schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
24 values
aliases
stringlengths
2
20
summary
stringlengths
9
130
details
stringlengths
34
11.7k
severity
stringlengths
2
92
affected
stringlengths
73
3.22k
references
stringlengths
64
21.2k
database_specific
stringlengths
131
202
1.4.0
GHSA-w9hw-v97w-g5f5
2021-10-01T20:43:23Z
2020-09-04T16:43:14Z
null
[]
Malicious Package in bitconi-ops
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bitconi-ops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1368'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:41Z', 'nvd_published_at': None}
1.4.0
GHSA-2xw5-3767-qxvm
2021-09-30T22:07:45Z
2020-09-11T21:21:20Z
null
[]
Malicious Package in ng-ui-library
Version 1.0.987 of `ng-ui-library` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ng-ui-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.987'}, {'fixed': '1.0.990'}]}], 'versions': ['1.0.987']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/940'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:17Z', 'nvd_published_at': None}
1.4.0
GHSA-fx6f-fpfv-5hmc
2023-07-27T20:11:54Z
2020-09-03T19:10:12Z
null
[]
Malicious Package in uploader-plugin
Version 1.0.2 of `uploader-plugin` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 1.0.1
[]
[{'package': {'ecosystem': 'npm', 'name': 'uploader-plugin'}, 'versions': ['1.0.2']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1100'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:14Z', 'nvd_published_at': None}
1.4.0
GHSA-48gc-5j93-5cfq
2020-08-31T18:42:15Z
2020-09-11T21:15:54Z
null
[]
Path Traversal in serve
Versions of `serve` prior to 10.1.2 are vulnerable to Path Traversal. Explicitly ignored folders can be accessed through relative paths, which allows attackers to access hidden folders and files. ## Recommendation Upgrade to version 10.1.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/486933'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/965'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:42:15Z', 'nvd_published_at': None}
1.4.0
GHSA-cgvm-rvfv-c92r
2021-10-01T21:01:46Z
2020-09-03T17:05:51Z
null
[]
Malicious Package in ecuvre
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ecuvre'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1396'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:46Z', 'nvd_published_at': None}
1.4.0
GHSA-p32g-242c-76h3
2023-07-27T00:09:19Z
2020-09-11T21:14:49Z
null
[]
Malicious Package in geoheat
Version 1.3.2 of `geoheat` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 1.3.1
[]
[{'package': {'ecosystem': 'npm', 'name': 'geoheat'}, 'versions': ['1.3.2']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/932'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:59Z', 'nvd_published_at': None}
1.4.0
GHSA-wm7q-rxch-43mx
2020-08-31T18:29:10Z
2020-09-01T19:38:33Z
null
[]
Byass due to validation before canonicalization in serve
Versions of `serve` before 6.5.2 are vulnerable to the bypass of the ignore functionality. The bypass is possible because validation happens before canonicalization of paths and filenames. Example: Here we have a server that ignores the file test.txt. ``` const serve = require('serve') const server = serve(__dirname, { port: 1337, ignore: ['test.txt'] }) ``` Using the URL encoded form of a letter (%65 instead of e) attacker can bypass the ignore control accessing the file. `curl http://localhost:1337/t%65st.txt` Additionally this technique can be used to get directory listings of ignored directories. ## Recommendation Update to version 6.5.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/308721'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/594'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:29:10Z', 'nvd_published_at': None}
1.4.0
GHSA-qv8q-v995-72gr
2022-09-19T22:54:59Z
2020-09-09T17:29:38Z
null
[]
personnummer/csharp vulnerable to Improper Input Validation
This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure. The vulnerability is determined to be low severity. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: [C#](https://github.com/advisories/GHSA-qv8q-v995-72gr) 3.0.2 D 3.0.1 [Dart](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm) 3.0.3 Elixir 3.0.0 [Go](https://github.com/advisories/GHSA-hv53-vf5m-8q94) 3.0.1 [Java](https://github.com/advisories/GHSA-q3vw-4jx3-rrr2) 3.3.0 [JavaScript](https://github.com/advisories/GHSA-vpgc-7h78-gx8f) 3.1.0 Kotlin 1.1.0 Lua 3.0.1 [PHP](https://github.com/advisories/GHSA-2p6g-gjp8-ggg9) 3.0.2 Perl 3.0.0 [Python](https://github.com/advisories/GHSA-rxq3-5249-8hgg) 3.0.2 [Ruby](https://github.com/advisories/GHSA-vp9c-fpxx-744v) 3.0.1 [Rust](https://github.com/advisories/GHSA-28r9-pq4c-wp3c) 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev)
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'Personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/personnummer/csharp/security/advisories/GHSA-qv8q-v995-72gr'}, {'type': 'WEB', 'url': 'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/csharp/'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Personnummer/'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-04T16:35:07Z', 'nvd_published_at': None}
1.4.0
GHSA-x45v-pvpg-hcrh
2021-09-30T20:27:05Z
2020-09-03T19:54:36Z
null
[]
Malicious Package in mysql-koa
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mysql-koa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1136'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:34Z', 'nvd_published_at': None}
1.4.0
GHSA-mpjf-8cmf-p789
2020-08-31T18:34:28Z
2020-09-01T21:25:46Z
null
[]
Cross-Site Scripting in jingo
Versions of `jingo` prior to 1.9.2 are vulnerable to Cross-Site Scripting (XSS). If malicious input such as `<script>alert(1)</script>` is placed in the content of a wiki page, Jingo does not properly encode the input and it is executed instead of rendered as text. ## Recommendation Upgrade to version 1.9.2
[]
[{'package': {'ecosystem': 'npm', 'name': 'jingo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/750'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:28Z', 'nvd_published_at': None}
1.4.0
GHSA-4m3j-h8f2-4xh4
2021-10-01T20:58:35Z
2020-09-03T19:41:31Z
null
[]
Malicious Package in coinstrig
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'coinstrig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1384'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:18Z', 'nvd_published_at': None}
1.4.0
GHSA-j899-348x-h3rq
2021-09-30T20:27:53Z
