schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
nulllengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
14
228
details
stringlengths
48
1.45k
severity
stringlengths
2
78
affected
stringlengths
79
6.96k
references
stringlengths
143
6.38k
database_specific
stringlengths
131
174
1.4.0
GHSA-f7ph-p5rv-phw2
2020-08-31T18:12:27Z
2018-11-06T23:13:37Z
null
['CVE-2016-10547']
Cross-Site Scripting in nunjucks
Affected versions of `nunjucks` do not properly escape specially structured user input in template vars when in auto-escape mode, resulting in a cross-site scripting vulnerability. ## Proof of Concept By using an array for the keys in a template var, escaping is bypassed. ```javascript name[]=<script>alert(1)</script> ``` A full PoC is available in the references section. ## Recommendation Update to version 2.4.3 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'nunjucks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10547'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/nunjucks/issues/835'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f7ph-p5rv-phw2'}, {'type': 'WEB', 'url': 'https://github.com/matt-/nunjucks_test'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/147'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:04Z', 'nvd_published_at': None}
1.4.0
GHSA-rwg6-3fmj-w4wx
2023-09-08T23:30:49Z
2018-11-01T14:47:21Z
null
['CVE-2017-16061']
tkinter is malware
The `tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tkinter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16061'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/500'}]
{'cwe_ids': ['CWE-433', 'CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:07Z', 'nvd_published_at': None}
1.4.0
GHSA-xgc9-9w4v-h33h
2021-09-21T22:31:15Z
2018-11-06T23:17:27Z
null
['CVE-2018-1321']
High severity vulnerability that affects org.apache.syncope:syncope-core
An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1321'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xgc9-9w4v-h33h'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45400/'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security.html#CVE-2018-1321:_Remote_code_execution_by_administrators_with_report_and_template_entitlements'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103508'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:16Z', 'nvd_published_at': None}
1.4.0
GHSA-xvch-r4wf-h8w9
2022-09-14T22:05:10Z
2018-11-21T22:22:21Z
null
['CVE-2018-17187']
Improper Certificate Validation in proton-j
The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options to configure this explicitly or select a certificate verification mode with or without hostname verification being performed. The latter hostname verifying mode was not implemented in Apache Qpid Proton-J versions 0.3 to 0.29.0, with attempts to use it resulting in an exception. This left only the option to verify the certificate is trusted, leaving such a client vulnerable to Man In The Middle (MITM) attack. Uses of the Proton-J protocol engine which do not utilise the optional transport TLS wrapper are not impacted, e.g. usage within Qpid JMS. Uses of Proton-J utilising the optional transport TLS wrapper layer that wish to enable hostname verification must be upgraded to version 0.30.0 or later and utilise the VerifyMode#VERIFY_PEER_NAME configuration, which is now the default for client mode usage unless configured otherwise.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:proton-j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3'}, {'fixed': '0.30.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.29.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17187'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xvch-r4wf-h8w9'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/PROTON-1962'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/qpid-users/201811.mbox/%3CCAFitrpQSV73Vz7rJYfLJK7gvEymZSCR5ooWUeU8j4jzRydk-eg%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'https://qpid.apache.org/cves/CVE-2018-17187.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105935'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:36Z', 'nvd_published_at': None}
1.4.0
GHSA-5xgh-643p-cp2g
2022-09-21T22:28:56Z
2018-11-21T22:19:59Z
null
['CVE-2018-17574']
Cross-site Scripting in yapi-vendor
An issue was discovered in YMFE YApi 1.3.23. There is stored XSS in the name field of a project.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'yapi-vendor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17574'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/520'}, {'type': 'PACKAGE', 'url': 'https://github.com/YMFE/yapi'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5xgh-643p-cp2g'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:36Z', 'nvd_published_at': None}
1.4.0
GHSA-26q7-g57v-mxcp
2020-08-31T18:19:13Z
2018-11-07T00:28:11Z
null
['CVE-2017-16043']
HTML Injection in shout
Affected versions of `shout` do not escape the `/topic` command in messages, and are therefore vulnerable to cross-site scripting. ## Recommendation Update to version 0.50.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'shout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.44.0'}, {'fixed': '0.50.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.49.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16043'}, {'type': 'WEB', 'url': 'https://github.com/erming/shout/pull/344'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-26q7-g57v-mxcp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/322'}]
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:31Z', 'nvd_published_at': None}
1.4.0
GHSA-7g2w-6r25-2j7p
2023-09-07T18:15:41Z
2018-11-01T14:51:33Z
null
['CVE-2018-16461']
Command Injection in libnmap
Versions of `libnmap` before 0.4.16 are vulnerable to command injection. Proof of concept ```js const nmap = require('libnmap'); const opts = { range: [ 'scanme.nmap.org', "x.x.$(touch success.txt)" ] }; nmap.scan(opts, function(err, report) { if (err) throw new Error(err); for (let item in report) { console.log(JSON.stringify(report[item])); } }); ``` ## Recommendation Update to version 0.4.16 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'libnmap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16461'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390865'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7g2w-6r25-2j7p'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/474.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/719'}]
{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:42Z', 'nvd_published_at': None}
1.4.0
GHSA-3hvm-hgpw-rx4j
2023-09-12T20:40:50Z
2018-11-06T23:11:10Z
null
['CVE-2018-16475']
Path Traversal in knightjs
All versions of `knightjs` are vulnerable to Path Traversal. This vulnerability allows an attacker to read content of arbitrary files on the server due to lack of input validation. ## Recommendation As there is currently no fix for this module we recommend not using this module in production environments.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'knightjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16475'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403707'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3hvm-hgpw-rx4j'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/743'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:20Z', 'nvd_published_at': None}
1.4.0
GHSA-23xp-j737-282v
2023-09-07T22:55:00Z
2018-11-06T23:12:30Z
null
['CVE-2018-16473']
Path Traversal in takeapeek
All versions of `takeapeek` are vulnerable to path traversal exposing files and directories. ## Recommendation As no fix is currently available for this vulnerability is it is our recommendation to use another static file server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'takeapeek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16473'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403736'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-23xp-j737-282v'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/478.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/740'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:15Z', 'nvd_published_at': None}
1.4.0
GHSA-wv26-rj8c-4r33
2022-09-14T22:00:43Z
2018-11-06T23:15:13Z
null
['CVE-2018-6874']
Cross-Site Request Forgery (CSRF) in Auth0
CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6874'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2018-6874'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wv26-rj8c-4r33'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103695'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:12Z', 'nvd_published_at': None}
1.4.0
GHSA-3p4q-x8f3-p7vq
2023-09-05T19:12:36Z
2018-11-21T22:19:22Z
null
['CVE-2018-19352']
Jupyter Notebook XSS via directory name
Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19352'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/288b73e1edbf527740e273fcc69b889460871648'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3p4q-x8f3-p7vq'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst'}, {'type': 'WEB', 'url': 'https://pypi.org/project/notebook/#history'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:38Z', 'nvd_published_at': None}
1.4.0
GHSA-c2fx-8r76-gh36
2020-06-16T21:29:59Z
2018-11-06T23:14:22Z
null
['CVE-2013-7323']
High severity vulnerability that affects python-gnupg
python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.3.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7323'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2fx-8r76-gh36'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/243'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/244'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/294'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56616'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59031'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:59Z', 'nvd_published_at': None}
