"')
.set(`title "${title}"`)
.set('xrange [-10:10]')
.set('yrange [-2:2]')
.set('zeroaxis')
.plot('(x/4)**2, sin(x), 1/x')
.end();
```
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'gnuplot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1440'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8qx4-r7fx-xc4v | 2021-10-01T14:08:31Z | 2020-09-11T21:08:19Z | null | [] | Malicious Package in requst | All versions of `requst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'requst'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/865'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xrr6-6ww3-f3qm | 2020-08-31T18:39:27Z | 2020-09-02T21:25:58Z | null | [] | Sandbox Breakout / Arbitrary Code Execution in value-censorship | All versions of `value-censorship` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to validate async function constructors allowing attackers to execute arbitrary code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'value-censorship'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/888'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cch6-5x4h-6qc5 | 2023-09-07T21:59:30Z | 2020-09-01T16:46:04Z | null | ['CVE-2017-16097'] | Directory Traversal in tiny-http | Affected versions of `tiny-http` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tiny-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16097'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/342'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8vj3-jgcf-77jv | 2021-10-01T14:04:42Z | 2020-09-02T20:26:49Z | null | [] | Malicious Package in requeest | All versions of `requeest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'requeest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/858'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4363-x42f-xph6 | 2021-10-01T21:03:00Z | 2020-09-03T17:05:14Z | null | [] | Malicious Package in hw-trnasport-u2f | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'hw-trnasport-u2f'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1400'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hfc6-79wv-5hpw | 2021-09-24T16:47:49Z | 2020-09-01T19:48:13Z | null | [] | Malicious Package in blingjs | Version 0.0.4 of `blingjs` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.4 of this module is found installed you will want to replace it with a version before or after 0.0.4. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'blingjs'}, 'versions': ['0.0.4']}] | [{'type': 'PACKAGE', 'url': 'https://github.com/jamiller619/blingjs'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BLINGJS-451007'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/619'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-whjr-jj69-7prm | 2021-09-30T20:15:59Z | 2020-09-03T19:44:35Z | null | [] | Malicious Package in import-mysql | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'import-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1127'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pjxp-f379-6284 | 2023-07-27T20:15:13Z | 2020-09-03T19:13:27Z | null | [] | Malicious Package in @fangrong/xoc | Version 1.0.6 of `@fangrong/xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 1.0.5 | [] | [{'package': {'ecosystem': 'npm', 'name': '@fangrong/xoc'}, 'versions': ['1.0.6']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1104'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-884p-74jh-xrg2 | 2020-08-31T18:59:05Z | 2020-09-04T16:57:20Z | null | [] | Command Injection in tree-kill | Versions of `tree-kill` prior to 1.2.2 are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems.
## Recommendation
Upgrade to version 1.2.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'tree-kill'}, 'ecosystem_specific': {'affected_functions': ['tree-kill']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pkrumins/node-tree-kill/commit/deee138a8cbc918463d8af5ce8c2bec33c3fd164'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/701183'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1432'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j8r2-2x94-2q67 | 2021-09-28T16:59:50Z | 2020-09-11T21:19:09Z | null | [] | Cross-Site Scripting in diagram-js-direct-editing | Versions of `diagram-js-direct-editing` prior to 1.4.3 are vulnerable to Cross-Site Scripting. The package fails to sanitize input from the clipboard, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 1.4.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'diagram-js-direct-editing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/bpmn-io/diagram-js-direct-editing'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/983'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p77h-hv6g-fmfp | 2021-09-29T18:49:03Z | 2020-09-03T20:43:16Z | null | [] | Sensitive Data Exposure in ibm_db | Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode.