2020-09-03T19:57:54Z
null
[]
Malicious Package in serializes
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'serializes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1139'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:41Z', 'nvd_published_at': None}
1.4.0
GHSA-6mrq-7r7m-hh4p
2021-09-30T16:21:58Z
2020-09-03T22:52:58Z
null
[]
Malicious Package in hs-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hs-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1275'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:24Z', 'nvd_published_at': None}
1.4.0
GHSA-cr67-78jr-j94p
2020-08-31T18:46:25Z
2020-09-03T18:14:47Z
null
[]
Local File Inclusion in domokeeper
All versions of `domokeeper` are vulnerable to Local File Inclusion. The `/plugin/` route passes a GET parameter unsanitized to a `require()` call. It then returns the output of `require()` in the server response. This may allow attackers to load unintended code in the application. It also allows attackers to exfiltrate information in `.json` files. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'domokeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1075'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:25Z', 'nvd_published_at': None}
1.4.0
GHSA-f8vf-6hwg-hw55
2021-10-01T20:38:33Z
2020-09-04T15:38:21Z
null
[]
Malicious Package in bictore-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bictore-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1357'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:16Z', 'nvd_published_at': None}
1.4.0
GHSA-jqvv-r4w3-8f7w
2021-10-01T20:38:02Z
2020-09-04T15:35:00Z
null
[]
Malicious Package in bictoind-rpc
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bictoind-rpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1355'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:11Z', 'nvd_published_at': None}
1.4.0
GHSA-94m7-w873-6wwf
2023-07-27T20:34:14Z
2020-09-01T20:28:56Z
null
[]
Malicious Package in modlibrary
Version 0.1.1 of `modlibrary` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 0.1.0
[]
[{'package': {'ecosystem': 'npm', 'name': 'modlibrary'}, 'versions': ['0.1.1']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/631'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:35Z', 'nvd_published_at': None}
1.4.0
GHSA-8gv6-g7vp-hr34
2023-09-12T18:51:19Z
2020-09-01T18:58:47Z
null
['CVE-2017-16047']
mysqljs is malware
The `mysqljs` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mysqljs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16047'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/494'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:25:17Z', 'nvd_published_at': None}
1.4.0
GHSA-cfwc-xjfp-44jg
2020-08-31T18:59:23Z
2020-09-04T17:19:48Z
null
[]
Command Injection in gnuplot
All versions of `gnuplot` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory: ``` var gnuplot = require('gnuplot'); const title = '"\nset title system("touch testing")\n#'; gnuplot() .set('term png') .set('output "out.png"') .set(`title "${title}"`) .set('xrange [-10:10]') .set('yrange [-2:2]') .set('zeroaxis') .plot('(x/4)**2, sin(x), 1/x') .end(); ``` ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'gnuplot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1440'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:23Z', 'nvd_published_at': None}
1.4.0
GHSA-8qx4-r7fx-xc4v
2021-10-01T14:08:31Z
2020-09-11T21:08:19Z
null
[]
Malicious Package in requst
All versions of `requst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'requst'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/865'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:41Z', 'nvd_published_at': None}
1.4.0
GHSA-xrr6-6ww3-f3qm
2020-08-31T18:39:27Z
2020-09-02T21:25:58Z
null
[]
Sandbox Breakout / Arbitrary Code Execution in value-censorship
All versions of `value-censorship` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to validate async function constructors allowing attackers to execute arbitrary code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'value-censorship'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/888'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:27Z', 'nvd_published_at': None}
1.4.0
GHSA-cch6-5x4h-6qc5
2023-09-07T21:59:30Z
2020-09-01T16:46:04Z
null
['CVE-2017-16097']
Directory Traversal in tiny-http
Affected versions of `tiny-http` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tiny-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16097'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/342'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:59Z', 'nvd_published_at': None}
1.4.0
GHSA-8vj3-jgcf-77jv
2021-10-01T14:04:42Z
2020-09-02T20:26:49Z
null
[]
Malicious Package in requeest
All versions of `requeest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'requeest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/858'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:25Z', 'nvd_published_at': None}
1.4.0
GHSA-4363-x42f-xph6
2021-10-01T21:03:00Z
2020-09-03T17:05:14Z
null
[]
Malicious Package in hw-trnasport-u2f
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'hw-trnasport-u2f'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1400'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:55Z', 'nvd_published_at': None}
1.4.0
GHSA-hfc6-79wv-5hpw
2021-09-24T16:47:49Z
2020-09-01T19:48:13Z
null
[]
Malicious Package in blingjs
Version 0.0.4 of `blingjs` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.0.4 of this module is found installed you will want to replace it with a version before or after 0.0.4. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'blingjs'}, 'versions': ['0.0.4']}]
[{'type': 'PACKAGE', 'url': 'https://github.com/jamiller619/blingjs'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BLINGJS-451007'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/619'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:08Z', 'nvd_published_at': None}
1.4.0
GHSA-whjr-jj69-7prm
2021-09-30T20:15:59Z
2020-09-03T19:44:35Z
null
[]
Malicious Package in import-mysql
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'import-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1127'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:13Z', 'nvd_published_at': None}
1.4.0
GHSA-pjxp-f379-6284
2023-07-27T20:15:13Z
2020-09-03T19:13:27Z
null
[]
Malicious Package in @fangrong/xoc
Version 1.0.6 of `@fangrong/xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 1.0.5