1.4.0
GHSA-r3vr-prwv-86g9
2021-09-17T14:15:08Z
2018-11-06T23:14:39Z
null
['CVE-2014-1927']
High severity vulnerability that affects python-gnupg
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.6'}]}], 'versions': ['0.3.5']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1927'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/vinay.sajip/python-gnupg'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/issues/detail?id=98'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r3vr-prwv-86g9'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/245'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/294'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56616'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59031'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:37Z', 'nvd_published_at': None}
1.4.0
GHSA-3rh7-vm4x-q2hp
2023-09-12T18:40:34Z
2018-11-09T17:49:22Z
null
['CVE-2017-16055']
sqlserver is malware
The `sqlserver` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sqlserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3rh7-vm4x-q2hp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/486'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:09Z', 'nvd_published_at': None}
1.4.0
GHSA-2jc8-4r6g-282j
2020-06-16T20:52:26Z
2018-11-06T23:13:02Z
null
['CVE-2014-1928']
Moderate severity vulnerability that affects python-gnupg
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.6'}]}], 'versions': ['0.3.5']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1928'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/'}, {'type': 'WEB', 'url': 'https://code.google.com/p/python-gnupg/issues/detail?id=98'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2jc8-4r6g-282j'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/246'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/294'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/56616'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59031'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:26Z', 'nvd_published_at': None}
1.4.0
GHSA-hg78-4f6x-99wq
2023-08-28T12:46:14Z
2018-11-15T15:58:58Z
null
['CVE-2018-16470']
Rack vulnerable to Denial of Service
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.4'}, {'fixed': '2.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16470'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3172'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2018-16470.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/Dz4sRl-ktKk'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:04Z', 'nvd_published_at': None}
1.4.0
GHSA-g68x-vvqq-pvw3
2023-09-08T21:34:45Z
2018-11-21T22:19:50Z
null
['CVE-2018-17960']
Ckeditor XSS Vulnerability
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste. It was possible to execute XSS inside the CKEditor source area after persuading the victim to: (i) switch CKEditor to source mode, then (ii) paste a specially crafted HTML code, prepared by the attacker, into the opened CKEditor source area, and (iii) switch back to WYSIWYG mode. Although this is an unlikely scenario, it is recommended to upgrade to the latest editor version.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ckeditor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17960'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/CKEditor-4.11-with-emoji-dropdown-and-auto-link-on-typing-released/'}, {'type': 'WEB', 'url': 'https://ckeditor.com/cke4/release/CKEditor-4.11.0'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g68x-vvqq-pvw3'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227030123/http://www.securityfocus.com/bid/109205'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:12Z', 'nvd_published_at': None}
1.4.0
GHSA-vgrx-w6rg-8fqf
2020-08-31T18:10:20Z
2018-11-06T23:12:07Z
null
['CVE-2016-10555']
Forgeable Public/Private Tokens in jwt-simple
Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort. ## Recommendation Update to version 0.3.1 or later. Additionally, be sure to always specify an algorithm in calls to `.decode()`.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jwt-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10555'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97'}, {'type': 'WEB', 'url': 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/87'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:45Z', 'nvd_published_at': None}
1.4.0
GHSA-c7c7-xm8g-xm36
2022-09-14T21:59:56Z
2018-11-01T14:48:29Z
null
['CVE-2018-18830']
Unrestricted Upload of File with Dangerous Type in mingsoft:ms-mcms
An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In the name parameter, change the suffix to jsp. In the response, the server returns the storage path of the file, which can be accessed to execute arbitrary JSP code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18830'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/IO0IQ'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c7c7-xm8g-xm36'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:25Z', 'nvd_published_at': None}
1.4.0
GHSA-2mw7-wggm-m6w3
2022-09-14T22:05:59Z
2018-11-21T22:22:46Z
null
['CVE-2018-19183']
Denial of Service in ethereumjs-vm
ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a "code: Buffer.from(my_code, 'hex')" attribute.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ethereumjs-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19183'}, {'type': 'WEB', 'url': 'https://github.com/ethereumjs/ethereumjs-vm/issues/386'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2mw7-wggm-m6w3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereumjs/ethereumjs-vm'}]
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:41Z', 'nvd_published_at': None}
1.4.0
GHSA-qfjv-998w-q48f
2021-09-16T19:56:56Z
2018-11-06T23:15:46Z
null
['CVE-2018-17186']
High severity vulnerability that affects org.apache.syncope:syncope-core
An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17186'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qfjv-998w-q48f'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security#CVE-2018-17186:_XXE_on_BPMN_definitions'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:44Z', 'nvd_published_at': None}
1.4.0
GHSA-jmf4-pq78-f8vj
2021-09-14T19:47:15Z
2018-11-21T22:24:50Z
null
['CVE-2018-1314']
Moderate severity vulnerability that affects org.apache.hive:hive-jdbc
In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1314'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jmf4-pq78-f8vj'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3da47dbcbf09697387f29d2f1aed970523b6b334d93afd3cced23727@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105884'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:44Z', 'nvd_published_at': None}
1.4.0
GHSA-q257-vv4p-fg92
2023-09-08T23:24:59Z
2018-11-09T17:49:34Z
null
['CVE-2017-16005']
Header Forgery in http-signature
Affected versions of `http-signature` contain a vulnerability which can allow an attacker in a privileged network position to modify header names and change the meaning of the request, without requiring an updated signature. This problem occurs because vulnerable versions of `http-signature` sign the contents of headers, but not the header names. ## Proof of Concept Consider this to be the initial, untampered request: ```http POST /pay HTTP/1.1 Host: example.com Date: Thu, 05 Jan 2012 21:31:40 GMT X-Payment-Source: [email protected] X-Payment-Destination: [email protected] Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-source x-payment-destination" MDyO5tSvin5... ``` And the request is intercepted and tampered as follows: ```http X-Payment-Source: [email protected] // Emails switched X-Payment-Destination: [email protected] Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-destination x-payment-source" MDyO5tSvin5... ``` In the resulting responses, both requests would pass signature verification without issue. ``` [email protected]\n [email protected]\n ``` ## Recommendation Update to version 0.10.0 or higher.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'http-signature'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16005'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-http-signature/issues/10'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q257-vv4p-fg92'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/318'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:21Z', 'nvd_published_at': None}
1.4.0
GHSA-38h8-x697-gh8q
2023-09-07T20:13:49Z
2018-11-09T17:45:30Z
null
['CVE-2017-16024']
Tmp files readable by other users in sync-exec
Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user. ## Recommendation There is currently no direct patch for `sync-exec`, as the `child_process.execSync` function provided in Node.js v0.12.0 and later provides the same functionality natively. The best mitigation currently is to update to Node.js v0.12.0 or later, and migrate all uses of `sync-exec` to `child_process.execSync()`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sync-exec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16024'}, {'type': 'WEB', 'url': 'https://github.com/gvarsanyi/sync-exec/issues/17'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/377.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38h8-x697-gh8q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/310'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Insecure_Temporary_File'}]