## Recommendation
Upgrade to version 2.6.0 or later and ensure sensitive information was not logged. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ibm_db'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ibmdb/node-ibm_db/issues/563'}, {'type': 'WEB', 'url': 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibmdb/node-ibm_db'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1185'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vp8g-53fw-r9f2 | 2021-09-24T17:28:16Z | 2020-09-01T19:54:44Z | null | [] | Malicious Package in dynamo-schema | Version 0.0.3 of `dynamo-schema` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.3 of this module is found installed you will want to replace it with a version before or after 0.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'dynamo-schema'}, 'versions': ['0.0.3']}] | [{'type': 'PACKAGE', 'url': 'https://github.com/andrewjstone/dynamo-schema'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DYNAMOSCHEMA-450992'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/626'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w6xj-45gv-fw35 | 2023-07-27T20:12:24Z | 2020-09-02T15:57:06Z | null | [] | Malicious Package in stream-combine | Version 2.0.2 of `stream-combine` has malicious code design to steal credentials and credit card information. The code searches all form elements for passwords, credit card numbers and CVC codes. It then uploads the information to a remote server using HTML links embedded in the page or form actions. If your application has Content Security Policy set you are not affected by this issue.
## Recommendation
This package is not available on the npm Registry anymore. If you used this module and your application processed credentials or credit card information, it is possible that information was stolen.
Users may consider downgrading to version 2.0.1 | [] | [{'package': {'ecosystem': 'npm', 'name': 'stream-combine'}, 'versions': ['2.0.2']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/774'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9gxr-rhx6-4jgv | 2020-08-31T18:55:36Z | 2020-09-04T15:18:57Z | null | [] | Sandbox Breakout / Prototype Pollution in notevil | Versions of `notevil` prior to 1.3.3 are vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing attacker to add or modify an object's prototype.
Evaluating the payload ```try{a[b];}catch(e){e.constructor.constructor('return __proto__.arguments.callee.__proto__.polluted=true')()}``` add the `polluted` property to Function.
## Recommendation
Upgrade to version 1.3.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'notevil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1338'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qcc9-q247-3m2m | 2021-09-30T20:17:10Z | 2020-09-03T19:46:49Z | null | [] | Malicious Package in js-regular | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-regular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1129'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-59x8-7wx6-4hj9 | 2021-09-30T20:01:35Z | 2020-09-03T17:47:52Z | null | [] | Malicious Package in secure_identity_login_module | All versions of `secure_identity_login_module` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'secure_identity_login_module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1063'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ch52-vgq2-943f | 2020-08-31T18:46:28Z | 2020-09-03T18:15:53Z | null | [] | Regular Expression Denial of Service in marked | Affected versions of `marked` are vulnerable to Regular Expression Denial of Service (ReDoS). The `_label` subrule may significantly degrade parsing performance of malformed input.
## Recommendation
Upgrade to version 0.7.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1076'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m25q-fwg4-9v2p | 2021-09-24T16:36:57Z | 2020-09-01T19:47:07Z | null | [] | Malicious Package in awesome_react_utility | Version 1.0.2 of `awesome_react_utility` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'awesome_react_utility'}, 'versions': ['1.0.2']}] | [{'type': 'PACKAGE', 'url': 'https://github.com/kooinam/awesome_react_utility'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/618'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8jf2-cq6v-w234 | 2021-09-29T20:47:08Z | 2020-09-03T21:10:53Z | null | [] | Malicious Package in uglyfi.js | Version 0.17.3 of `uglyfi.js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'uglyfi.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1202'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8j49-49jq-vwcq | 2020-08-31T18:55:30Z | 2020-09-04T15:15:34Z | null | [] | Prototype Pollution in getsetdeep | All versions of `getsetdeep` are vulnerable to prototype pollution. The `setDeep()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'getsetdeep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1334'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xmmp-hrmx-x5g7 | 2021-09-30T21:37:37Z | 2020-09-02T21:32:22Z | null | [] | Malicious Package in bowe | Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'bowe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/899'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wc7q-qpm4-8pqv | 2021-10-01T14:07:12Z | 2020-09-02T20:32:10Z | null | [] | Malicious Package in rrequest | All versions of `rrequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'rrequest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/862'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x8m7-cv39-xmg9 | 2021-09-30T16:35:22Z | 2020-09-03T22:56:10Z | null | [] | Malicious Package in jq-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jq-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1278'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4jfq-q299-g4cr | 2021-10-01T14:06:36Z | 