{ "retire-example": { "vulnerabilities" : [ { "atOrAbove": "0.0.1", "below" : "0.0.2", "info" : [ "http://github.com/eoftedal/retire.js/" ] } ] }, "angular" : { "vulnerabilities" : [ { "below" : "1.8.0", "severity": "medium", "identifiers": { "summary": "angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one.", "CVE": [ "CVE-2020-7676" ] }, "info" : [ "https://nvd.nist.gov/vuln/detail/CVE-2020-7676" ] }, { "atOrAbove" : "1.5.0", "below" : "1.6.9", "severity": "low", "identifiers": { "summary": "XSS through SVG if enableSvg is set" }, "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md#169-fiery-basilisk-2018-02-02", "https://vulnerabledoma.in/ngSanitize1.6.8_bypass.html" ] }, { "atOrAbove" : "1.3.0", "below" : "1.5.0-rc2", "severity": "medium", "identifiers": { "summary": "The attribute usemap can be used as a security exploit" }, "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md#1230-patronal-resurrection-2016-07-21" ] }, { "atOrAbove" : "1.0.0", "below" : "1.2.30", "severity": "medium", "identifiers": { "summary": "The attribute usemap can be used as a security exploit" }, "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md#1230-patronal-resurrection-2016-07-21" ] }, { "below" : "1.6.3", "severity": "medium", "identifiers": { "summary": "Universal CSP bypass via add-on in Firefox" }, "info" : [ "https://github.com/mozilla/addons-linter/issues/1000#issuecomment-282083435", "http://pastebin.com/raw/kGrdaypP" ] }, { "below" : "1.6.3", "severity": "medium", "identifiers": { "summary": "DOS in $sanitize" }, "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md" ] }, { "below" : "1.6.5", "severity": "low", "identifiers": { "summary": "XSS in $sanitize in Safari/Firefox" }, "info" : [ "https://github.com/angular/angular.js/commit/8f31f1ff43b673a24f84422d5c13d6312b2c4d94" ] } ] }, "hubot-scripts": { "vulnerabilities" : [ { "below" : "2.4.4", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/13" ] } ] }, "connect": { "vulnerabilities" : [ { "below" : "2.8.1", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/3" ] } ] }, "libnotify": { "vulnerabilities" : [ { "below" : "1.0.4", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/20" ] } ] }, "tomato": { "vulnerabilities" : [ { "below" : "0.0.6", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/38" ] } ] }, "uglify-js" : { "vulnerabilities" : [ { "below" : "2.4.24", "severity": "high", "info" : [ "https://github.com/mishoo/UglifyJS2/issues/751", "https://github.com/tmcw/mdast-uglify-bug", "https://nodesecurity.io/advisories/39" ] }, { "below" : "2.6.0", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/48" ] } ] }, "ansi2html" : { "vulnerabilities" : [ { "below" : "100", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/51" ] } ] }, "milliseconds" : { "vulnerabilities" : [ { "below" : "0.1.2", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/59" ] } ] }, "keystone" : { "vulnerabilities" : [ { "below" : "0.3.16", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/60" ] } ] }, "ecstatic" : { "vulnerabilities" : [ { "below" : "1.4.0", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/64" ] } ] }, "grunt-gh-pages" : { "vulnerabilities" : [ { "below" : "0.10.0", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/85" ] } ] }, "riot-compiler" : { "vulnerabilities" : [ { "below" : "2.3.22", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/86" ] } ] }, "node-uuid" : { "vulnerabilities" : [ { "below" : "1.4.4", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/93" ] } ] }, "restafary" : { "vulnerabilities" : [ { "below" : "1.6.1", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/89" ] } ] }, "droppy" : { "vulnerabilities" : [ { "below" : "3.5.0", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/91" ] } ] }, "airbrake" : { "vulnerabilities" : [ { "below" : "0.4.0", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/96" ] } ] }, "jsrender" : { "vulnerabilities" : [ { "below" : "0.9.74", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/97" ] } ] }, "npm" : { "vulnerabilities" : [ { "below" : "3.8.2", "atOrAbove": "3.0.0", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/98" ] }, { "below" : "2.15.1", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/98" ] }, { "below": "1.3.3", "severity": "low", "identifiers": { "summary": "npm_predictable-temp-filenames-allow-overwrite-of-arbitrary-files" }, "info": [ "https://nodesecurity.io/advisories/152" ] } ] }, "console-io" : { "vulnerabilities" : [ { "below" : "2.7.0", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/90" ] } ] }, "express-restify-mongoose" : { "vulnerabilities" : [ { "below" : "2.5.0", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/92" ] }, { "below" : "3.1.0", "severity" : "high", "atOrAbove":"3.0.0", "info" : [ "https://nodesecurity.io/advisories/92" ] } ] }, "mysql" : { "vulnerabilities" : [ { "below" : "2.0.0-alpha8", "severity" : "medium", "identifiers": { "summary" : "SQL Injection due to unescaped object keys" } , "info" : [ "https://nodesecurity.io/advisories/66" ] } ] }, "bittorrent-dht" : { "vulnerabilities" : [ { "below" : "5.1.3", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/68" ] } ] }, "jadedown" : { "vulnerabilities" : [ { "below" : "100", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/52" ] } ] }, "jshamcrest" : { "vulnerabilities" : [ { "below" : "100", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/53" ] } ] }, "ws" : { "vulnerabilities" : [ { "below" : "1.0.1", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/67" ] }, { "below": "1.1.1", "severity" : "high", "identifiers": { "advisory": "DoS due to excessively large websocket message" }, "info": [ "https://nodesecurity.io/advisories/120" ] } ] }, "gm" : { "vulnerabilities" : [ { "below" : "1.21.1", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/54", "https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31" ] } ] }, "datatables": { "vulnerabilities": [ { "below" : "1.10.9", "severity" : "medium", "info": [ "https://nodesecurity.io/advisories/5" ] } ] }, "geddy": { "vulnerabilities": [ { "below" : "13.0.8", "severity" : "medium", "info": [ "https://nodesecurity.io/advisories/10" ] } ] }, "jquery-ujs": { "vulnerabilities": [ { "below" : "1.0.4", "severity" : "medium", "info": [ "https://nodesecurity.io/advisories/15" ] } ] }, "ldapauth-fork": { "vulnerabilities": [ { "below" : "2.3.3", "severity" : "medium", "info": [ "https://nodesecurity.io/advisories/18" ] } ] }, "ldapauth": { "vulnerabilities": [ { "below" : "2.2.5", "severity" : "medium", "info": [ "https://nodesecurity.io/advisories/19" ] } ] }, "ungit": { "vulnerabilities": [ { "below" : "0.9.0", "severity" : "medium", "info": [ "https://nodesecurity.io/advisories/40" ] } ] }, "handlebars" : { "vulnerabilities" : [ { "below" : "1.0.0.beta.3", "severity": "medium", "identifiers": { "summary": "poorly sanitized input passed to eval()" }, "info" : [ "https://github.com/wycats/handlebars.js/pull/68" ] }, { "below" : "4.0.0", "severity": "medium", "identifiers": { "summary": "Quoteless Attributes in Templates can lead to Content Injection" }, "info" : [ "https://nodesecurity.io/advisories/61" ] }, { "atOrAbove" : "4.0.0", "below" : "4.0.13", "severity": "high", "identifiers": { "summary": "A prototype pollution vulnerability in handlebars may lead to remote code execution if an attacker can control the template" }, "info" : [ "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692", "https://github.com/wycats/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86" ] }, { "atOrAbove" : "4.0.0", "below" : "4.0.14", "severity": "high", "identifiers": { "summary": "A prototype pollution vulnerability in handlebars may lead to remote code execution if an attacker can control the template" }, "info" : [ "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-174183", "https://github.com/wycats/handlebars.js/issues/1495", "https://github.com/wycats/handlebars.js/commit/cd38583216dce3252831916323202749431c773e" ] }, { "atOrAbove" : "4.1.0", "below" : "4.1.2", "severity": "high", "identifiers": { "summary": "A prototype pollution vulnerability in handlebars may lead to remote code execution if an attacker can control the template" }, "info" : [ "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-174183", "https://github.com/wycats/handlebars.js/issues/1495", "https://github.com/wycats/handlebars.js/commit/cd38583216dce3252831916323202749431c773e" ] } ] }, "marked": { "vulnerabilities" : [ { "below": "0.3.6", "severity": "medium", "identifiers": { "summary": "marked_content-injection" }, "info": [ "https://nodesecurity.io/advisories/101" ] }, { "below" : "0.3.1", "severity": "medium", "identifiers": { "CVE": ["CVE-2014-1850", "CVE-2014-3743"], "advisory": "marked_multiple_content_injection_vulnerabilities" }, "info" : [ "https://nodesecurity.io/advisories/22" ] }, { "below" : "0.3.3", "severity": "high", "identifiers": { "advisory": "marked_redos" }, "info" : [ "https://nodesecurity.io/advisories/23" ] }, { "below" : "0.3.3", "severity": "medium", "identifiers": { "CVE": ["CVE-2015-1370"], "advisory": "marked_vbscript_injection" }, "info" : [ "https://nodesecurity.io/advisories/24" ] }, { "below" : "0.3.6", "severity": "medium", "identifiers": { "advisory": "Cross-Site Scripting (XSS) Due