{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:36Z', 'nvd_published_at': None}
1.4.0
GHSA-rxmr-c9jm-7mm8
2022-09-14T22:07:44Z
2018-11-21T22:24:22Z
null
['CVE-2018-1284']
Exposure of Sensitive Information to an Unauthorized Actor in Apache hive
In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1284'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rxmr-c9jm-7mm8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/29184dbce4a37be2af36e539ecb479b1d27868f73ccfdff46c7174b4@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103750'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:20Z', 'nvd_published_at': None}
1.4.0
GHSA-32w7-9whp-cjp9
2022-09-14T22:08:57Z
2018-11-29T21:30:56Z
null
['CVE-2018-19443']
Session Fixation in Tryton
The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tryton'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}], 'versions': ['5.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19443'}, {'type': 'WEB', 'url': 'https://bugs.tryton.org/issue7792'}, {'type': 'WEB', 'url': 'https://discuss.tryton.org/t/security-release-for-issue7792/830'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-32w7-9whp-cjp9'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:42Z', 'nvd_published_at': None}
1.4.0
GHSA-9xgh-xgw5-p5cw
2023-09-14T17:55:59Z
2018-11-09T17:42:54Z
null
['CVE-2017-16057']
nodemssql is malware
The `nodemssql` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodemssql'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16057'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9xgh-xgw5-p5cw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/484'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:51Z', 'nvd_published_at': None}
1.4.0
GHSA-x3g3-334f-q6h4
2023-09-08T19:44:37Z
2018-11-09T17:41:15Z
null
['CVE-2018-19056']
Pandao editor.md vulnerable to DOM XSS
pandao Editor.md 1.5.0 has DOM XSS via input starting with a `<<` substring, which is mishandled during construction of an `A` element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.5.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19056'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/634'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x3g3-334f-q6h4'}, {'type': 'PACKAGE', 'url': 'https://github.com/pandao/editor.md'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:53Z', 'nvd_published_at': None}
1.4.0
GHSA-g4xq-jx4w-4cjv
2023-01-23T17:08:55Z
2018-11-01T14:46:01Z
null
['CVE-2018-16468']
Loofah Cross-site Scripting vulnerability
In the Loofah gem for Ruby, through version 2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. Users are advised to upgrade to version 2.2.3. See https://github.com/flavorjones/loofah/issues/154 for more details.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16468'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/154'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4364'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:07Z', 'nvd_published_at': None}
1.4.0
GHSA-vcr5-xr9h-mvc5
2023-09-01T20:54:16Z
2018-11-06T23:12:48Z
null
['CVE-2014-1929']
python-gnupg vulnerable to shell injection
python-gnupg 0.3.5 and 0.3.6 allow for shell injection via a failure to escape backslashes in the `shell_quote()` function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.5'}, {'fixed': '0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1929'}, {'type': 'WEB', 'url': 'https://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/2014-June/028512.html'}, {'type': 'WEB', 'url': 'https://code.google.com/archive/p/python-gnupg/issues/98'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vcr5-xr9h-mvc5'}, {'type': 'PACKAGE', 'url': 'https://github.com/vsajip/python-gnupg'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228170437/http://www.securityfocus.com/bid/65539'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2014/02/04/3'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2014/02/04/4'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/245'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/335'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2946'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:27Z', 'nvd_published_at': None}
1.4.0
GHSA-jf2m-435m-mxw8
2022-09-14T22:08:10Z
2018-11-21T22:24:34Z
null
['CVE-2018-1282']
SQL Injection in hive-jdbc
This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows carefully crafted arguments to be used to bypass the argument escaping/cleanup that JDBC driver does in PreparedStatement implementation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.1'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1282'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jf2m-435m-mxw8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/74bd2bff1827febb348dfb323986fa340d3bb97a315ab93c3ccc8299@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103751'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:10Z', 'nvd_published_at': None}
1.4.0
GHSA-wg85-p6j7-gp3w
2023-09-07T00:08:31Z
2018-11-21T22:21:25Z
null
['CVE-2018-19057']
SimpleMDE XSS Vulnerability
SimpleMDE 1.11.2 has XSS via an onerror attribute of a crafted IMG element, or via certain input with `[` and `(` characters, which is mishandled during construction of an `A` element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'simplemde'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19057'}, {'type': 'WEB', 'url': 'https://github.com/sparksuite/simplemde-markdown-editor/issues/721'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg85-p6j7-gp3w'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparksuite/simplemde-markdown-editor'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:23Z', 'nvd_published_at': None}
1.4.0
GHSA-q3jg-4c82-j4xh
2022-09-14T22:09:19Z
2018-11-29T21:30:30Z
null
['CVE-2018-15795']
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Pivotal CredHub Service Broker
Pivotal CredHub Service Broker, versions prior to 1.1.0, uses a guessable form of random number generation in creating service broker's UAA client. A remote malicious user may guess the client secret and obtain or modify credentials for users of the CredHub Service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.credhub:spring-credhub-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15795'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q3jg-4c82-j4xh'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-15795'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105915'}]
{'cwe_ids': ['CWE-338'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:43Z', 'nvd_published_at': None}
1.4.0
GHSA-phg2-9c5g-m4q7
2022-09-14T22:04:46Z
2018-11-21T22:19:30Z
null
['CVE-2018-17190']
Remote Code Execution in spark-core
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected. # Mitigation Enable authentication on any Spark standalone cluster that is not otherwise secured from unwanted access, for example by network-level restrictions. Use spark.authenticate and related security properties described at https://spark.apache.org/docs/latest/security.html
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17190'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-phg2-9c5g-m4q7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201903-21'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105976'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:15Z', 'nvd_published_at': None}
1.4.0
GHSA-xqqr-p362-6rmc
2023-09-12T21:11:28Z
2018-11-09T17:44:20Z
null
['CVE-2017-16029']
Directory Traversal in hostr
Affected versions of `hostr` are vulnerable to directory traversal which allows attackers to read files outside the current directory by sending `../` in the url path for GET requests. ## Recommendation Upgrade to version 2.3.6 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'hostr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16029'}, {'type': 'WEB', 'url': 'https://github.com/henrytseng/hostr/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/henrytseng/hostr/issues/8)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqqr-p362-6rmc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/303'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:17Z', 'nvd_published_at': None}
1.4.0
GHSA-cfw5-v7cw-69cw
2021-09-09T17:08:40Z
2018-11-09T17:49:49Z
null
['CVE-2018-1337']
Critical severity vulnerability that affects org.apache.directory.api:apache-ldap-api
In Apache LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (including the credentials when sending a BIND request).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.directory.api:apache-ldap-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1337'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfw5-v7cw-69cw'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d66081195e9a02ee7cc20fb243b60467d1419586eed28297d820768f@%3Cdev.directory.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0e645b3f6ca977dc60b7cec231215c59a9471736c2402c1fef5a0616@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1815fb5b0c345f571c740e7a1b48d7477647edd4ffcf9d5321e69446@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1a258430d820a90ff9d4558319296cc517ff2252327d7b3546d16749@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4da40aa50cfdb2158898f2bc6df81feec1d42c6a06db6537d5cc0496@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55e74532e7f9e84ecfa56b4e0a50a5fe0ba6f7a76880520e4400b0d7@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r56b304fb9960c869995efbb31da3b9b7c6d53ee31f7f7048eb80434b@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104744'}]
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:24Z', 'nvd_published_at': None}
1.4.0
GHSA-8rhc-48pp-52gr
2021-09-07T20:33:02Z
2018-11-09T17:43:25Z
null