[]
[{'package': {'ecosystem': 'npm', 'name': '@fangrong/xoc'}, 'versions': ['1.0.6']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1104'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:24Z', 'nvd_published_at': None}
1.4.0
GHSA-884p-74jh-xrg2
2020-08-31T18:59:05Z
2020-09-04T16:57:20Z
null
[]
Command Injection in tree-kill
Versions of `tree-kill` prior to 1.2.2 are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems. ## Recommendation Upgrade to version 1.2.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'tree-kill'}, 'ecosystem_specific': {'affected_functions': ['tree-kill']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pkrumins/node-tree-kill/commit/deee138a8cbc918463d8af5ce8c2bec33c3fd164'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/701183'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1432'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:05Z', 'nvd_published_at': None}
1.4.0
GHSA-j8r2-2x94-2q67
2021-09-28T16:59:50Z
2020-09-11T21:19:09Z
null
[]
Cross-Site Scripting in diagram-js-direct-editing
Versions of `diagram-js-direct-editing` prior to 1.4.3 are vulnerable to Cross-Site Scripting. The package fails to sanitize input from the clipboard, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 1.4.3 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'diagram-js-direct-editing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/bpmn-io/diagram-js-direct-editing'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/983'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:01Z', 'nvd_published_at': None}
1.4.0
GHSA-p77h-hv6g-fmfp
2021-09-29T18:49:03Z
2020-09-03T20:43:16Z
null
[]
Sensitive Data Exposure in ibm_db
Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode. ## Recommendation Upgrade to version 2.6.0 or later and ensure sensitive information was not logged.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ibm_db'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ibmdb/node-ibm_db/issues/563'}, {'type': 'WEB', 'url': 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibmdb/node-ibm_db'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1185'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:21Z', 'nvd_published_at': None}
1.4.0
GHSA-vp8g-53fw-r9f2
2021-09-24T17:28:16Z
2020-09-01T19:54:44Z
null
[]
Malicious Package in dynamo-schema
Version 0.0.3 of `dynamo-schema` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.0.3 of this module is found installed you will want to replace it with a version before or after 0.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'dynamo-schema'}, 'versions': ['0.0.3']}]
[{'type': 'PACKAGE', 'url': 'https://github.com/andrewjstone/dynamo-schema'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DYNAMOSCHEMA-450992'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/626'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:24Z', 'nvd_published_at': None}
1.4.0
GHSA-w6xj-45gv-fw35
2023-07-27T20:12:24Z
2020-09-02T15:57:06Z
null
[]
Malicious Package in stream-combine
Version 2.0.2 of `stream-combine` has malicious code design to steal credentials and credit card information. The code searches all form elements for passwords, credit card numbers and CVC codes. It then uploads the information to a remote server using HTML links embedded in the page or form actions. If your application has Content Security Policy set you are not affected by this issue. ## Recommendation This package is not available on the npm Registry anymore. If you used this module and your application processed credentials or credit card information, it is possible that information was stolen. Users may consider downgrading to version 2.0.1
[]
[{'package': {'ecosystem': 'npm', 'name': 'stream-combine'}, 'versions': ['2.0.2']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/774'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:35:17Z', 'nvd_published_at': None}
1.4.0
GHSA-9gxr-rhx6-4jgv
2020-08-31T18:55:36Z
2020-09-04T15:18:57Z
null
[]
Sandbox Breakout / Prototype Pollution in notevil
Versions of `notevil` prior to 1.3.3 are vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing attacker to add or modify an object's prototype. Evaluating the payload ```try{a[b];}catch(e){e.constructor.constructor('return __proto__.arguments.callee.__proto__.polluted=true')()}``` add the `polluted` property to Function. ## Recommendation Upgrade to version 1.3.3 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'notevil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1338'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:36Z', 'nvd_published_at': None}
1.4.0
GHSA-qcc9-q247-3m2m
2021-09-30T20:17:10Z
2020-09-03T19:46:49Z
null
[]
Malicious Package in js-regular
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'js-regular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1129'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:18Z', 'nvd_published_at': None}
1.4.0
GHSA-59x8-7wx6-4hj9
2021-09-30T20:01:35Z
2020-09-03T17:47:52Z
null
[]
Malicious Package in secure_identity_login_module
All versions of `secure_identity_login_module` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'secure_identity_login_module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1063'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:56Z', 'nvd_published_at': None}
1.4.0
GHSA-ch52-vgq2-943f
2020-08-31T18:46:28Z
2020-09-03T18:15:53Z
null
[]
Regular Expression Denial of Service in marked
Affected versions of `marked` are vulnerable to Regular Expression Denial of Service (ReDoS). The `_label` subrule may significantly degrade parsing performance of malformed input. ## Recommendation Upgrade to version 0.7.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1076'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:28Z', 'nvd_published_at': None}
1.4.0
GHSA-m25q-fwg4-9v2p
2021-09-24T16:36:57Z
2020-09-01T19:47:07Z
null
[]
Malicious Package in awesome_react_utility
Version 1.0.2 of `awesome_react_utility` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'awesome_react_utility'}, 'versions': ['1.0.2']}]
[{'type': 'PACKAGE', 'url': 'https://github.com/kooinam/awesome_react_utility'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/618'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:05Z', 'nvd_published_at': None}
1.4.0
GHSA-8jf2-cq6v-w234
2021-09-29T20:47:08Z
2020-09-03T21:10:53Z
null
[]
Malicious Package in uglyfi.js