2020-09-02T20:28:57Z | null | [] | Malicious Package in reqquest | All versions of `reqquest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'reqquest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/860'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hg5q-rj62-c43g | 2021-09-30T21:26:33Z | 2020-09-02T21:29:08Z | null | [] | Malicious Package in reqest | All versions of `reqest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'reqest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/895'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p3jx-g34v-q56j | 2021-09-30T16:31:54Z | 2020-09-03T22:54:02Z | null | [] | Malicious Package in j3-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'j3-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1276'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2fwq-wx47-hm6x | 2021-10-01T20:30:20Z | 2020-09-04T15:31:39Z | null | [] | Malicious Package in bcion | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bcion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1352'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9chw-xrwx-f86j | 2023-09-13T22:54:41Z | 2020-09-01T16:07:53Z | null | ['CVE-2016-10649'] | frames-compiler downloads Resources over HTTP | Affected versions of `frames-compiler` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `frames-compiler`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'frames-compiler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10649'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/247'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:16:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wjf2-7f9g-86f5 | 2021-09-30T20:05:43Z | 2020-09-03T18:23:38Z | null | [] | Malicious Package in fast-requests | All versions of `fast-requests` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fast-requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1086'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cqv6-7fwc-8m3c | 2023-09-11T23:14:59Z | 2020-09-01T16:44:59Z | null | ['CVE-2017-16091'] | Directory Traversal in xtalk | Affected versions of `xtalk` are vulnerable to directory traversal, allowing access to the filesystem by placing "../" in the URL.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:localhost
```
## Recommendation
No patch is currently available for this vulnerability, and the package has not been updated since 2014.
The best mitigation is currently to avoid using this package, and using a different, functionally equivalent package. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'xtalk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16091'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/339'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h3m2-h22h-695r | 2021-09-30T17:49:52Z | 2020-09-03T17:29:31Z | null | [] | Malicious Package in ali-contributor | All versions of `ali-contributor` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ali-contributor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1045'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g87g-4x3w-f8jp | 2023-09-08T18:50:49Z | 2020-09-01T16:51:28Z | null | ['CVE-2017-16105'] | Directory Traversal in serverwzl | Affected versions of `serverwzl` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serverwzl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16105'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/363'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f3vw-587g-r29g | 2020-08-31T19:01:20Z | 2020-09-03T15:50:38Z | null | [] | Path Traversal in sapper | Versions of `sapper` prior to 0.27.11 are vulnerable to Path Traversal. It is possible to access sensitive files on the server through HTTP requests containing URL-encoded `../`.
You may test a `sapper` application running in prod mode with `curl -vvv http://localhost:3000/client/750af05c3a69ddc6073a/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/etc/passwd`.
## Recommendation
Upgrade to version 0.27.11 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'sapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.11'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1494'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qv78-398w-cxp7 | 2021-09-30T22:00:05Z | 2020-09-11T21:08:19Z | null | [] | Malicious Package in shrugging-logging | All versions of `shrugging-logging` contain malicious code as a postinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking,
## Recommendation
Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'shrugging-logging'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/920'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4x6x-782q-jfc4 | 2020-08-31T18:41:45Z | 2020-09-03T02:38:47Z | null | [] | Command Injection in node-wifi | Versions of `node-wifi` prior to 2.0.12 are vulnerable to Command Injection. The package fails to sanitize user input, allowing attackers to inject commands through the `ssid` variable and possibly achieving Remote Code Execution on the system.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'node-wifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.12'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/952'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7frr-c83r-fm22 | 2021-09-29T21:26:37Z | 2020-09-03T22:20:49Z | null | [] | Malicious Package in buffez-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffez-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1259'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-73hr-6785-f5p8 | 2021-09-30T21:24:59Z | 2020-09-02T21:24:55Z | null | [] | Malicious Package in donotinstallthis | The package `donotinstallthis` contained malicious code. The package contained a script that was run as part of the install script. The script contacted a remote service tracking how many installations were done. There is no further compromise.