['CVE-2017-12612']
High severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit or spark-shell. The attacker would be able to execute code as the user that ran the Spark application. Users are encouraged to update to version 2.1.2, 2.2.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12612'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8rhc-48pp-52gr'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/spark-dev/201709.mbox/%3CCAEccTyy-1yYuhdNgkBUg0sr9NeaZSrBKkBePdTNZbxXZNTAR-g%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100823'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:38Z', 'nvd_published_at': None}
1.4.0
GHSA-jhgp-hvj6-x2p2
2023-09-12T18:44:07Z
2018-11-06T23:12:01Z
null
['CVE-2018-16474']
Stored Cross-Site Scripting in tianma-static
All versions of `tianma-static` are vulnerable to stored cross-site scripting (XSS). The vulnerability is exploitable if a user can control the name of a file that is served by `tianma-static` ## Recommendation As no fix is available for this vulnerability at this time it is our recommendation to use another static file server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tianma-static'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16474'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403692'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhgp-hvj6-x2p2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/741'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:28Z', 'nvd_published_at': None}
1.4.0
GHSA-j7c4-2xj8-wm7r
2022-09-14T22:51:45Z
2018-11-01T14:49:30Z
null
['CVE-2015-5159']
Improper Input Validation in kdcproxy
python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'kdcproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5159'}, {'type': 'WEB', 'url': 'https://github.com/latchset/kdcproxy/commit/f274aa6787cb8b3ec1cc12c440a56665b7231882'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1245200'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j7c4-2xj8-wm7r'}, {'type': 'PACKAGE', 'url': 'https://github.com/latchset/kdcproxy'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:25Z', 'nvd_published_at': None}
1.4.0
GHSA-hhrp-qm88-xjr3
2023-09-07T18:23:41Z
2018-11-21T22:19:41Z
null
['CVE-2018-19289']
Valine HTML Injection
An issue was discovered in Valine v1.3.3. It allows HTML injection, which can be exploited for JavaScript execution via an EMBED element in conjunction with a .pdf file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19289'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/127'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/commit/32d4d5e68df804f0eabb1a2bebbbf9459e31c2b7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hhrp-qm88-xjr3'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:20Z', 'nvd_published_at': None}
1.4.0
GHSA-w4r4-65mg-45x2
2022-12-06T16:40:49Z
2018-11-09T17:41:46Z
null
['CVE-2018-11770']
org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 Improper Authentication vulnerability
From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting 'spark.authenticate.secret' when running the REST APIs, to make this clear. Future 2.4.x versions will also disable the REST API by default in the standalone master by changing the default value of 'spark.master.rest.enabled' to 'false'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '2.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11770'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485%40%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485@%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://spark.apache.org/security.html#CVE-2018-11770'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227114942/http://www.securityfocus.com/bid/105097'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:32Z', 'nvd_published_at': '2018-08-13T16:29:00Z'}
1.4.0
GHSA-9xw9-pvgv-6p76
2023-09-13T19:36:45Z
2018-11-09T17:47:52Z
null
['CVE-2017-16014']
Insufficient Error Handling in http-proxy
Affected versions of `http-proxy` are vulnerable to a denial of service attack, wherein an attacker can force an error which will cause the server to crash. ## Recommendation Update to version 0.7.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'http-proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.6.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16014'}, {'type': 'WEB', 'url': 'https://github.com/nodejitsu/node-http-proxy/pull/101'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9xw9-pvgv-6p76'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/323'}]
{'cwe_ids': ['CWE-703'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:54Z', 'nvd_published_at': None}
1.4.0
GHSA-v3vf-2r98-xw8w
2022-09-14T22:51:27Z
2018-11-06T23:17:25Z
null
['CVE-2018-1322']
Exposure of Sensitive Information to an Unauthorized Actor in Apache syncope-cope
An administrator with user search entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can recover sensitive security values using the fiql and orderby parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1322'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v3vf-2r98-xw8w'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45400/'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security.html#CVE-2018-1322:_Information_disclosure_via_FIQL_and_ORDER_BY_sorting'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103507'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:33Z', 'nvd_published_at': None}
1.4.0
GHSA-wg96-3933-j2w5
2023-09-08T23:10:15Z
2018-11-09T17:45:55Z
null
['CVE-2017-16017']
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` are vulnerable to cross-site scripting. ## Proof of Concept: `<IMG SRC= onmouseover="alert('XSS');">` produces the following: `<img src="onmouseover="alert('XSS');"" />` This is definitely invalid HTML, but would suggest that it's being interpreted incorrectly by the parser. ## Recommendation Update to version 1.2.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16017'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/pull/20'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg96-3933-j2w5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/155'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:25Z', 'nvd_published_at': None}
1.4.0
GHSA-5r2p-j47h-mhpg
2023-08-28T12:48:11Z
2018-11-15T15:59:08Z
null
['CVE-2018-16471']
Rack vulnerable to Cross-site Scripting
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16471'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2018-16471.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/NAalCee8n6o'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4089-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:10Z', 'nvd_published_at': None}
1.4.0
GHSA-ghgj-3xqr-6jfm
2022-09-14T01:06:27Z
2018-11-09T17:50:00Z
null
['CVE-2015-2080']
Jetty vulnerable to exposure of sensitive information to unauthenticated remote users
The exception handling code in Eclipse Jetty prior to 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.9.v20150224'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.8.v20150217'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2080'}, {'type': 'WEB', 'url': 'https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ghgj-3xqr-6jfm'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190307-0005/'}, {'type': 'WEB', 'url': 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html'}, {'type': 'WEB', 'url': 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00075.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151804.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2015/Mar/12'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/534755/100/1600/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/72768'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1031800'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:23Z', 'nvd_published_at': None}
1.4.0
GHSA-p639-xxv5-j383
2022-09-14T22:07:19Z
2018-11-21T22:24:08Z
null
['CVE-2018-1315']
Incorrect Permission Assignment for Critical Resource in Apache hive
In Apache Hive 2.1.0 to 2.3.2, when 'COPY FROM FTP' statement is run using HPL/SQL extension to Hive, a compromised/malicious FTP server can cause the file to be written to an arbitrary location on the cluster where the command is run from. This is because FTP client code in HPL/SQL does not verify the destination location of the downloaded file. This does not affect hive cli user and hiveserver2 user as hplsql is a separate command line script and needs to be invoked differently.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1315'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p639-xxv5-j383'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d5da94ef60312c01a8d2348466680d1b5fb70702c71a3e84e94f7933@%3Cdev.hive.apache.org%3E'}]
{'cwe_ids': ['CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:04Z', 'nvd_published_at': None}
1.4.0
GHSA-9jm3-5835-537m
2023-09-13T19:36:05Z
2018-11-01T14:48:50Z
null
['CVE-2018-16462']
Command Injection in apex-publish-static-files
Versions of `apex-publish-static-files` before 2.0.1 are vulnerable to command injection. This is exploitable if user input is passed into the `connectString` option in the `publish` method. ## Recommendation Update to version 2.0.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'apex-publish-static-files'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16462'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/405694'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9jm3-5835-537m'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/475.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/718'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:57Z', 'nvd_published_at': None}