Version 0.17.3 of `uglyfi.js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'uglyfi.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1202'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:59Z', 'nvd_published_at': None}
1.4.0
GHSA-8j49-49jq-vwcq
2020-08-31T18:55:30Z
2020-09-04T15:15:34Z
null
[]
Prototype Pollution in getsetdeep
All versions of `getsetdeep` are vulnerable to prototype pollution. The `setDeep()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'getsetdeep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1334'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:30Z', 'nvd_published_at': None}
1.4.0
GHSA-xmmp-hrmx-x5g7
2021-09-30T21:37:37Z
2020-09-02T21:32:22Z
null
[]
Malicious Package in bowe
Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'bowe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/899'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:50Z', 'nvd_published_at': None}
1.4.0
GHSA-wc7q-qpm4-8pqv
2021-10-01T14:07:12Z
2020-09-02T20:32:10Z
null
[]
Malicious Package in rrequest
All versions of `rrequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'rrequest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/862'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:34Z', 'nvd_published_at': None}
1.4.0
GHSA-x8m7-cv39-xmg9
2021-09-30T16:35:22Z
2020-09-03T22:56:10Z
null
[]
Malicious Package in jq-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jq-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1278'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:31Z', 'nvd_published_at': None}
1.4.0
GHSA-4jfq-q299-g4cr
2021-10-01T14:06:36Z
2020-09-02T20:28:57Z
null
[]
Malicious Package in reqquest
All versions of `reqquest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'reqquest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/860'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:30Z', 'nvd_published_at': None}
1.4.0
GHSA-hg5q-rj62-c43g
2021-09-30T21:26:33Z
2020-09-02T21:29:08Z
null
[]
Malicious Package in reqest
All versions of `reqest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'reqest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/895'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:41Z', 'nvd_published_at': None}
1.4.0
GHSA-p3jx-g34v-q56j
2021-09-30T16:31:54Z
2020-09-03T22:54:02Z
null
[]
Malicious Package in j3-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'j3-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1276'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:26Z', 'nvd_published_at': None}
1.4.0
GHSA-2fwq-wx47-hm6x
2021-10-01T20:30:20Z
2020-09-04T15:31:39Z
null
[]
Malicious Package in bcion
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bcion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1352'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:04Z', 'nvd_published_at': None}
1.4.0
GHSA-9chw-xrwx-f86j
2023-09-13T22:54:41Z
2020-09-01T16:07:53Z
null
['CVE-2016-10649']
frames-compiler downloads Resources over HTTP
Affected versions of `frames-compiler` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `frames-compiler`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'frames-compiler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10649'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/247'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:16:20Z', 'nvd_published_at': None}
1.4.0
GHSA-wjf2-7f9g-86f5
2021-09-30T20:05:43Z
2020-09-03T18:23:38Z
null
[]
Malicious Package in fast-requests
All versions of `fast-requests` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts. ## Recommendation Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'fast-requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1086'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:49Z', 'nvd_published_at': None}
1.4.0
GHSA-cqv6-7fwc-8m3c
2023-09-11T23:14:59Z
2020-09-01T16:44:59Z
null
['CVE-2017-16091']
Directory Traversal in xtalk
Affected versions of `xtalk` are vulnerable to directory traversal, allowing access to the filesystem by placing "../" in the URL. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:localhost ``` ## Recommendation No patch is currently available for this vulnerability, and the package has not been updated since 2014. The best mitigation is currently to avoid using this package, and using a different, functionally equivalent package.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'xtalk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16091'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/339'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:52Z', 'nvd_published_at': None}
1.4.0
GHSA-h3m2-h22h-695r
2021-09-30T17:49:52Z
2020-09-03T17:29:31Z
null
[]
Malicious Package in ali-contributor
All versions of `ali-contributor` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ali-contributor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1045'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:17Z', 'nvd_published_at': None}
1.4.0
GHSA-g87g-4x3w-f8jp
2023-09-08T18:50:49Z
2020-09-01T16:51:28Z
null
['CVE-2017-16105']
Directory Traversal in serverwzl
Affected versions of `serverwzl` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'serverwzl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16105'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/363'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:29Z', 'nvd_published_at': None}
1.4.0
GHSA-f3vw-587g-r29g
2020-08-31T19:01:20Z
2020-09-03T15:50:38Z
null
[]
Path Traversal in sapper
Versions of `sapper` prior to 0.27.11 are vulnerable to Path Traversal. It is possible to access sensitive files on the server through HTTP requests containing URL-encoded `../`. You may test a `sapper` application running in prod mode with `curl -vvv http://localhost:3000/client/750af05c3a69ddc6073a/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/etc/passwd`. ## Recommendation Upgrade to version 0.27.11 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'sapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.11'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1494'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:20Z', 'nvd_published_at': None}
1.4.0
GHSA-qv78-398w-cxp7
2021-09-30T22:00:05Z
2020-09-11T21:08:19Z
null
[]
Malicious Package in shrugging-logging
All versions of `shrugging-logging` contain malicious code as a postinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking, ## Recommendation Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'shrugging-logging'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/920'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:36Z', 'nvd_published_at': None}