## Recommendation
Remove the package from your environment. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'donotinstallthis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/887'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-frcq-4ffq-v4mw | 2023-09-11T20:34:25Z | 2020-09-01T18:12:07Z | null | ['CVE-2017-16211'] | Directory Traversal in lessindex | Affected versions of `lessindex` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'lessindex'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16211'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lessindex'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/423'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8hmr-w35f-3qgj | 2021-09-29T20:46:19Z | 2020-09-03T21:07:37Z | null | [] | Malicious Package in harmlesspackage | Version 0.0.1 of `harmlesspackage` contains malicious code as a postinstall script. The package printed a message to the console and performed a GET request to a remote server.
## Recommendation
Remove the package from your environment. There is no evidence of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'harmlesspackage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1199'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7ww4-c3mj-93cf | 2021-01-14T15:56:19Z | 2020-09-01T16:16:33Z | null | ['CVE-2016-10693'] | Downloads Resources over HTTP in pm2-kafka | Affected versions of `pm2-kafka` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pm2-kafka`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'pm2-kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10693'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/299'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gjhx-gxwx-jx9j | 2021-09-23T21:33:49Z | 2020-09-01T15:35:22Z | null | ['CVE-2016-1000234'] | Cross-Site Scripting in jqtree | Affected versions of `jqtree` are vulnerable to cross-site scripting in the drag and drop functionality for modifying tree data.
When a user attempts to drag a node to a different position in the hierarchy, script content existing within the node will be executed.
## Recommendation
Update to 1.3.4 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jqtree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000234'}, {'type': 'WEB', 'url': 'https://github.com/mbraak/jqTree/issues/437'}, {'type': 'PACKAGE', 'url': 'https://github.com/mbraak/jqTree'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/132'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9mjp-gv34-3jcf | 2021-10-01T13:55:21Z | 2020-09-02T18:37:35Z | null | [] | Malicious Package in aasync | All versions of `aasync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'aasync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/844'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-876r-hj45-fw7g | 2020-08-31T18:51:25Z | 2020-09-03T21:18:41Z | null | [] | Sandbox Breakout / Arbitrary Code Execution in safer-eval | All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. It is possible to escape the sandbox by forcing exceptions recursively in the evaluated code. This may allow attacker to execute arbitrary code in the system.
## Recommendation
The package is not suited to receive arbitrary user input. Consider using an alternative package. | [] | [{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://gist.github.com/JLLeitschuh/609bb2efaff22ed84fe182cf574c023a'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1221'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vpgc-7h78-gx8f | 2022-09-19T22:54:30Z | 2020-09-04T18:05:14Z | null | [] | personnummer/js vulnerable to Improper Input Validation | This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.