1.4.0
GHSA-qw3g-35hc-fcrh
2023-09-12T21:05:41Z
2018-11-09T17:45:38Z
null
['CVE-2017-16018']
Cross-Site Scripting (XSS) in restify
Affected versions of `restify` are susceptible to a cross-site scripting vulnerability when using URL encoded script tags in a non-existent URL. ## Proof of Concept: Request ``` https://localhost:3000/no5_such3_file7.pl?%22%3E%3Cscript%3Ealert(73541);%3C/script%3E ``` Will be included in response: ```<script>alert(73541);</script>``` ## Recommendation Update to version 4.1.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'restify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16018'}, {'type': 'WEB', 'url': 'https://github.com/restify/node-restify/issues/1018'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qw3g-35hc-fcrh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/314'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:56Z', 'nvd_published_at': None}
1.4.0
GHSA-7xfp-9c55-5vqj
2023-09-12T18:48:46Z
2018-11-09T17:44:01Z
null
['CVE-2017-16026']
Remote Memory Exposure in request
Affected versions of `request` will disclose local system memory to remote systems in certain circumstances. When a multipart request is made, and the type of `body` is `number`, then a buffer of that size will be allocated and sent to the remote server as the body. ## Proof of Concept ```js var request = require('request'); var http = require('http'); var serveFunction = function (req, res){ req.on('data', function (data) { console.log(data) }); res.end(); }; var server = http.createServer(serveFunction); server.listen(8000); request({ method: "POST", uri: 'http://localhost:8000', multipart: [{body:500}] },function(err,res,body){}); ``` ## Recommendation Update to version 2.68.0 or later
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.49.0'}, {'fixed': '2.68.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.6'}, {'fixed': '2.68.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.47.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16026'}, {'type': 'WEB', 'url': 'https://github.com/request/request/issues/1904'}, {'type': 'WEB', 'url': 'https://github.com/request/request/pull/2018'}, {'type': 'WEB', 'url': 'https://github.com/request/request/pull/2022'}, {'type': 'WEB', 'url': 'https://github.com/request/request/commit/29d81814bc16bc79cb112b4face8be6fc00061dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/request/request'}]
{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:42Z', 'nvd_published_at': None}
1.4.0
GHSA-fwx5-5fqj-jv98
2020-08-31T18:18:39Z
2018-11-09T17:46:30Z
null
['CVE-2017-16022']
Cross-Site Scripting in morris.js
Affected versions of `morris.js` are vulnerable to cross-site scripting attacks in labels that appear when hovering over a particular point on a generated graph. The text content of these labels is not escaped, so if control over the labels is obtained, script can be injected. The script will run on the client side whenever that specific graph is loaded. ## Recommendation A patch for this vulnerability was created in 2014, but has still not been published to npm. In order to mitigate this issue effectively, install the library from github via: ``` npm i morrisjs/morris.js -s ```
[]
[{'package': {'ecosystem': 'npm', 'name': 'morris.js'}, 'versions': ['0.5.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16022'}, {'type': 'WEB', 'url': 'https://github.com/morrisjs/morris.js/pull/464'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fwx5-5fqj-jv98'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/307'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:38Z', 'nvd_published_at': None}
1.4.0
GHSA-mh6f-8j2x-4483
2021-09-15T20:08:26Z
2018-11-26T23:58:21Z
null
[]
Critical severity vulnerability that affects event-stream and flatmap-stream
The NPM package `flatmap-stream` is considered malicious. A malicious actor added this package as a dependency to the NPM `event-stream` package in version `3.3.6`. Users of `event-stream` are encouraged to downgrade to the last non-malicious version, `3.3.4`, or upgrade to the latest 4.x version. Users of `flatmap-stream` are encouraged to remove the dependency entirely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'event-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.6'}, {'fixed': '4.0.0'}]}], 'versions': ['3.3.6']}, {'package': {'ecosystem': 'npm', 'name': 'flatmap-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dominictarr/event-stream/issues/116'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mh6f-8j2x-4483'}, {'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/event-stream'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:17Z', 'nvd_published_at': None}
1.4.0
GHSA-vwjj-2852-3765
2023-09-07T18:28:05Z
2018-11-09T17:46:27Z
null
['CVE-2017-16015']
Cross-Site Scripting in forms
Affected versions of `forms` do not properly escape HTML in generated forms, which may result in cross-site scripting. ## Recommendation Update to version 1.3.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'forms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16015'}, {'type': 'WEB', 'url': 'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vwjj-2852-3765'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/158'}]
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:34Z', 'nvd_published_at': None}
1.4.0
GHSA-rrfq-g5fq-fc9c
2022-09-14T22:08:31Z
2018-11-21T22:25:04Z
null
['CVE-2018-11777']
Improper Authentication in hive:hive-exec
In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11777'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rrfq-g5fq-fc9c'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/963c8e2516405c9b532b4add16c03b2c5db621e0c83e80f45049cbbb@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105886'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:42Z', 'nvd_published_at': None}
1.4.0
GHSA-f9cm-qmx5-m98h
2023-09-07T20:34:10Z
2018-11-01T14:45:42Z
null
['CVE-2018-16469']
Prototype Pollution in merge
Versions of `merge` before 1.2.1 are vulnerable to prototype pollution. The `merge.recursive` function can be tricked into adding or modifying properties of the Object prototype. ## Recommendation Update to version 1.2.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'merge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16469'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/381194'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f9cm-qmx5-m98h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/722'}]
{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:14Z', 'nvd_published_at': None}
1.4.0
GHSA-qr28-7j6p-9hmv
2023-03-27T22:21:10Z
2018-11-09T17:47:45Z
null
['CVE-2017-1000042']
Content Injection via TileJSON attribute in mapbox.js
Versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios. If `L.mapbox.map` or `L.mapbox.tileLayer` are used to load untrusted TileJSON content from a non-Mapbox URL, it is possible for a malicious user with control over the TileJSON content to inject script content into the "attribution" value of the TileJSON which will be executed in the context of the page using Mapbox.js. ## Recommendation Version 2.x: Update to version 2.1.7 or later. Version 1.x: Update to version 1.6.5 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mapbox-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mapbox-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000042'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/54327'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qr28-7j6p-9hmv'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mapbox-rails/CVE-2017-1000042.yml'}, {'type': 'WEB', 'url': 'https://nodesecurity.io/advisories/49'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/49'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:39Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-mwcv-m549-5cm8
2023-09-11T18:23:24Z
2018-11-01T14:47:43Z
null
['CVE-2017-16062']
node-tkinter is malware
The `node-tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-tkinter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16062'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mwcv-m549-5cm8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/501'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:28Z', 'nvd_published_at': None}
1.4.0
GHSA-mrmf-qwxg-7c3h
2023-09-08T19:51:45Z
2018-11-09T17:48:20Z
null
['CVE-2017-16006']
XSS in Data URI in remarkable
Affected versions of `remarkable` are vulnerable to cross-site scripting. Vulnerable versions of the package allow the use of `data:` URIs in links, and can therefore execute javascript. ## Proof of Concept ```markdown [link](data:text/html,<script>alert('0')</script>) ``` ## Recommendation Update to v1.7.0 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16006'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/227'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mrmf-qwxg-7c3h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/319'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:10Z', 'nvd_published_at': None}
1.4.0
GHSA-79mx-88w7-8f7q
2021-09-02T21:06:02Z
2018-11-06T23:12:49Z
null
['CVE-2014-9772']
XSS Filter Bypass via Encoded URL in validator