To Sanitization Bypass Using HTML Entities" }, "info" : [ "https://srcclr.com/security/cross-site-scripting-xss-due-to/javascript/s-2309", "https://github.com/markedjs/marked/pull/592" ] } ] }, "js-yaml": { "vulnerabilities" : [ { "below" : "2.0.5", "severity": "medium", "identifiers": { "CVE": ["CVE-2013-4660"], "advisory": "JS-YAML_Deserialization_Code_Execution" }, "info" : [ "https://nodesecurity.io/advisories/16" ] } ] }, "st": { "vulnerabilities" : [ { "below" : "0.2.5", "severity": "medium", "identifiers": { "CVE": ["CVE-2014-3744"], "advisory": "st_directory_traversal" }, "info" : [ "https://nodesecurity.io/advisories/36" ] } ] }, "hapi": { "vulnerabilities" : [ { "below": "16.1.1", "atOrAbove": "15.0.0", "severity": "medium", "identifiers": { "summary": "hapi_denial-of-service-via-malformed-accept-encoding-header" }, "info": [ "https://nodesecurity.io/advisories/335" ] }, { "atOrAbove" : "2.0", "below" : "2.2", "severity": "high", "identifiers": { "CVE": ["CVE-2014-3742"], "advisory": "hapi_File_descriptor_leak_DoS_vulnerability" }, "info" : [ "https://nodesecurity.io/advisories/11", "https://github.com/spumko/hapi/issues/1427" ] }, { "below" : "6.1.0", "severity": "high", "identifiers": { "CVE": ["CVE-2014-4671"], "advisory": "hapijs-jsonp-CVE-2014-4671A" }, "info" : [ "https://nodesecurity.io/advisories/12" ] }, { "below" : "11.0.0", "severity": "medium", "identifiers": { "summary" : "Could allow forbidden CORS headers" }, "info" : [ "https://nodesecurity.io/advisories/45", "https://github.com/hapijs/hapi/issues/2850", "https://github.com/hapijs/hapi/issues/2840" ] }, { "below" : "11.1.3", "severity": "high", "identifiers": { "summary" : "Denial of service - Potential socket exhaustion" }, "info" : [ "https://nodesecurity.io/advisories/63", "https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580", "https://github.com/jfhbrook/node-ecstatic/pull/179" ] }, { "below" : "11.1.4", "severity": "medium", "identifiers": { "summary" : "Route level CORS config overrides connection level defaults" }, "info" : [ "https://nodesecurity.io/advisories/65" ] } ] }, "printer" : { "vulnerabilities" : [ { "below" : "0.0.2", "severity": "medium", "identifiers": { "CVE": ["CVE-2014-3741"], "advisory": "printer_potential_command_injection" }, "info" : [ "https://nodesecurity.io/advisories/27" ] } ] }, "ms" : { "vulnerabilities" : [ { "below" : "0.7.1", "severity": "medium", "identifiers": { "summary": "Regular expression denial of service" }, "info" : [ "https://nodesecurity.io/advisories/46" ] } ] }, "handlebars-runtime" : { "vulnerabilities" : [ { "below" : "1.0.0.beta.3", "severity": "high", "identifiers": { "summary": "poorly sanitized input passed to eval()" }, "info" : [ "https://github.com/wycats/handlebars.js/pull/68" ] } ] }, "ember" : { "vulnerabilities" : [ { "atOrAbove" : "1.3.0-*", "below" : "1.3.2", "severity": "high", "identifiers": {"CVE": ["CVE-2014-0046"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ" ] }, { "atOrAbove" : "1.2.0-*", "below" : "1.2.2", "severity": "high", "identifiers": {"CVE": ["CVE-2014-0046"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ" ] }, { "atOrAbove" : "1.4.0-*", "below" : "1.4.0-beta.2", "severity": "medium", "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ] }, { "atOrAbove" : "1.3.0-*", "below" : "1.3.1", "severity": "medium", "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ] }, { "atOrAbove" : "1.2.0-*", "below" : "1.2.1", "severity": "medium", "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ] }, { "atOrAbove" : "1.1.0-*", "below" : "1.1.3", "severity": "medium", "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ] }, { "atOrAbove" : "1.0.0-*", "below" : "1.0.1", "severity": "medium", "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ] }, { "atOrAbove" : "1.0.0-rc.1", "below" : "1.0.0-rc.1.1", "severity": "medium", "identifiers": {"CVE": ["CVE-2013-4170"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] }, { "atOrAbove" : "1.0.0-rc.2", "below" : "1.0.0-rc.2.1", "severity": "medium", "identifiers": {"CVE": ["CVE-2013-4170"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] }, { "atOrAbove" : "1.0.0-rc.3", "below" : "1.0.0-rc.3.1", "severity": "medium", "identifiers": {"CVE": ["CVE-2013-4170"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] }, { "atOrAbove" : "1.0.0-rc.4", "below" : "1.0.0-rc.4.1", "severity": "medium", "identifiers": {"CVE": ["CVE-2013-4170"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] }, { "atOrAbove" : "1.0.0-rc.5", "below" : "1.0.0-rc.5.1", "severity": "medium", "identifiers": {"CVE": ["CVE-2013-4170"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] }, { "atOrAbove" : "1.0.0-rc.6", "below" : "1.0.0-rc.6.1", "severity": "medium", "identifiers": {"CVE": ["CVE-2013-4170"]}, "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] }, { "below" : "0.9.7.1", "info" : [ "https://github.com/emberjs/ember.js/blob/master/CHANGELOG" ] }, { "below" : "0.9.7", "severity": "medium", "identifiers": { "bug": "699", "summary": "Bound attributes aren't escaped properly" }, "info" : [ "https://github.com/emberjs/ember.js/issues/699" ] } ] }, "eslint-utils": { "vulnerabilities" : [ { "atOrAbove" : "1.2.0", "below" : "1.4.1", "severity" : "high", "identifiers" : { "summary" : "Arbitrary Code Execution" }, "info" : ["https://www.npmjs.com/advisories/1118"] } ] }, "event-stream" : { "vulnerabilities" : [ { "below":"3.3.7", "atOrAbove" : "3.3.6", "severity": "high", "identifiers": { "summary": "Project compromised, malicious version published" }, "info" : [ "https://github.com/indexzero/ps-tree/pull/34" ] } ] }, "dojo" : { "vulnerabilities" : [ { "atOrAbove" : "0.4", "below" : "0.4.4", "severity": "high", "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272"]}, "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2272/" ] }, { "atOrAbove" : "1.0", "below" : "1.0.3", "severity": "high", "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272", "CVE-2010-2273"]}, "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ] }, { "atOrAbove" : "1.1", "below" : "1.1.2", "severity": "high", "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272", "CVE-2010-2273"]}, "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ] }, { "atOrAbove" : "1.2", "below" : "1.2.4", "severity": "high", "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272", "CVE-2010-2273"]}, "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ] }, { "atOrAbove" : "1.3", "below" : "1.3.3", "severity": "high", "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272", "CVE-2010-2273"]}, "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ] }, { "atOrAbove" : "1.4", "below" : "1.4.2", "severity": "high", "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272", "CVE-2010-2273"]}, "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ] }, { "below" : "1.4.2", "severity": "medium", "identifiers": {"CVE": ["CVE-2010-2275"]}, "info" : [ "http://www.cvedetails.com/cve/CVE-2010-2275/"] }, { "below" : "1.1", "severity": "medium", "identifiers": {"CVE": ["CVE-2008-6681"]}, "info" : [ "http://www.cvedetails.com/cve/CVE-2008-6681/"] }, { "below": "1.1", "severity": "medium", "identifiers": { "summary": "dojo_cross-site-scripting" }, "info": [ "https://nodesecurity.io/advisories/107" ] }, { "below" : "1.14", "severity": "medium", "identifiers": { "CVE": ["CVE-2018-15494"] }, "info" : [ "https://dojotoolkit.org/blog/dojo-1-14-released" ] } ] }, "mustache" : { "vulnerabilities" : [ { "below" : "0.3.1", "severity": "medium", "identifiers": { "bug": "112", "summary": "execution of arbitrary javascript" }, "info" : [ "https://github.com/janl/mustache.js/issues/112" ] }, { "below" : "2.2.1", "severity": "medium", "identifiers": { "summary": "Quoteless Attributes in Templates can lead to Content Injection" }, "info" : [ "https://nodesecurity.io/advisories/62" ] } ] }, "syntax-error" : { "vulnerabilities" : [ { "below" : "1.1.1", "severity": "medium", "identifiers": {"advisory": "syntax-error-potential-script-injection"}, "info" : [ "https://nodesecurity.io/advisories/37" ] } ] }, "crumb" : { "vulnerabilities" : [ { "below" : "3.0.0", "severity": "medium", "identifiers": {"advisory": "crumb_cors_token_disclosure"}, "info" : [ "https://nodesecurity.io/advisories/4" ] } ] }, "qs" : { "vulnerabilities" : [ { "below" : "1.0.0", "severity": "medium", "identifiers": {"advisory": "qs_dos_extended_event_loop_blocking"}, "info" : [ "https://nodesecurity.io/advisories/28" ] }, { "below": "1.0.0", "severity": "high", "identifiers": { "summary": "qs_denial-of-service-memory-exhaustion" }, "info": [ "https://nodesecurity.io/advisories/29" ] } ] }, "bassmaster": { "vulnerabilities": [ { "below": "1.5.2", "severity": "medium", "identifiers": { "CVE" : [ "CVE-2014-7205" ], "summary": "bassmaster_arbitrary-javascript-execution" }, "info": [ "https://nodesecurity.io/advisories/1" ] } ] }, "send" : { "vulnerabilities" : [ { "below" : "0.8.4", "severity": "medium", "identifiers": { "CVE": ["CVE-2014-6394"], "advisory": "send-directory-traversal" }, "info" : [ "https://nodesecurity.io/advisories/32" ] }, { "below" : "0.11.1", "severity": "medium", "identifiers": { "summary": "discloses root path" }, "info" : [ "https://nodesecurity.io/advisories/56", "https://github.com/pillarjs/send/pull/70", "https://github.com/expressjs/serve-static/blob/master/HISTORY.md#181--2015-01-20" ] } ] }, "yar" : { "vulnerabilities" : [ { "below" : "2.2.0", "severity": "medium", "identifiers": { "CVE": ["CVE-2014-4179"], "advisory": "yar-DoS" }, "info": [ "https://nodesecurity.io/advisories/44" ] } ] }, "codem-transcode": { "vulnerabilities": [ { "below": "0.5.0", "severity": "medium", "identifiers": { "CVE": ["CVE-2013-7377"], "summary": "codem-transcode_potential-command-injection" }, "info": [ "https://nodesecurity.io/advisories/2" ] } ] }, "ep_imageconvert" : { "vulnerabilities" : [ { "below" : "0.0.3", "severity": "high", "identifiers": { "CVE": ["CVE-2013-3364"], "advisory": "ep_imageconvert_command_injection" }, "info" : [ "https://nodesecurity.io/advisories/7" ] } ] }, "sanitize-html": { "vulnerabilities" : [ { "below" : "1.4.3", "severity": "medium", "identifiers": { "summary": "Sanitization not applied recursively" }, "info" : [ "https://github.com/punkave/sanitize-html/issues/29", "https://nodesecurity.io/advisories/135" ] }, { "below": "1.2.3", "atOrAbove": "1.2.2", "severity": "medium", "identifiers": { "summary": "sanitize-html_cross-site-scripting" }, "info": [ "https://nodesecurity.io/advisories/155" ] }, { "below": "1.11.4", "atOrAbove": "1.11.1", "severity": "medium", "identifiers": { "summary": "sanitize-html_cross-site-scripting" }, "info": [ "https://nodesecurity.io/advisories/154" ] } ] }, "sequelize-restful": { "vulnerabilities" : [ { "below" : "0.3.1", "info" : [ "https://github.com/sequelize/sequelize-restful/issues/16" ] } ] }, "sequelize" : { "vulnerabilities" : [ { "below" : "2.0.0-rc8", "severity" : "medium", "identifiers" : { "CVE":[ "CVE-2015-1369" ] }, "info" : [ "https://nodesecurity.io/advisories/33", "https://github.com/sequelize/sequelize/issues/2906" ] }, { "below": "3.23.6", "severity" : "high", "identifiers": { "advisory": "SQL Injection via GeoJSON" }, "info": [ "https://nodesecurity.io/advisories/122" ] }, { "below": "3.17.0", "severity" : "medium", "identifiers": { "advisory": "SQL injection" }, "info": [ "https://nodesecurity.io/advisories/112" ] }, { "below": "3.0.0", "severity" : "medium", "identifiers": { "advisory": "Potential SQL Injection" }, "info": [ "https://nodesecurity.io/advisories/109" ] }, { "below": "1.7.0-alpha3", "severity" : "medium", "identifiers": { "advisory": "SQL injection" }, "info": [ "https://nodesecurity.io/advisories/113" ] }, { "below": "3.20.0", "severity" : "medium", "identifiers": { "advisory": "Improper Escaping of Bound Arrays" }, "info": [ "https://nodesecurity.io/advisories/102" ] } ] }, "paypal-ipn": { "vulnerabilities" : [ { "below" : "3.0.0", "severity": "medium", "identifiers": {"advisory": "paypal-ipn-validation-bypass"}, "info" : [ "http://nodesecurity.io/advisories/paypal-ipn-validation-bypass" ] } ] }, "fancy-server": { "vulnerabilities" : [ { "below" : "0.1.4", "severity": "medium", "identifiers": {"advisory": "fancy-server-directory-traversal"}, "info" : [ "http://nodesecurity.io/advisories/fancy-server-directory-traversal" ] } ] }, "nhouston": { "vulnerabilities" : [ { "below":"100.0.0", "atOrAbove" : "0.0.0", "severity": "medium", "identifiers": { "CVE": ["CVE-2014-8883"], "advisory": "nhouston-directory-traversal" }, "info" : [ "http://nodesecurity.io/advisories/nhouston-directory-traversal" ] } ] }, "bleach": { "vulnerabilities" : [ { "below" : "100", "severity": "medium", "identifiers": { "CVE": ["CVE-2014-8881"] , "summary" : "Regular expression denial of service - no fix available" }, "info" : [ "https://nodesecurity.io/advisories/47" ] } ] }, "vue" : { "vulnerabilities" : [ { "below" : "2.5.17", "severity" : "medium", "identifiers" : { "summary" : "potential xss in ssr when using v-bind" }, "info" : [ "https://github.com/vuejs/vue/releases/tag/v2.5.17" ] }, { "below" : "2.4.3", "severity" : "medium", "identifiers" : { "summary" : "possible xss vector " }, "info" : [ "https://github.com/vuejs/vue/releases/tag/v2.4.3" ] } ] }, "react-dom": { "vulnerabilities" : [ { "atOrAbove" : "16.0.0", "below" : "16.0.1", "severity": "high", "identifiers": { "CVE": ["CVE-2018-6341"], "summary" : "RCE affecting some server-rendered React apps" }, "info" : [ "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ] }, { "atOrAbove" : "16.1.0", "below" : "16.1.2", "severity": "high", "identifiers": { "CVE": ["CVE-2018-6341"], "summary" : "RCE affecting some server-rendered React apps" }, "info" : [ "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ] }, { "atOrAbove" : "16.2.0", "below" : "16.2.1", "severity": "high", "identifiers": { "CVE": ["CVE-2018-6341"], "summary" : "RCE affecting