The vulnerability is determined to be low severity.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
[C#](https://github.com/advisories/GHSA-qv8q-v995-72gr) 3.0.2
D 3.0.1
[Dart](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm) 3.0.3
Elixir 3.0.0
[Go](https://github.com/advisories/GHSA-hv53-vf5m-8q94) 3.0.1
[Java](https://github.com/advisories/GHSA-q3vw-4jx3-rrr2) 3.3.0
[JavaScript](https://github.com/advisories/GHSA-vpgc-7h78-gx8f) 3.1.0
Kotlin 1.1.0
Lua 3.0.1
[PHP](https://github.com/advisories/GHSA-2p6g-gjp8-ggg9) 3.0.2
Perl 3.0.0
[Python](https://github.com/advisories/GHSA-rxq3-5249-8hgg) 3.0.2
[Ruby](https://github.com/advisories/GHSA-vp9c-fpxx-744v) 3.0.1
[Rust](https://github.com/advisories/GHSA-28r9-pq4c-wp3c) 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev) | [] | [{'package': {'ecosystem': 'npm', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/personnummer/js/security/advisories/GHSA-vpgc-7h78-gx8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/js/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/personnummer'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-04T16:24:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-674r-xx4c-gj7x | 2021-10-04T14:28:19Z | 2020-09-03T17:04:05Z | null | [] | Malicious Package in sb58 | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sb58'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1406'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-563h-49v8-g7x4 | 2021-10-01T16:10:30Z | 2020-09-03T23:17:01Z | null | [] | Malicious Package in ks-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ks-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1297'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-779f-wgxg-qr8f | 2020-08-31T18:46:16Z | 2020-09-03T18:10:22Z | null | [] | Prototype Pollution in lodash.mergewith | Versions of `lodash.mergewith` before 4.6.2 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'lodash.mergewith'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1071'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m2fp-c79h-rr79 | 2021-09-30T21:56:28Z | 2020-09-02T21:42:56Z | null | [] | Malicious Package in tensorplow | All versions of `tensorplow` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'tensorplow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/910'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-96qc-ghj4-rq27 | 2023-09-13T20:25:04Z | 2020-09-01T18:24:56Z | null | ['CVE-2017-16219'] | Directory Traversal in yttivy | Affected versions of `yttivy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'yttivy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16219'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208101732/https://www.npmjs.com/advisories/441'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c722-pv5w-cfg2 | 2023-07-27T20:17:08Z | 2020-09-11T21:20:14Z | null | [] | Malicious Package in github-jquery-widgets | Version 0.1.2 of `github-jquery-widgets` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 0.1.1 | [] | [{'package': {'ecosystem': 'npm', 'name': 'github-jquery-widgets'}, 'versions': ['0.1.2']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/933'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-785g-gx74-gr39 | 2021-10-01T14:35:20Z | 2020-09-03T23:12:48Z | null | [] | Malicious Package in js-wha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-wha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1294'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2r7f-4h2c-5x73 | 2023-09-11T16:45:35Z | 2020-09-01T16:38:33Z | null | ['CVE-2016-1000249'] | fury-adapter-swagger allows arbitrary file read from system | `fury-adapter-swagger` from version 0.2.0 until version 0.9.7 has a weakness that allows an attacker to read arbitrary files off of the system. This can be used to read sensitive data, or to cause a denial of service condition by attempting to read something like `/dev/zero`.
## Proof of Concept:
```yaml
---
swagger: '2.0'
info:
title: Read local files
version: '1.0'
paths:
/foo:
get:
responses:
200:
description: Some description
examples:
text/html:
example:
$ref: '/etc/passwd'
```
## Recommendation
Upgrade to version 0.9.7 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'fury-adapter-swagger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.9.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apiaryio/fury-adapter-swagger/pull/89'}, {'type': 'WEB', 'url': 'https://github.com/apiaryio/fury-adapter-swagger/commit/777e2d68f03546a88f3203bbd4725df8b1f662a7'}, {'type': 'WEB', 'url': 'https://github.com/apiaryio/fury-adapter-swagger/commit/f4407e3a5323bc31123d45dbc93b8417002e4d51#diff-54c345dc104dc19440f9c2482b7883df820e8b9b699fdd8fa07e2773e7197a29'}, {'type': 'PACKAGE', 'url': 'https://github.com/apiaryio/fury-adapter-swagger'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/npm:fury-adapter-swagger:20161024'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/305'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-25v4-mcx4-hh35 | 2020-08-31T18:59:41Z | 2020-09-04T17:28:28Z | null | [] | Cross-Site Scripting in atlasboard-atlassian-package | All versions of `atlasboard-atlassian-package` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize user input that is rendered as HTML, which may allow attackers to execute arbitrary JavaScript in a victim's browser. This requires attackers being able to change issue summaries in Jira tickets.