Versions of `validator` prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability. ## Proof of Concept The xss() function removes the word "javascript" when contained inside an attribute. However, it does not properly handle cases where characters have been hex-encoded. As a result, it is possible to build an input that bypasses the filter but which the browser will accept as valid JavaScript. For example: ```<a href="jav&#x61;script:...">abc</a>``` will render as: ```<a href="javascript:...">abc</a>``` ## Recommendation The package author has decided to remove the xss filter functionality in the latest version of this module. If this feature is not currently being used, you are not affected by the vulnerability. If it is being used, updating to the latest version of the module will break your application. In order for affected users to mitigate this vulnerability, it is necessary to use an [alternative package](https://www.npmjs.com/search?q=xss%20filter&page=1&ranking=optimal) that provides similar functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772'}, {'type': 'WEB', 'url': 'https://github.com/chriso/validator.js/issues/181'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-79mx-88w7-8f7q'}, {'type': 'PACKAGE', 'url': 'https://github.com/chriso/validator.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/43'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97102'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:15Z', 'nvd_published_at': None}
1.4.0
GHSA-xc6g-ggrc-qq4r
2023-09-08T23:04:54Z
2018-11-09T17:47:23Z
null
['CVE-2017-16016']
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`. ## Proof of Concept ```js var sanitizeHtml = require('sanitize-html'); var dirty = '!<textarea>&lt;/textarea&gt;<svg/onload=prompt`xs`&gt;</textarea>!'; var clean = sanitizeHtml(dirty, { allowedTags: [ 'textarea' ] }); console.log(clean); // !<textarea></textarea><svg/onload=prompt`xs`></textarea>! ``` ## Recommendation Update to version 1.11.4 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16016'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/issues/100'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xc6g-ggrc-qq4r'}, {'type': 'WEB', 'url': 'https://npmjs.com/package/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/154'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:52Z', 'nvd_published_at': None}
1.4.0
GHSA-9h9c-f287-c6vp
2022-09-14T22:02:16Z
2018-11-06T23:16:18Z
null
['CVE-2018-17184']
Improper Control of Interaction Frequency in Apache syncope-core
A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected JavaScript code is executed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17184'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9h9c-f287-c6vp'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security#CVE-2018-17184:_Stored_XSS'}]
{'cwe_ids': ['CWE-799'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:47Z', 'nvd_published_at': None}
1.4.0
GHSA-f89g-whpf-6q9m
2023-09-08T23:59:04Z
2018-11-09T17:46:56Z
null
['CVE-2017-16008']
Cross-Site Scripting in i18next
Affected versions of `i18next` allow untrusted user input to be injected into dictionary key names, resulting in a cross-site scripting vulnerability. ## Proof of Concept ```js var init = i18n.init({debug: true}, function(){ var test = i18n.t('__firstName__ __lastName__', { escapeInterpolation: true, firstName: '__lastNameHTML__', lastName: '<script>', }); console.log(test); }); // equals "<script> &lt;script&gt;" ``` ## Recommendation Update to version 1.10.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'i18next'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16008'}, {'type': 'WEB', 'url': 'https://github.com/i18next/i18next/pull/443'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f89g-whpf-6q9m'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/325'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:06Z', 'nvd_published_at': None}
1.4.0
GHSA-hc9w-4p87-j549
2023-02-04T00:15:03Z
2018-11-07T20:46:25Z
null
['CVE-2018-16472']
Prototype Pollution in cached-path-relative
Version of `cached-path-relative` before 1.0.2 are vulnerable to prototype pollution. ## Recommendation Update to version 1.0.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'cached-path-relative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16472'}, {'type': 'WEB', 'url': 'https://github.com/ashaffer/cached-path-relative/issues/3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390847'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hc9w-4p87-j549'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/480.json'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00006.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/739'}]
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:57Z', 'nvd_published_at': '2018-11-06T19:29:00Z'}
1.4.0
GHSA-q8xj-8xg3-w432
2022-09-14T22:03:57Z
2018-11-09T17:41:35Z
null
['CVE-2018-18854']
Uncontrolled Resource Consumption in spray-json
Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of many JSON object fields (with keys that have the same hash code).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18854'}, {'type': 'WEB', 'url': 'https://github.com/spray/spray-json/issues/277'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q8xj-8xg3-w432'}, {'type': 'PACKAGE', 'url': 'https://github.com/spray/spray-jso'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:29Z', 'nvd_published_at': None}
1.4.0
GHSA-7hjp-97g3-rq93
2022-09-14T21:59:33Z
2018-11-01T14:47:04Z
null
['CVE-2018-18831']
Path Traversal in minsoft:ms-mcms
An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18831'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/IO0K0'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7hjp-97g3-rq93'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:53Z', 'nvd_published_at': None}
1.4.0
GHSA-w4x9-4f5x-8jj8
2020-06-16T21:59:37Z
2018-11-21T22:23:29Z
null
['CVE-2014-0228']
Low severity vulnerability that affects org.apache.hive:hive-exec, org.apache.hive:hive, and org.apache.hive:hive-service
Apache Hive before 0.13.1, when in SQL standards based authorization mode, does not properly check the file permissions for (1) import and (2) export statements, which allows remote authenticated users to obtain sensitive information via a crafted URI.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w4x9-4f5x-8jj8'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hive-user/201406.mbox/%3CCABgNGzeN7E+9d=YV5yvnKA7wmSx1op_avtUjPcPtDaR6DLJM6g@mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/127091/Apache-Hive-0.13.0-Authorization-Failure.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/532418/100/0/threaded'}]
{'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:37Z', 'nvd_published_at': None}
1.4.0
GHSA-3rhm-67j6-42jq
2022-09-14T19:18:31Z
2018-11-09T17:50:40Z
null
['CVE-2017-18239']
Exposure of Sensitive information in authentikat-jwt
A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jason-goodwin:authentikat-jwt_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18239'}, {'type': 'WEB', 'url': 'https://github.com/jasongoodwin/authentikat-jwt/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/jasongoodwin/authentikat-jwt/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3rhm-67j6-42jq'}, {'type': 'PACKAGE', 'url': 'https://github.com/jasongoodwin/authentikat-jwt'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:11Z', 'nvd_published_at': None}
1.4.0
GHSA-f94m-mqhr-mc29
2022-09-14T22:04:18Z
2018-11-09T17:42:26Z
null
['CVE-2018-18853']
Uncontrolled Resource Consumption in spray-json when parsing decimal digit fields
Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of a field composed of many decimal digits.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18853'}, {'type': 'WEB', 'url': 'https://github.com/spray/spray-json/issues/278'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f94m-mqhr-mc29'}, {'type': 'PACKAGE', 'url': 'https://github.com/spray/spray-json'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:09Z', 'nvd_published_at': None}
1.4.0
GHSA-qv2v-m59f-v5fw
2021-09-16T21:04:32Z
2018-11-07T00:29:37Z
null
['CVE-2017-16031']
Insecure randomness in socket.io
Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization. ## Recommendation Update to v0.9.7 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'socket.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/issues/856'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/pull/857'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qv2v-m59f-v5fw'}, {'type': 'PACKAGE', 'url': 'https://github.com/socketio/socket.io'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/321'}]
{'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:46Z', 'nvd_published_at': None}
1.4.0
GHSA-vqgp-4jgj-5j64
2023-09-01T10:05:11Z
2018-11-21T22:23:04Z
null
['CVE-2018-18920']
Py-EVM is vulnerable to arbitrary bytecode injection
Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'py-evm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0a33'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18920'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/py-evm/issues/1448'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vqgp-4jgj-5j64'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/py-evm'}, {'type': 'WEB', 'url': 'https://twitter.com/AlexanderFisher/status/1060923428641878019'}, {'type': 'WEB', 'url': 'https://twitter.com/NettaLab/status/1060889400102383617'}, {'type': 'WEB', 'url': 'https://www.reddit.com/r/ethereum/comments/9vkk2g/netta_labs_claim_to_have_found_a_vulnerability_in/e9d3wyx/'}]
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:10Z', 'nvd_published_at': None}
1.4.0
GHSA-49qr-xh3w-h436
2023-09-05T18:42:33Z
2018-11-21T22:15:47Z
null
['CVE-2018-19351']
Jupyter Notebook XSS via untrusted notebooks
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPostHandler do not set a Content Security Policy to prevent this.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19351'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-49qr-xh3w-h436'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/jupyter/hWzu2BSsplY'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html'}, {'type': 'WEB', 'url': 'https://pypi.org/project/notebook/#history'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:00Z', 'nvd_published_at': None}