1.4.0
GHSA-4x6x-782q-jfc4
2020-08-31T18:41:45Z
2020-09-03T02:38:47Z
null
[]
Command Injection in node-wifi
Versions of `node-wifi` prior to 2.0.12 are vulnerable to Command Injection. The package fails to sanitize user input, allowing attackers to inject commands through the `ssid` variable and possibly achieving Remote Code Execution on the system. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-wifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.12'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/952'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:45Z', 'nvd_published_at': None}
1.4.0
GHSA-7frr-c83r-fm22
2021-09-29T21:26:37Z
2020-09-03T22:20:49Z
null
[]
Malicious Package in buffez-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'buffez-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1259'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:46Z', 'nvd_published_at': None}
1.4.0
GHSA-73hr-6785-f5p8
2021-09-30T21:24:59Z
2020-09-02T21:24:55Z
null
[]
Malicious Package in donotinstallthis
The package `donotinstallthis` contained malicious code. The package contained a script that was run as part of the install script. The script contacted a remote service tracking how many installations were done. There is no further compromise. ## Recommendation Remove the package from your environment.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'donotinstallthis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/887'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:25Z', 'nvd_published_at': None}
1.4.0
GHSA-frcq-4ffq-v4mw
2023-09-11T20:34:25Z
2020-09-01T18:12:07Z
null
['CVE-2017-16211']
Directory Traversal in lessindex
Affected versions of `lessindex` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'lessindex'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16211'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lessindex'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/423'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:33Z', 'nvd_published_at': None}
1.4.0
GHSA-8hmr-w35f-3qgj
2021-09-29T20:46:19Z
2020-09-03T21:07:37Z
null
[]
Malicious Package in harmlesspackage
Version 0.0.1 of `harmlesspackage` contains malicious code as a postinstall script. The package printed a message to the console and performed a GET request to a remote server. ## Recommendation Remove the package from your environment. There is no evidence of further compromise.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'harmlesspackage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1199'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:52Z', 'nvd_published_at': None}
1.4.0
GHSA-7ww4-c3mj-93cf
2021-01-14T15:56:19Z
2020-09-01T16:16:33Z
null
['CVE-2016-10693']
Downloads Resources over HTTP in pm2-kafka
Affected versions of `pm2-kafka` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pm2-kafka`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'pm2-kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10693'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/299'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:23Z', 'nvd_published_at': None}
1.4.0
GHSA-gjhx-gxwx-jx9j
2021-09-23T21:33:49Z
2020-09-01T15:35:22Z
null
['CVE-2016-1000234']
Cross-Site Scripting in jqtree
Affected versions of `jqtree` are vulnerable to cross-site scripting in the drag and drop functionality for modifying tree data. When a user attempts to drag a node to a different position in the hierarchy, script content existing within the node will be executed. ## Recommendation Update to 1.3.4 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jqtree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000234'}, {'type': 'WEB', 'url': 'https://github.com/mbraak/jqTree/issues/437'}, {'type': 'PACKAGE', 'url': 'https://github.com/mbraak/jqTree'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/132'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:57Z', 'nvd_published_at': None}
1.4.0
GHSA-9mjp-gv34-3jcf
2021-10-01T13:55:21Z
2020-09-02T18:37:35Z
null
[]
Malicious Package in aasync
All versions of `aasync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'aasync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/844'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:53Z', 'nvd_published_at': None}
1.4.0
GHSA-876r-hj45-fw7g
2020-08-31T18:51:25Z
2020-09-03T21:18:41Z
null
[]
Sandbox Breakout / Arbitrary Code Execution in safer-eval
All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. It is possible to escape the sandbox by forcing exceptions recursively in the evaluated code. This may allow attacker to execute arbitrary code in the system. ## Recommendation The package is not suited to receive arbitrary user input. Consider using an alternative package.
[]
[{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://gist.github.com/JLLeitschuh/609bb2efaff22ed84fe182cf574c023a'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1221'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:25Z', 'nvd_published_at': None}
1.4.0
GHSA-vpgc-7h78-gx8f
2022-09-19T22:54:30Z
2020-09-04T18:05:14Z
null
[]
personnummer/js vulnerable to Improper Input Validation
This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure. The vulnerability is determined to be low severity. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: [C#](https://github.com/advisories/GHSA-qv8q-v995-72gr) 3.0.2 D 3.0.1 [Dart](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm) 3.0.3 Elixir 3.0.0 [Go](https://github.com/advisories/GHSA-hv53-vf5m-8q94) 3.0.1 [Java](https://github.com/advisories/GHSA-q3vw-4jx3-rrr2) 3.3.0 [JavaScript](https://github.com/advisories/GHSA-vpgc-7h78-gx8f) 3.1.0 Kotlin 1.1.0 Lua 3.0.1 [PHP](https://github.com/advisories/GHSA-2p6g-gjp8-ggg9) 3.0.2 Perl 3.0.0 [Python](https://github.com/advisories/GHSA-rxq3-5249-8hgg) 3.0.2 [Ruby](https://github.com/advisories/GHSA-vp9c-fpxx-744v) 3.0.1 [Rust](https://github.com/advisories/GHSA-28r9-pq4c-wp3c) 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev)
[]
[{'package': {'ecosystem': 'npm', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/personnummer/js/security/advisories/GHSA-vpgc-7h78-gx8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/js/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/personnummer'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-04T16:24:37Z', 'nvd_published_at': None}