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'atlasboard-atlassian-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/456702'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1449'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mvch-rh6h-2m47 | 2021-10-01T14:09:54Z | 2020-09-11T21:10:29Z | null | [] | Malicious Package in equest | All versions of `equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'equest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/867'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h5mp-5q4p-ggf5 | 2020-08-31T18:46:09Z | 2020-09-03T18:07:05Z | null | [] | Prototype Pollution in lodash.defaultsdeep | Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'lodash.defaultsdeep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1068'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xfmw-2vmm-579c | 2023-09-05T23:05:17Z | 2020-09-01T18:59:50Z | null | ['CVE-2017-16080'] | Nodesass is malware | The `nodesass` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [] | [{'package': {'ecosystem': 'npm', 'name': 'nodesass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16080'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208091202/https://www.npmjs.com/advisories/519'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:26:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5vj8-3v2h-h38v | 2022-04-28T19:57:43Z | 2020-09-04T18:04:08Z | null | [] | Remote Code Execution in next | Versions of `next` prior to 5.1.0 are vulnerable to Remote Code Execution. The `/path:` route fails to properly sanitize input and passes it to a `require()` call. This allows attackers to execute JavaScript code on the server. Note that prior version 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
## Recommendation
Upgrade to version 5.1.0. | [] | [{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.9'}, {'fixed': '5.1.0'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1538'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:02:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fqw7-8v6m-2f86 | 2021-09-30T21:54:46Z | 2020-09-02T21:37:39Z | null | [] | Malicious Package in hulp | All versions of `hulp` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hulp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/905'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g7h8-p22m-2rvx | 2020-08-31T18:55:16Z | 2020-09-04T15:08:46Z | null | [] | Prototype Pollution in flat-wrap | All versions of `flat-wrap` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'flat-wrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1327'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hfq9-rfpv-j8r8 | 2021-09-23T21:42:30Z | 2020-09-01T16:49:19Z | null | ['CVE-2017-16034'] | Command Injection in pidusage | Affected versions of `pidusage` pass unsanitized input to `child_process.exec()`, resulting in arbitrary code execution in the `ps` method.
This package is vulnerable to this PoC on Darwin, SunOS, FreeBSD, and AIX.
Windows and Linux are not vulnerable.
## Proof of Concept
```
var pid = require('pidusage');
pid.stat('1 && /usr/local/bin/python');
```
## Recommendation
Update to version 1.1.5 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'pidusage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16034'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/356'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qvhr-55hg-3qwv | 2021-10-04T21:20:31Z | 2020-09-23T17:20:39Z | null | [] | Non-persistent XSS in the Storefront in Shopware | ### Impact
Non-persistent XSS in the Storefront
### Patches
We recommend to update to the current version 6.3.1.1. You can get the update to 6.3.1.1 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### References
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020 | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.1.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-qvhr-55hg-3qwv'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-23T15:02:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jp99-5h8w-gmxc | 2020-08-31T18:55:02Z | 2020-09-04T15:03:13Z | null | [] | Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm | All versions of `@zhaoyao91/eval-in-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': '@zhaoyao91/eval-in-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1320'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4hjg-w3ww-38c6 | 2021-09-30T20:01:59Z | 2020-09-03T18:03:49Z | null | [] | Malicious Package in tiar | All versions of `tiar` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'tiar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1064'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-388g-jwpg-x6j4 | 2021-09-28T17:00:22Z | 2020-09-11T21:20:14Z | null | [] | Cross-Site Scripting in swagger-ui | Versions of `swagger-ui` prior to 3.0.13 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize YAML files imported from URLs or copied-pasted. This may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 3.0.13 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/3163'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449941'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/985'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5p98-wpc9-g498 | 2022-06-22T19:28:32Z | 2020-09-04T15:21:32Z | null | [] | Server-Side Request Forgery in html-pdf-chrome | ## Recommendation
This package is working as intended. A [Security](https://github.com/westy92/html-pdf-chrome#security) section has been added since v0.6.1 to detail proper usage of this library. Npm has revoked their advisory altogether.