1.4.0
GHSA-hfj4-96f7-6r5g
2023-09-12T21:02:01Z
2018-11-09T17:49:11Z
null
['CVE-2017-0931']
Cross-Site Scripting in html-janitor
Versions of `html-janitor` prior to 2.0.2 (all current versions) are vulnerable to cross-site scripting (XSS). This is exploitable if user-controlled data is passed into the modules `clean()` function. ## Recommendation No fix is currently available for this vulnerability. It is recommended to use an alternative module for HTML sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'html-janitor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0931'}, {'type': 'WEB', 'url': 'https://github.com/guardian/html-janitor/issues/34'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/308155'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hfj4-96f7-6r5g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/576'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:59Z', 'nvd_published_at': None}
1.4.0
GHSA-vxp9-wv2f-wqmw
2022-09-14T22:03:32Z
2018-11-09T17:40:56Z
null
['CVE-2018-8021']
Deserialization of Untrusted Data in superset
Versions of Superset prior to 0.23 used an unsafe load method from the pickle library to deserialize data leading to possible remote code execution. Note Superset 0.23 was released prior to any Superset release under the Apache Software Foundation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'superset'}, 'ecosystem_specific': {'affected_functions': ['superset.models.core.Dashboard.import_obj', 'superset.views.core.DashboardModelView.download_dashboards', 'superset.views.core.Superset.import_dashboards']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8021'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/pull/4243'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/commit/2c72a7ae4fc0a8bac1f037a79efa90e1c5549710'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45933/'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:58Z', 'nvd_published_at': None}
1.4.0
GHSA-5mhv-9qw8-j63g
2023-09-11T16:18:34Z
2018-11-09T17:43:03Z
null
['CVE-2017-16056']
mssql.js is malware
The `mssql.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mssql.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16056'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5mhv-9qw8-j63g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/485'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:43Z', 'nvd_published_at': None}
1.4.0
GHSA-9fg5-f5pj-rwcc
2023-09-11T21:49:09Z
2018-11-09T17:43:52Z
null
['CVE-2017-16058']
gruntcli is malware
The `gruntcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'gruntcli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16058'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9fg5-f5pj-rwcc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/498'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:20Z', 'nvd_published_at': None}
1.4.0
GHSA-9p47-w5xp-f4xr
2023-09-13T22:23:39Z
2018-11-09T17:48:37Z
null
['CVE-2017-16003']
windows-build-tools downloads Resources over HTTP
Affected versions of `windows-build-tools` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-build-tools`. ## Recommendation Update to version 1.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'windows-build-tools'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16003'}, {'type': 'WEB', 'url': 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90'}, {'type': 'WEB', 'url': 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9p47-w5xp-f4xr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/304'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:09Z', 'nvd_published_at': None}
1.4.0
GHSA-83r3-c79w-f6wc
2021-09-03T22:28:49Z
2018-11-21T22:23:49Z
null
['CVE-2015-7521']
High severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
The authorization framework in Apache Hive 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0 and 1.2.1, on clusters protected by Ranger and SqlStdHiveAuthorization, allows attackers to bypass intended parent table access restrictions via unspecified partition-level operations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7521'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-83r3-c79w-f6wc'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hive-user/201601.mbox/%3C20160128205008.2154F185EB%40minotaur.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/135836/Apache-Hive-Authorization-Bypass.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/28/12'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/537549/100/0/threaded'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:07Z', 'nvd_published_at': None}
1.4.0
GHSA-3p8f-j2vw-7hw9
2023-09-07T22:49:48Z
2018-11-09T17:43:44Z
null
['CVE-2017-16059']
mssql-node is malware
The `mssql-node` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this module is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mssql-node'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16059'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3p8f-j2vw-7hw9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/480'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:41Z', 'nvd_published_at': None}
1.4.0
GHSA-q69p-5h74-w36f
2023-03-27T22:19:37Z
2018-11-09T17:48:34Z
null
['CVE-2017-1000043']
Content Injection via TileJSON Name in mapbox.js
Versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios. If `L.mapbox.map` or `L.mapbox.shareControl` are used in a manner that gives users control of the TileJSON content, it is possible to inject script content into the name value of the TileJSON. After clicking on the share control, the malicious code will execute in the context of the page using Mapbox.js. ## Recommendation Version 1.x: Update to version 1.6.6 or later. Version 2.x: Update to version 2.2.4 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mapbox.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mapbox-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mapbox-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000043'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/99245'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q69p-5h74-w36f'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mapbox-rails/CVE-2017-1000043.yml'}, {'type': 'WEB', 'url': 'https://nodesecurity.io/advisories/74'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/74'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:13Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-r34r-f84j-5x4x
2021-09-17T14:13:37Z
2018-11-09T17:43:08Z
null
['CVE-2017-7678']
Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7678'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r34r-f84j-5x4x'}, {'type': 'WEB', 'url': 'http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99603'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:27Z', 'nvd_published_at': None}
1.4.0
GHSA-h29f-7f56-j8wh
2023-01-23T21:16:39Z
2018-02-20T19:23:20Z
null
['CVE-2018-7212']
Sinatra Path Traversal vulnerability
An issue was discovered in `rack-protection/lib/rack/protection/path_traversal.rb` in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sinatra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.beta1'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7212'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/pull/1379'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/commit/6ad721abcfe36334108dcdd05d046c361e1b7a9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sinatra/sinatra'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:23Z', 'nvd_published_at': None}
1.4.0
GHSA-2r9c-46v3-43fc
2021-01-08T20:59:00Z
2018-08-17T20:28:13Z
null
['CVE-2016-10688']
Downloads Resources over HTTP in haxe3
Affected versions of `haxe3` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe3`. ## Recommendation No patch is currently available for this vulnerability. This vulnerability has been left unpatched for several years, despite active maintenance on the package. Because of this, it appears that the package author has accepted the risk, and is unlikely to patch this package in the future. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'haxe3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10688'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2r9c-46v3-43fc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/294'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:56Z', 'nvd_published_at': None}
1.4.0
GHSA-5p9f-55j8-922m
2020-06-17T15:14:35Z
2018-08-13T20:49:10Z
null
[]
Moderate severity vulnerability that affects doorkeeper
Withdrawn, accidental duplicate publish. The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5p9f-55j8-922m'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:35Z', 'nvd_published_at': None}
1.4.0
GHSA-9cp3-fh5x-xfcj
2023-03-31T15:44:11Z
2018-08-09T20:55:46Z
null
['CVE-2017-16098']
Regular Expression Denial of Service in charset
Affected versions of `charset` are susceptible to a regular expression denial of service. The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length. If node was compiled using the `-DHTTP_MAX_HEADER_SIZE` however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node. ## Recommendation Update to version 1.0.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'charset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16098'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/charset/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/charset/pull/11'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/charset/commit/effda0c48c51b47a47f4cad7db0c51ee7407cc1b'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-modules/charset'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:14Z', 'nvd_published_at': None}