1.4.0
GHSA-674r-xx4c-gj7x
2021-10-04T14:28:19Z
2020-09-03T17:04:05Z
null
[]
Malicious Package in sb58
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sb58'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1406'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:10Z', 'nvd_published_at': None}
1.4.0
GHSA-563h-49v8-g7x4
2021-10-01T16:10:30Z
2020-09-03T23:17:01Z
null
[]
Malicious Package in ks-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ks-sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1297'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:15Z', 'nvd_published_at': None}
1.4.0
GHSA-779f-wgxg-qr8f
2020-08-31T18:46:16Z
2020-09-03T18:10:22Z
null
[]
Prototype Pollution in lodash.mergewith
Versions of `lodash.mergewith` before 4.6.2 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'lodash.mergewith'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1071'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:16Z', 'nvd_published_at': None}
1.4.0
GHSA-m2fp-c79h-rr79
2021-09-30T21:56:28Z
2020-09-02T21:42:56Z
null
[]
Malicious Package in tensorplow
All versions of `tensorplow` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tensorplow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/910'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:13Z', 'nvd_published_at': None}
1.4.0
GHSA-96qc-ghj4-rq27
2023-09-13T20:25:04Z
2020-09-01T18:24:56Z
null
['CVE-2017-16219']
Directory Traversal in yttivy
Affected versions of `yttivy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'yttivy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16219'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208101732/https://www.npmjs.com/advisories/441'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:16Z', 'nvd_published_at': None}
1.4.0
GHSA-c722-pv5w-cfg2
2023-07-27T20:17:08Z
2020-09-11T21:20:14Z
null
[]
Malicious Package in github-jquery-widgets
Version 0.1.2 of `github-jquery-widgets` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 0.1.1
[]
[{'package': {'ecosystem': 'npm', 'name': 'github-jquery-widgets'}, 'versions': ['0.1.2']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/933'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:02Z', 'nvd_published_at': None}
1.4.0
GHSA-785g-gx74-gr39
2021-10-01T14:35:20Z
2020-09-03T23:12:48Z
null
[]
Malicious Package in js-wha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'js-wha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1294'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:08Z', 'nvd_published_at': None}
1.4.0
GHSA-2r7f-4h2c-5x73
2023-09-11T16:45:35Z
2020-09-01T16:38:33Z
null
['CVE-2016-1000249']
fury-adapter-swagger allows arbitrary file read from system
`fury-adapter-swagger` from version 0.2.0 until version 0.9.7 has a weakness that allows an attacker to read arbitrary files off of the system. This can be used to read sensitive data, or to cause a denial of service condition by attempting to read something like `/dev/zero`. ## Proof of Concept: ```yaml --- swagger: '2.0' info: title: Read local files version: '1.0' paths: /foo: get: responses: 200: description: Some description examples: text/html: example: $ref: '/etc/passwd' ``` ## Recommendation Upgrade to version 0.9.7 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'fury-adapter-swagger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.9.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apiaryio/fury-adapter-swagger/pull/89'}, {'type': 'WEB', 'url': 'https://github.com/apiaryio/fury-adapter-swagger/commit/777e2d68f03546a88f3203bbd4725df8b1f662a7'}, {'type': 'WEB', 'url': 'https://github.com/apiaryio/fury-adapter-swagger/commit/f4407e3a5323bc31123d45dbc93b8417002e4d51#diff-54c345dc104dc19440f9c2482b7883df820e8b9b699fdd8fa07e2773e7197a29'}, {'type': 'PACKAGE', 'url': 'https://github.com/apiaryio/fury-adapter-swagger'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/npm:fury-adapter-swagger:20161024'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/305'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:18:37Z', 'nvd_published_at': None}
1.4.0
GHSA-25v4-mcx4-hh35
2020-08-31T18:59:41Z
2020-09-04T17:28:28Z
null
[]
Cross-Site Scripting in atlasboard-atlassian-package
All versions of `atlasboard-atlassian-package` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize user input that is rendered as HTML, which may allow attackers to execute arbitrary JavaScript in a victim's browser. This requires attackers being able to change issue summaries in Jira tickets. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'atlasboard-atlassian-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/456702'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1449'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:41Z', 'nvd_published_at': None}
1.4.0
GHSA-mvch-rh6h-2m47
2021-10-01T14:09:54Z
2020-09-11T21:10:29Z
null
[]
Malicious Package in equest
All versions of `equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'equest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/867'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:45Z', 'nvd_published_at': None}
1.4.0
GHSA-h5mp-5q4p-ggf5
2020-08-31T18:46:09Z
2020-09-03T18:07:05Z
null
[]
Prototype Pollution in lodash.defaultsdeep
Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'lodash.defaultsdeep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1068'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:09Z', 'nvd_published_at': None}
1.4.0
GHSA-xfmw-2vmm-579c
2023-09-05T23:05:17Z
2020-09-01T18:59:50Z
null
['CVE-2017-16080']
Nodesass is malware
The `nodesass` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[]
[{'package': {'ecosystem': 'npm', 'name': 'nodesass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16080'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208091202/https://www.npmjs.com/advisories/519'}]
{'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:26:13Z', 'nvd_published_at': None}
1.4.0
GHSA-5vj8-3v2h-h38v
2022-04-28T19:57:43Z
2020-09-04T18:04:08Z
null
[]
Remote Code Execution in next
Versions of `next` prior to 5.1.0 are vulnerable to Remote Code Execution. The `/path:` route fails to properly sanitize input and passes it to a `require()` call. This allows attackers to execute JavaScript code on the server. Note that prior version 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions. ## Recommendation Upgrade to version 5.1.0.