## Original Advisory
All versions of `html-pdf-chrome` are vulnerable to Server-Side Request Forgery (SSRF). The package executes HTTP requests if the parsed HTML contains external references to resources, such as `<iframe src="http://localhost" height="800px" width="800px"></iframe>`. This allows attackers to access resources through HTTP that are accessible to the server, including private resources in the hosting environment. | [] | [{'package': {'ecosystem': 'npm', 'name': 'html-pdf-chrome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/westy92/html-pdf-chrome/issues/249'}, {'type': 'PACKAGE', 'url': 'https://github.com/westy92/html-pdf-chrome'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1339'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vv52-3mrp-455m | 2020-08-31T19:01:56Z | 2020-09-03T15:53:36Z | null | [] | Malicious Package in m-backdoor | All versions of `m-backdoor` contain malicious code. The package downloads a file from a remote server and executes it as a preinstall script. At the time of the release of this advisory the downloaded file only defaces websites by removing elements randomly from the DOM.
## Recommendation
Remove the package from your system. | [] | [{'package': {'ecosystem': 'npm', 'name': 'm-backdoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1513'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c3h5-qchh-46hh | 2023-09-11T16:37:27Z | 2020-09-01T17:30:17Z | null | ['CVE-2017-16167'] | Directory Traversal in yyooopack | Affected versions of `yyooopack` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'yyooopack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16167'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yyooopack'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/400'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vpj4-89q8-rh38 | 2020-08-31T18:46:32Z | 2020-09-03T18:16:59Z | null | [] | Cross-Site Scripting in bpmn-js-properties-panel | Versions of `bpmn-js-properties-panel` prior to 0.31.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.
## Recommendation
Upgrade to version 0.31.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'bpmn-js-properties-panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1079'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mvmf-cvfx-qg55 | 2021-09-23T21:06:09Z | 2020-09-01T15:16:43Z | null | ['CVE-2014-8881'] | Regular Expression Denial of Service in bleach | All versions of the `bleach` package are vulnerable to a regular expression denial of service attack when certain types of input are passed into the sanitize function.
## Recommendation
The `bleach` package is not currently maintained, and has not seen an update since 2014.
To mitigate this issue, it is necessary to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=html%20sanitizer&page=1&ranking=optimal). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8881'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:bleach:20151024'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/47'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rw4r-h883-8pf9 | 2021-10-01T14:06:53Z | 2020-09-02T20:30:02Z | null | [] | Malicious Package in reequest | All versions of `reequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'reequest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/861'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h2j3-gg8w-4858 | 2021-09-29T21:12:39Z | 2020-09-03T22:12:09Z | null | [] | Malicious Package in buffer-xos | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffer-xos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1251'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r87w-47m8-22w3 | 2023-09-07T20:41:26Z | 2020-09-01T15:24:24Z | null | ['CVE-2016-3942'] | Template Injection in jsrender | Affected versions of `jsrender` are susceptible to a remote code execution vulnerability when used with server delivered client-side tempates which dynamically embed user input.
## Proof of Concept
```js
//POC-REQUEST
{{for ~x!=1?(constructor.constructor("return arguments.callee.caller")()):~y(10)}}
{{:#data}}
{{/for}}
```
```js
//POC-RESPONSE
function anonymous(data,view,j,u) { // template var v,t=j._tag,ret="" +t("for",view,this,[ {view:view,tmpl:1, params:{args:['~x!=1?(constructor.constructor(\"return arguments.callee.caller\")()):~y(10)']}, args:[view.hlp("x")!=1?(data.constructor.constructor("return arguments.callee.caller")()):view.hlp("y")(10)], props:{}}]); return ret; }
```
## Recommendation
Update to version 0.9.74 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsrender'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.74'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.73'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3942'}, {'type': 'WEB', 'url': 'https://github.com/BorisMoore/jsrender/commit/f984e139deb0a7648d5b543860ec652c21f6dcf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/BorisMoore/jsrender'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-JSRENDER-60173'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/97'}] | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:10:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qjfh-xc44-rm9x | 2020-08-31T18:43:54Z | 2020-09-03T16:49:43Z | null | [] | Path Traversal in file-static-server | All versions of `file-static-server` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| [] | [{'package': {'ecosystem': 'npm', 'name': 'file-static-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/310671'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1008'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wfw3-rgfr-6g67 | 2023-03-24T21:26:31Z | 2020-09-01T16:40:42Z | null | ['CVE-2017-16009'] | XSS via Angular Expression in ag-grid | Affected versions of `ag-grid` are vulnerable to Cross-site Scripting (XSS) via Angular Expressions, if used in combination with AngularJS.