some server-rendered React apps" }, "info" : [ "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ] }, { "atOrAbove" : "16.3.0", "below" : "16.3.3", "severity": "high", "identifiers": { "CVE": ["CVE-2018-6341"], "summary" : "RCE affecting some server-rendered React apps" }, "info" : [ "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ] }, { "atOrAbove" : "16.4.0", "below" : "16.4.2", "severity": "high", "identifiers": { "CVE": ["CVE-2018-6341"], "summary" : "RCE affecting some server-rendered React apps" }, "info" : [ "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ] } ] }, "mqtt-packet": { "vulnerabilities" : [ { "below" : "3.4.6", "severity": "high", "identifiers": { "summary" : "Denial of service" }, "info" : [ "https://nodesecurity.io/advisories/75" ] }, { "atOrAbove" : "4.0.0", "below" : "4.0.5", "severity": "high", "identifiers": { "summary" : "Denial of service" }, "info" : [ "https://nodesecurity.io/advisories/75" ] } ] }, "is-my-json-valid": { "vulnerabilities" : [ { "below" : "2.12.4", "severity": "medium", "identifiers": { "summary" : "Regex denial of service" }, "info" : [ "https://nodesecurity.io/advisories/76" ] } ] }, "i18n-node-angular": { "vulnerabilities" : [ { "below" : "1.4.0", "severity": "high", "identifiers": { "summary" : "Denial of Service and Content Injection" }, "info" : [ "https://nodesecurity.io/advisories/80" ] } ] }, "hapi-auth-jwt2": { "vulnerabilities" : [ { "atOrAbove" : "5.1.1", "below" : "5.1.2", "severity": "high", "identifiers": { "summary" : "Authentication Bypass" }, "info" : [ "https://nodesecurity.io/advisories/81", "https://github.com/dwyl/hapi-auth-jwt2/issues/111", "https://github.com/dwyl/hapi-auth-jwt2/pull/112" ] } ] }, "moment": { "vulnerabilities" : [ { "below" : "2.11.2", "severity": "medium", "identifiers": { "summary" : "Regular Expression Denial of Service (ReDoS)", "CVE" : [ "CVE-2016-4055" ] }, "info" : [ "https://nodesecurity.io/advisories/55", "https://security.snyk.io/vuln/npm:moment:20160126", "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4055" ] }, { "below" : "2.15.2", "severity": "medium", "identifiers": { "summary" : "Regular Expression Denial of Service (ReDoS)" }, "info" : [ "https://security.snyk.io/vuln/npm:moment:20161019" ] }, { "below" : "2.19.3", "severity": "low", "identifiers": { "summary" : "Regular Expression Denial of Service (ReDoS)", "CVE" : [ "CVE-2017-18214" ] }, "info" : [ "https://security.snyk.io/vuln/npm:moment:20170905", "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18214", "https://github.com/moment/moment/issues/4163" ] } ] }, "hawk": { "vulnerabilities" : [ { "below" : "3.1.3", "severity": "medium", "identifiers": { "summary" : "Regex denial of service" }, "info" : [ "https://nodesecurity.io/advisories/77" ] }, { "atOrAbove" : "4.0.0", "below" : "4.1.1", "severity": "medium", "identifiers": { "summary" : "Regex denial of service" }, "info" : [ "https://nodesecurity.io/advisories/77" ] } ] }, "mapbox.js": { "vulnerabilities" : [ { "below" : "1.6.5", "severity": "medium", "identifiers": { "summary" : "XSS" }, "info" : [ "https://nodesecurity.io/advisories/49" ] }, { "atOrAbove" : "2.0.0", "below" : "2.1.7", "severity": "medium", "identifiers": { "summary" : "XSS" }, "info" : [ "https://nodesecurity.io/advisories/49" ] }, { "below" : "1.6.6", "severity": "medium", "identifiers": { "summary" : "XSS" }, "info" : [ "https://nodesecurity.io/advisories/74" ] }, { "atOrAbove" : "2.0.0", "below" : "2.2.4", "severity": "medium", "identifiers": { "summary" : "XSS" }, "info" : [ "https://nodesecurity.io/advisories/74" ] } ] }, "secure-compare": { "vulnerabilities" : [ { "atOrAbove" : "3.0.0", "below" : "3.0.1", "severity": "medium", "identifiers": { "summary": "do not actually compare two strings properly" }, "info" : [ "https://nodesecurity.io/advisories/50", "https://github.com/vdemedes/secure-compare/pull/1" ] } ] }, "semver": { "vulnerabilities" : [ { "below" : "4.3.2", "severity": "medium", "identifiers": { "advisory": "semver_dos", "summary": "semver_regular-expression-denial-of-service" }, "info" : [ "http://nodesecurity.io/advisories/31" ] } ] }, "serve-static": { "vulnerabilities" : [ { "below" : "1.6.5", "severity": "medium", "identifiers": {"advisory": "serve-static-open-redirect", "CVE":["CVE-2015-1164"]}, "info" : [ "http://nodesecurity.io/advisories/serve-static-open-redirect" ] }, { "below" : "1.7.2", "atOrAbove" : "1.7.0", "severity": "medium", "identifiers": {"advisory": "serve-static-open-redirect", "CVE":["CVE-2015-1164"]}, "info" : [ "http://nodesecurity.io/advisories/serve-static-open-redirect" ] } ] }, "serve-index": { "vulnerabilities" : [ { "below" : "1.6.3", "severity": "medium", "identifiers": { "advisory": "serve-static-xss", "summary": "serve-index_cross-site-scripting" }, "info" : [ "http://nodesecurity.io/advisories/serve-static-xss" ] } ] }, "inert": { "vulnerabilities" : [ { "below" : "1.1.1", "severity": "medium", "identifiers": { "advisory": "inert_hidden_directories_always_served", "summary": "inert_hidden-directories-always-served" }, "info" : [ "http://nodesecurity.io/advisories/inert_hidden_directories_always_served" ] } ] }, "electron": { "vulnerabilities" : [ { "below" : "1.6.16", "severity": "high", "identifiers": { "advisory": "Update electron to a version that is not vulnerable.", "CVE" : ["CVE-2018-1000006"] }, "info" : [ "https://nodesecurity.io/advisories/563" ] }, { "atOrAbove" : "1.7.0", "below" : "1.7.11", "severity": "high", "identifiers": { "advisory": "Update electron to a version that is not vulnerable.", "CVE" : ["CVE-2018-1000006"] }, "info" : [ "https://nodesecurity.io/advisories/563" ] }, { "atOrAbove" : "1.8.0", "below" : "1.8.2-beta.4", "severity": "high", "identifiers": { "advisory": "Update electron to a version that is not vulnerable.", "CVE" : ["CVE-2018-1000006"] }, "info" : [ "https://nodesecurity.io/advisories/563" ] }, { "below" : "1.6.14", "severity": "high", "identifiers": { "summary": "Remote code execution" }, "info" : [ "https://nodesecurity.io/advisories/539" ] }, { "atOrAbove" : "1.7.0", "below" : "1.7.8", "severity": "high", "identifiers": { "summary": "Remote code execution" }, "info" : [ "https://nodesecurity.io/advisories/539" ] }, { "below" : "1.7.13", "severity": "medium", "identifiers": { "summary": "Remote code execution", "CVE" : ["CVE-2018-1000136"] }, "info" : [ "https://nodesecurity.io/advisories/574" ] }, { "atOrAbove" : "1.8.4", "below" : "1.8.0", "severity": "medium", "identifiers": { "summary": "Remote code execution", "CVE" : ["CVE-2018-1000136"] }, "info" : [ "https://nodesecurity.io/advisories/574" ] }, { "atOrAbove" : "2.0.0-beta.5", "below" : "2.0.0-beta.1", "severity": "medium", "identifiers": { "summary": "Remote code execution", "CVE" : ["CVE-2018-1000136"] }, "info" : [ "https://nodesecurity.io/advisories/574" ] } ] }, "electron-packager": { "vulnerabilities" : [ { "atOrAbove" : "5.1.2", "below" : "7.0.0", "severity": "low", "identifiers": {"advisory": "SSL Validation Defaults to False"}, "info" : [ "https://nodesecurity.io/advisories/104" ] } ] }, "csrf-lite": { "vulnerabilities" : [ { "atOrAbove":"0.1.1", "below" : "0.1.2", "severity": "medium", "identifiers": {"advisory": "Non-Constant Time String Comparison"}, "info" : [ "https://nodesecurity.io/advisories/94" ] } ] }, "engine.io-client": { "vulnerabilities" : [ { "atOrAbove":"1.6.8", "below" : "1.6.9", "severity": "high", "identifiers": {"advisory": "Insecure Defaults Allow MITM Over TLS"}, "info" : [ "https://nodesecurity.io/advisories/99" ] } ] }, "cli": { "vulnerabilities" : [ { "below" : "1.0.0", "severity": "low", "identifiers": {"advisory": "Arbitrary File Write"}, "info" : [ "https://nodesecurity.io/advisories/95" ] } ] }, "negotiator": { "vulnerabilities" : [ { "atOrAbove":"0.6.0", "below" : "0.6.1", "severity": "high", "identifiers": {"advisory": "Regular Expression Denial of Service"}, "info" : [ "https://nodesecurity.io/advisories/106" ] } ] }, "minimatch": { "vulnerabilities" : [ { "atOrAbove":"3.0.1", "below" : "3.0.2", "severity": "high", "identifiers": {"advisory": "Regular Expression Denial of Service"}, "info" : [ "https://nodesecurity.io/advisories/118" ] } ] }, "sails": { "vulnerabilities": [ { "below": "0.12.8", "severity" : "high", "identifiers": { "advisory": "Broken CORS" }, "info": [ "https://nodesecurity.io/advisories/148" ] } ] }, "reduce-css-calc": { "vulnerabilities": [ { "below": "1.2.5", "severity" : "high", "identifiers": { "advisory": "Arbitrary Code Injection" }, "info": [ "https://nodesecurity.io/advisories/144" ] } ] }, "nunjucks": { "vulnerabilities": [ { "below": "2.4.3", "severity" : "medium", "identifiers": { "advisory": "XSS in autoescape mode" }, "info": [ "https://nodesecurity.io/advisories/147" ] } ] }, "pouchdb": { "vulnerabilities": [ { "below": "6.0.5", "severity" : "high", "identifiers": { "advisory": "Arbitrary Code Injection" }, "info": [ "https://nodesecurity.io/advisories/143" ] } ] }, "plotly.js": { "vulnerabilities": [ { "atOrAbove": "1.10.4", "below": "1.16.0", "severity" : "medium", "identifiers": { "advisory": "Cross Site Scripting (XSS)" }, "info": [ "https://nodesecurity.io/advisories/145" ] } ] }, "uws": { "vulnerabilities": [ { "atOrAbove": "0.10.0", "below": "0.10.9", "severity" : "high", "identifiers": { "advisory": "Denial