[]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.9'}, {'fixed': '5.1.0'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1538'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:02:46Z', 'nvd_published_at': None}
1.4.0
GHSA-fqw7-8v6m-2f86
2021-09-30T21:54:46Z
2020-09-02T21:37:39Z
null
[]
Malicious Package in hulp
All versions of `hulp` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hulp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/905'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:01Z', 'nvd_published_at': None}
1.4.0
GHSA-g7h8-p22m-2rvx
2020-08-31T18:55:16Z
2020-09-04T15:08:46Z
null
[]
Prototype Pollution in flat-wrap
All versions of `flat-wrap` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'flat-wrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1327'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:16Z', 'nvd_published_at': None}
1.4.0
GHSA-hfq9-rfpv-j8r8
2021-09-23T21:42:30Z
2020-09-01T16:49:19Z
null
['CVE-2017-16034']
Command Injection in pidusage
Affected versions of `pidusage` pass unsanitized input to `child_process.exec()`, resulting in arbitrary code execution in the `ps` method. This package is vulnerable to this PoC on Darwin, SunOS, FreeBSD, and AIX. Windows and Linux are not vulnerable. ## Proof of Concept ``` var pid = require('pidusage'); pid.stat('1 && /usr/local/bin/python'); ``` ## Recommendation Update to version 1.1.5 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'pidusage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16034'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/356'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:25Z', 'nvd_published_at': None}
1.4.0
GHSA-qvhr-55hg-3qwv
2021-10-04T21:20:31Z
2020-09-23T17:20:39Z
null
[]
Non-persistent XSS in the Storefront in Shopware
### Impact Non-persistent XSS in the Storefront ### Patches We recommend to update to the current version 6.3.1.1. You can get the update to 6.3.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### References https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-qvhr-55hg-3qwv'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-23T15:02:25Z', 'nvd_published_at': None}
1.4.0
GHSA-jp99-5h8w-gmxc
2020-08-31T18:55:02Z
2020-09-04T15:03:13Z
null
[]
Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm
All versions of `@zhaoyao91/eval-in-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': '@zhaoyao91/eval-in-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1320'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:02Z', 'nvd_published_at': None}
1.4.0
GHSA-4hjg-w3ww-38c6
2021-09-30T20:01:59Z
2020-09-03T18:03:49Z
null
[]
Malicious Package in tiar
All versions of `tiar` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tiar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1064'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:59Z', 'nvd_published_at': None}
1.4.0
GHSA-388g-jwpg-x6j4
2021-09-28T17:00:22Z
2020-09-11T21:20:14Z
null
[]
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 3.0.13 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize YAML files imported from URLs or copied-pasted. This may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 3.0.13 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/3163'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449941'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/985'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:03Z', 'nvd_published_at': None}
1.4.0
GHSA-5p98-wpc9-g498
2022-06-22T19:28:32Z
2020-09-04T15:21:32Z
null
[]
Server-Side Request Forgery in html-pdf-chrome
## Recommendation This package is working as intended. A [Security](https://github.com/westy92/html-pdf-chrome#security) section has been added since v0.6.1 to detail proper usage of this library. Npm has revoked their advisory altogether. ## Original Advisory All versions of `html-pdf-chrome` are vulnerable to Server-Side Request Forgery (SSRF). The package executes HTTP requests if the parsed HTML contains external references to resources, such as `<iframe src="http://localhost" height="800px" width="800px"></iframe>`. This allows attackers to access resources through HTTP that are accessible to the server, including private resources in the hosting environment.
[]
[{'package': {'ecosystem': 'npm', 'name': 'html-pdf-chrome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/westy92/html-pdf-chrome/issues/249'}, {'type': 'PACKAGE', 'url': 'https://github.com/westy92/html-pdf-chrome'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1339'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:39Z', 'nvd_published_at': None}
1.4.0
GHSA-vv52-3mrp-455m
2020-08-31T19:01:56Z
2020-09-03T15:53:36Z
null
[]
Malicious Package in m-backdoor
All versions of `m-backdoor` contain malicious code. The package downloads a file from a remote server and executes it as a preinstall script. At the time of the release of this advisory the downloaded file only defaces websites by removing elements randomly from the DOM. ## Recommendation Remove the package from your system.
[]
[{'package': {'ecosystem': 'npm', 'name': 'm-backdoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1513'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:56Z', 'nvd_published_at': None}
1.4.0
GHSA-c3h5-qchh-46hh
2023-09-11T16:37:27Z
2020-09-01T17:30:17Z
null
['CVE-2017-16167']
Directory Traversal in yyooopack
Affected versions of `yyooopack` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'yyooopack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16167'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yyooopack'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/400'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:53Z', 'nvd_published_at': None}
1.4.0
GHSA-vpj4-89q8-rh38
2020-08-31T18:46:32Z
2020-09-03T18:16:59Z
null
[]
Cross-Site Scripting in bpmn-js-properties-panel
Versions of `bpmn-js-properties-panel` prior to 0.31.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website. ## Recommendation Upgrade to version 0.31.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'bpmn-js-properties-panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1079'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:32Z', 'nvd_published_at': None}
1.4.0
GHSA-mvmf-cvfx-qg55
2021-09-23T21:06:09Z
2020-09-01T15:16:43Z
null
['CVE-2014-8881']
Regular Expression Denial of Service in bleach
All versions of the `bleach` package are vulnerable to a regular expression denial of service attack when certain types of input are passed into the sanitize function. ## Recommendation The `bleach` package is not currently maintained, and has not seen an update since 2014. To mitigate this issue, it is necessary to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=html%20sanitizer&page=1&ranking=optimal).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8881'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:bleach:20151024'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/47'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:10Z', 'nvd_published_at': None}