1.4.0
GHSA-3fhf-6939-qg8p
2023-09-05T21:42:43Z
2018-08-13T20:47:22Z
null
['CVE-2015-1820']
rest-client Gem Vulnerable to Session Fixation
REST client for Ruby (aka rest-client) versions 1.6.1.a until 1.8.0 allow remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rest-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.1.a'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1820'}, {'type': 'WEB', 'url': 'https://github.com/rest-client/rest-client/issues/369'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1205291'}, {'type': 'PACKAGE', 'url': 'https://github.com/rest-client/rest-client'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/rest-client/versions/1.6.1.a'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228080106/http://www.securityfocus.com/bid/73295'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/03/24/3'}]
{'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:58Z', 'nvd_published_at': None}
1.4.0
GHSA-fv9m-f7w4-889c
2023-09-09T00:00:04Z
2018-08-06T21:43:03Z
null
['CVE-2017-16207']
discordi.js is malware
The `discordi.js` package is malware that attempts to discover and exfiltrate a user's [Discord](https://discordapp.com/) credentials, sending them to pastebin. All versions have been unpublished from the npm registry. ## Recommendation Do not install / use this module. It has been unpublished from the npm registry but may exist in some caches. Any users that logged into Discord using this library will need to change their credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'discordi.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16207'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fv9m-f7w4-889c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/545'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:18Z', 'nvd_published_at': None}
1.4.0
GHSA-j49g-mp79-5vm5
2023-09-07T18:25:01Z
2018-08-06T20:06:29Z
null
['CVE-2017-16203']
coffe-script is malware
The `coffe-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `coffe-script` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'coffe-script'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16203'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j49g-mp79-5vm5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/543'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:58Z', 'nvd_published_at': None}
1.4.0
GHSA-22gq-x6pg-752j
2023-09-07T22:47:17Z
2018-08-29T23:45:41Z
null
['CVE-2017-16065']
openssl.js is malware
The `openssl.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'openssl.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16065'}, {'type': 'PACKAGE', 'url': 'https://github.com/DigitalArsenal/openssl.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/504'}]
{'cwe_ids': ['CWE-433', 'CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:50:52Z', 'nvd_published_at': None}
1.4.0
GHSA-hx46-vwmx-wx95
2021-12-02T23:14:01Z
2018-08-13T20:48:25Z
null
[]
High severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hx46-vwmx-wx95'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:51Z', 'nvd_published_at': None}
1.4.0
GHSA-cwp3-834g-x79g
2020-06-16T21:39:02Z
2018-08-21T17:07:36Z
null
[]
Moderate severity vulnerability that affects archive-tar-minitar and minitar
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'minitar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'archive-tar-minitar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cwp3-834g-x79g'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:06Z', 'nvd_published_at': None}
1.4.0
GHSA-2wpq-vvw6-67wr
2023-09-11T22:23:56Z
2018-08-29T23:38:35Z
null
['CVE-2017-16070']
nodecaffe is malware
The `nodecaffe` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodecaffe'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16070'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/509'}]
{'cwe_ids': ['CWE-433', 'CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:08Z', 'nvd_published_at': None}
1.4.0
GHSA-m3q7-rj8g-m457
2023-01-26T21:07:48Z
2018-08-28T22:33:24Z
null
['CVE-2015-7565']
ember-source Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.11.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ember-source/CVE-2015-7565.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY'}, {'type': 'WEB', 'url': 'http://emberjs.com/blog/2016/01/14/security-releases-ember-1-11-4-1-12-2-1-13-12-2-0-3-2-1-2-2-2-1.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:43Z', 'nvd_published_at': None}
1.4.0
GHSA-f599-5m7p-hcpf
2023-03-01T01:34:41Z
2018-08-13T20:45:32Z
null
['CVE-2018-3769']
grape subject to Cross-site Scripting
The grape rubygem suffers from a cross-site scripting (XSS) vulnerability via "format" parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'grape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3769'}, {'type': 'WEB', 'url': 'https://github.com/ruby-grape/grape/issues/1762'}, {'type': 'WEB', 'url': 'https://github.com/ruby-grape/grape/pull/1763'}, {'type': 'WEB', 'url': 'https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/grape/CVE-2018-3769.yml'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:43Z', 'nvd_published_at': '2018-07-05T16:29:00Z'}
1.4.0
GHSA-3wxq-7r8m-qpmg
2023-09-07T18:33:27Z
2018-08-29T23:56:30Z
null
['CVE-2017-16068']
ffmepg is malware
The `ffmepg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ffmepg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16068'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3wxq-7r8m-qpmg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/507'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:46Z', 'nvd_published_at': None}
1.4.0
GHSA-gf7h-vg5v-cch6
2023-09-11T18:57:28Z
2018-08-06T20:03:21Z
null
['CVE-2017-16198']
Directory Traversal in ritp
Affected versions of `ritp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. **Example request:** ```http GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ritp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16198'}, {'type': 'PACKAGE', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ritp'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gf7h-vg5v-cch6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/432'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:02Z', 'nvd_published_at': None}
1.4.0
GHSA-wqh4-27cc-j8f2
2023-09-11T18:31:53Z
2018-08-29T23:36:48Z
null
['CVE-2017-16069']
nodeffmpeg is malware
The `nodeffmpeg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodeffmpeg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16069'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wqh4-27cc-j8f2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/508'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:02Z', 'nvd_published_at': None}
1.4.0
GHSA-c9rj-pgxv-84jc
2023-09-08T21:32:49Z
2018-08-06T20:12:46Z
null
['CVE-2017-16206']
cofee-script is malware
The `cofee-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `cofee-script` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'cofee-script'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16206'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9rj-pgxv-84jc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/540'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:00Z', 'nvd_published_at': None}
1.4.0
GHSA-2pwf-xwr3-hp55
2021-12-02T23:14:26Z
2018-08-13T20:48:52Z
null
[]
Moderate severity vulnerability that affects actionview
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2pwf-xwr3-hp55'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:48Z', 'nvd_published_at': None}
1.4.0
GHSA-x489-jjwm-52g7
2023-07-05T20:45:12Z
2018-08-28T22:34:15Z
null
['CVE-2015-7225']
Tinfoil Devise-two-factor does not "burn" a successfully validated one-time password (OTP)
Tinfoil Devise-two-factor before 2.0.0 does not strictly follow [RFC 6238 § 5.2 ](https://datatracker.ietf.org/doc/html/rfc6238#section-5.2) and does not "burn" a successfully validated one-time password (aka OTP), which allows physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or "shoulder surfing", and replaying the OTP in the current time-step.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'devise-two-factor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7225'}, {'type': 'WEB', 'url': 'https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x489-jjwm-52g7'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/devise-two-factor/CVE-2015-7225.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinfoil/devise-two-factor'}, {'type': 'WEB', 'url': 'https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210122192452/https://www.securityfocus.com/bid/76789/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/20/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09/06/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09/17/2'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:02Z', 'nvd_published_at': None}
1.4.0
GHSA-5rc6-2r3r-fv79
2023-09-13T19:09:51Z
2018-08-15T19:25:47Z
null
['CVE-2016-10644']
slimerjs-edge downloads Resources over HTTP
Affected versions of `slimerjs-edge` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `slimerjs-edge`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'slimerjs-edge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10644'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5rc6-2r3r-fv79'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/243'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:16Z', 'nvd_published_at': None}
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
31
Edit dataset card