of Service" }, "info": [ "https://nodesecurity.io/advisories/149" ] } ] }, "cookie-signature": { "vulnerabilities": [ { "below": "1.0.6", "severity" : "medium", "identifiers": { "advisory": "Timing attack vulnerability" }, "info": [ "https://nodesecurity.io/advisories/134" ] } ] }, "mqtt": { "vulnerabilities": [ { "below": "1.0.0", "severity" : "high", "identifiers": { "advisory": "Denial of Service" }, "info": [ "https://nodesecurity.io/advisories/140" ] } ] }, "pivottable": { "vulnerabilities": [ { "atOrAbove": "1.4.0", "below": "2.0.0", "severity" : "high", "identifiers": { "advisory": "XSS" }, "info": [ "https://nodesecurity.io/advisories/139" ] } ] }, "c3": { "vulnerabilities": [ { "below": "0.4.11", "severity" : "medium", "identifiers": { "advisory": "XSS via tooltips" }, "info": [ "https://nodesecurity.io/advisories/138" ] } ] }, "swagger-ui": { "vulnerabilities": [ { "atOrAbove": "2.1.4", "below": "2.1.5", "severity" : "high", "identifiers": { "advisory": "XSS via Content-type header" }, "info": [ "https://nodesecurity.io/advisories/131" ] }, { "atOrAbove": "2.1.4", "below": "2.1.5", "severity" : "high", "identifiers": { "advisory": "XSS in Consumes/Produces Parameter" }, "info": [ "https://nodesecurity.io/advisories/123" ] }, { "below": "2.2.1", "severity": "high", "identifiers": { "summary": "swagger-ui_xss-in-key-names" }, "info": [ "https://nodesecurity.io/advisories/126" ] }, { "below": "2.1.0-M3", "atOrAbove": "2.1.0-M1", "severity": "high", "identifiers": { "summary": "swagger-ui_xss-in-url-query-string-parameter" }, "info": [ "https://nodesecurity.io/advisories/137" ] } ] }, "node-krb5": { "vulnerabilities": [ { "below":"100.0.0", "atOrAbove": "0.0.0", "severity" : "medium", "identifiers": { "advisory": "Spoofing attack due to unvalidated KDC" }, "info": [ "https://nodesecurity.io/advisories/136" ] } ] }, "ezseed-transmission": { "vulnerabilities": [ { "atOrAbove": "0.0.10", "below": "0.0.15", "severity" : "medium", "identifiers": { "advisory": "Insecure Defaults Leads to Potential MITM" }, "info": [ "https://nodesecurity.io/advisories/114" ] } ] }, "jws": { "vulnerabilities": [ { "below": "3.0.0", "severity" : "high", "identifiers": { "advisory": "Forgeable Public/Private Tokens" }, "info": [ "https://nodesecurity.io/advisories/88" ] } ] }, "fuelux": { "vulnerabilities": [ { "below":"3.15.7", "atOrAbove": "0.0.0", "severity" : "high", "identifiers": { "advisory": "XSS in Pillbox" }, "info": [ "https://nodesecurity.io/advisories/133" ] } ] }, "jqtree": { "vulnerabilities": [ { "below": "1.3.4", "severity" : "high", "identifiers": { "advisory": "XSS in drag and drop node" }, "info": [ "https://nodesecurity.io/advisories/132" ] } ] }, "emojione": { "vulnerabilities": [ { "below": "1.3.1", "severity" : "high", "identifiers": { "advisory": "XSS in primary functions" }, "info": [ "https://nodesecurity.io/advisories/129" ] } ] }, "rendr": { "vulnerabilities": [ { "below": "1.1.4", "severity" : "high", "identifiers": { "advisory": "XSS in client rendered block templates" }, "info": [ "https://nodesecurity.io/advisories/128" ] } ] }, "tough-cookie": { "vulnerabilities": [ { "atOrAbove": "0.9.7", "below": "2.3.0", "severity" : "high", "identifiers": { "advisory": "ReDoS via long string of semicolons" }, "info": [ "https://nodesecurity.io/advisories/130" ] } ] }, "jquery-ui": { "vulnerabilities": [ { "below": "1.12.0", "severity" : "high", "identifiers": { "advisory": "XSS in dialog closeText" }, "info": [ "https://nodesecurity.io/advisories/127" ] } ] }, "gmail-js": { "vulnerabilities": [ { "below":"100.0.0", "atOrAbove": "0.0.0", "severity" : "high", "identifiers": { "advisory": "DOM-based XSS" }, "info": [ "https://nodesecurity.io/advisories/125" ] } ] }, "bootstrap-select": { "vulnerabilities": [ { "below":"1.13.6", "severity" : "high", "identifiers": { "advisory": "XSS via title and data-content" }, "info": [ "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-1014662", "https://github.com/snapappointments/bootstrap-select/issues/2199#issuecomment-701806876" ] }, { "below":"1.13.6", "severity" : "high", "identifiers": { "advisory": "XSS via the use of the data-subtext attribute, in cases where that content originates from a user-controlled input" }, "info": [ "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-173741", "https://github.com/snapappointments/bootstrap-select/commit/39c0078775a344078e308813ec838b23394a6764", "https://github.com/snapappointments/bootstrap-select/issues/2199" ] }, { "below":"1.13.6", "severity" : "medium", "identifiers": { "advisory": "XSS: the package does not escape title values on