1.4.0
GHSA-rw4r-h883-8pf9
2021-10-01T14:06:53Z
2020-09-02T20:30:02Z
null
[]
Malicious Package in reequest
All versions of `reequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'reequest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/861'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:32Z', 'nvd_published_at': None}
1.4.0
GHSA-h2j3-gg8w-4858
2021-09-29T21:12:39Z
2020-09-03T22:12:09Z
null
[]
Malicious Package in buffer-xos
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'buffer-xos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1251'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:25Z', 'nvd_published_at': None}
1.4.0
GHSA-r87w-47m8-22w3
2023-09-07T20:41:26Z
2020-09-01T15:24:24Z
null
['CVE-2016-3942']
Template Injection in jsrender
Affected versions of `jsrender` are susceptible to a remote code execution vulnerability when used with server delivered client-side tempates which dynamically embed user input. ## Proof of Concept ```js //POC-REQUEST {{for ~x!=1?(constructor.constructor("return arguments.callee.caller")()):~y(10)}} {{:#data}} {{/for}} ``` ```js //POC-RESPONSE function anonymous(data,view,j,u) { // template var v,t=j._tag,ret="" +t("for",view,this,[ {view:view,tmpl:1, params:{args:['~x!=1?(constructor.constructor(\"return arguments.callee.caller\")()):~y(10)']}, args:[view.hlp("x")!=1?(data.constructor.constructor("return arguments.callee.caller")()):view.hlp("y")(10)], props:{}}]); return ret; } ``` ## Recommendation Update to version 0.9.74 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsrender'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.74'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.73'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3942'}, {'type': 'WEB', 'url': 'https://github.com/BorisMoore/jsrender/commit/f984e139deb0a7648d5b543860ec652c21f6dcf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/BorisMoore/jsrender'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-JSRENDER-60173'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/97'}]
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:10:44Z', 'nvd_published_at': None}
1.4.0
GHSA-qjfh-xc44-rm9x
2020-08-31T18:43:54Z
2020-09-03T16:49:43Z
null
[]
Path Traversal in file-static-server
All versions of `file-static-server` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'file-static-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/310671'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1008'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:54Z', 'nvd_published_at': None}
1.4.0
GHSA-wfw3-rgfr-6g67
2023-03-24T21:26:31Z
2020-09-01T16:40:42Z
null
['CVE-2017-16009']
XSS via Angular Expression in ag-grid
Affected versions of `ag-grid` are vulnerable to Cross-site Scripting (XSS) via Angular Expressions, if used in combination with AngularJS. ## Recommendation Avoid using `ag-grid` in combination with AngularJS until a fix is available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ag-grid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '18.1.3-beta.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16009'}, {'type': 'WEB', 'url': 'https://github.com/ceolter/ag-grid/issues/1287'}, {'type': 'PACKAGE', 'url': 'https://github.com/ag-grid/ag-grid'}, {'type': 'WEB', 'url': 'https://spring.io/blog/2016/01/28/angularjs-escaping-the-expression-sandbox-for-xss'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:19:26Z', 'nvd_published_at': '2018-06-04T19:29:00Z'}
1.4.0
GHSA-j5qg-46p9-w2rp
2023-07-27T20:37:08Z
2020-09-03T00:33:32Z
null
[]
Malicious Package in jekyll-for-github-projects
Version 0.2.12 of `jekyll-for-github-projects` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 0.2.11
[]
[{'package': {'ecosystem': 'npm', 'name': 'jekyll-for-github-projects'}, 'versions': ['0.2.12']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/936'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:08Z', 'nvd_published_at': None}
1.4.0
GHSA-xf64-2f9p-6pqq
2020-08-31T18:59:32Z
2020-09-04T17:24:08Z
null
[]
Information Exposure in type-graphql
Versions of `type-graphql` prior to 0.17.6 are vulnerable to Information Exposure. The package leaks the resolver source code in an error message. It is possible to force this error when no subscription topics are provided in the request. ## Recommendation Upgrade to version 0.17.6 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'type-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/MichalLytek/type-graphql/issues/489'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1444'}]
{'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:59:32Z', 'nvd_published_at': None}
1.4.0
GHSA-qh32-6jjc-qprm
2021-08-26T15:19:19Z
2020-09-25T18:28:46Z
null
['CVE-2020-15209']
Null pointer dereference in tensorflow-lite
### Impact A crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/core/subgraph.cc#L1224-L1227 However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference. ### Patches We have patched the issue in 0b5662bc and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360 but was also discovered through variant analysis of [GHSA-cvpc-8phh-8f45](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15209'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}]
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T18:13:03Z', 'nvd_published_at': '2020-09-25T19:15:00Z'}
1.4.0
GHSA-fw76-p9p2-6pvf
2021-09-30T20:28:12Z
2020-09-03T19:58:58Z
null
[]
Malicious Package in serilize
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'serilize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1140'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:43Z', 'nvd_published_at': None}
1.4.0
GHSA-gvff-25cc-4f66
2020-08-31T18:44:58Z
2020-09-03T17:15:56Z
null
[]
Path Traversal in restify-swagger-jsdoc
Versions of `restify-swagger-jsdoc` prior to 3.2.1 are vulnerable to Path Traversal. The package fails to properly sanitize URLs, which may allow attackers to access server files outside the `swagger-ui` folder by using relative paths. ## Recommendation Upgrade to version 3.2.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'restify-swagger-jsdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1037'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:44:58Z', 'nvd_published_at': None}
1.4.0
GHSA-6c37-2rw5-9j7x
2021-10-01T14:04:27Z
2020-09-02T20:25:46Z
null
[]
Malicious Package in requesst
All versions of `requesst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'requesst'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/857'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:38:23Z', 'nvd_published_at': None}
1.4.0
GHSA-563h-697m-j7x5
2023-07-27T20:36:07Z
2020-09-03T19:18:58Z
null
[]
Malicious Package in device-mqtt
Version 1.0.11 of `device-mqtt` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 1.0.10
[]
[{'package': {'ecosystem': 'npm', 'name': 'device-mqtt'}, 'versions': ['1.0.11']}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1109'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:35Z', 'nvd_published_at': None}