## Recommendation
Avoid using `ag-grid` in combination with AngularJS until a fix is available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ag-grid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '18.1.3-beta.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16009'}, {'type': 'WEB', 'url': 'https://github.com/ceolter/ag-grid/issues/1287'}, {'type': 'PACKAGE', 'url': 'https://github.com/ag-grid/ag-grid'}, {'type': 'WEB', 'url': 'https://spring.io/blog/2016/01/28/angularjs-escaping-the-expression-sandbox-for-xss'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:26Z', 'nvd_published_at': '2018-06-04T19:29:00Z'} |
1.4.0 | GHSA-j5qg-46p9-w2rp | 2023-07-27T20:37:08Z | 2020-09-03T00:33:32Z | null | [] | Malicious Package in jekyll-for-github-projects | Version 0.2.12 of `jekyll-for-github-projects` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 0.2.11 | [] | [{'package': {'ecosystem': 'npm', 'name': 'jekyll-for-github-projects'}, 'versions': ['0.2.12']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/936'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xf64-2f9p-6pqq | 2020-08-31T18:59:32Z | 2020-09-04T17:24:08Z | null | [] | Information Exposure in type-graphql | Versions of `type-graphql` prior to 0.17.6 are vulnerable to Information Exposure. The package leaks the resolver source code in an error message. It is possible to force this error when no subscription topics are provided in the request.
## Recommendation
Upgrade to version 0.17.6 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'type-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/MichalLytek/type-graphql/issues/489'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1444'}] | {'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qh32-6jjc-qprm | 2021-08-26T15:19:19Z | 2020-09-25T18:28:46Z | null | ['CVE-2020-15209'] | Null pointer dereference in tensorflow-lite | ### Impact
A crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/core/subgraph.cc#L1224-L1227
However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference.
### Patches
We have patched the issue in 0b5662bc and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360 but was also discovered through variant analysis of [GHSA-cvpc-8phh-8f45](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15209'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T18:13:03Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-fw76-p9p2-6pvf | 2021-09-30T20:28:12Z | 2020-09-03T19:58:58Z | null | [] | Malicious Package in serilize | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'serilize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1140'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gvff-25cc-4f66 | 2020-08-31T18:44:58Z | 2020-09-03T17:15:56Z | null | [] | Path Traversal in restify-swagger-jsdoc | Versions of `restify-swagger-jsdoc` prior to 3.2.1 are vulnerable to Path Traversal. The package fails to properly sanitize URLs, which may allow attackers to access server files outside the `swagger-ui` folder by using relative paths.
## Recommendation
Upgrade to version 3.2.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'restify-swagger-jsdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1037'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6c37-2rw5-9j7x | 2021-10-01T14:04:27Z | 2020-09-02T20:25:46Z | null | [] | Malicious Package in requesst | All versions of `requesst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'requesst'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/857'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-563h-697m-j7x5 | 2023-07-27T20:36:07Z | 2020-09-03T19:18:58Z | null | [] | Malicious Package in device-mqtt | Version 1.0.11 of `device-mqtt` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 1.0.10 | [] | [{'package': {'ecosystem': 'npm', 'name': 'device-mqtt'}, 'versions': ['1.0.11']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1109'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:35Z', 'nvd_published_at': None} |