Permalink
Cannot retrieve contributors at this time
| { | |
| "retire-example": { | |
| "vulnerabilities" : [ | |
| { "atOrAbove": "0.0.1", "below" : "0.0.2", "info" : [ "http://github.com/eoftedal/retire.js/" ] } | |
| ] | |
| }, | |
| "angular" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.8.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one.", | |
| "CVE": [ "CVE-2020-7676" ] | |
| }, | |
| "info" : [ "https://nvd.nist.gov/vuln/detail/CVE-2020-7676" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.5.0", | |
| "below" : "1.6.9", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "XSS through SVG if enableSvg is set" | |
| }, | |
| "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md#169-fiery-basilisk-2018-02-02", "https://vulnerabledoma.in/ngSanitize1.6.8_bypass.html" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.3.0", | |
| "below" : "1.5.0-rc2", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "The attribute usemap can be used as a security exploit" | |
| }, | |
| "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md#1230-patronal-resurrection-2016-07-21" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.0.0", | |
| "below" : "1.2.30", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "The attribute usemap can be used as a security exploit" | |
| }, | |
| "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md#1230-patronal-resurrection-2016-07-21" ] | |
| }, | |
| { | |
| "below" : "1.6.3", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Universal CSP bypass via add-on in Firefox" | |
| }, | |
| "info" : [ "https://github.com/mozilla/addons-linter/issues/1000#issuecomment-282083435", "http://pastebin.com/raw/kGrdaypP" ] | |
| }, | |
| { | |
| "below" : "1.6.3", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "DOS in $sanitize" | |
| }, | |
| "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md" ] | |
| }, | |
| { | |
| "below" : "1.6.5", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "XSS in $sanitize in Safari/Firefox" | |
| }, | |
| "info" : [ "https://github.com/angular/angular.js/commit/8f31f1ff43b673a24f84422d5c13d6312b2c4d94" ] | |
| } | |
| ] | |
| }, | |
| "hubot-scripts": { | |
| "vulnerabilities" : [ | |
| { "below" : "2.4.4", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/13" ] } | |
| ] | |
| }, | |
| "connect": { | |
| "vulnerabilities" : [ | |
| { "below" : "2.8.1", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/3" ] } | |
| ] | |
| }, | |
| "libnotify": { | |
| "vulnerabilities" : [ | |
| { "below" : "1.0.4", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/20" ] } | |
| ] | |
| }, | |
| "tomato": { | |
| "vulnerabilities" : [ | |
| { "below" : "0.0.6", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/38" ] } | |
| ] | |
| }, | |
| "uglify-js" : { | |
| "vulnerabilities" : [ | |
| { "below" : "2.4.24", "severity": "high", "info" : [ "https://github.com/mishoo/UglifyJS2/issues/751", "https://github.com/tmcw/mdast-uglify-bug", "https://nodesecurity.io/advisories/39" ] }, | |
| { "below" : "2.6.0", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/48" ] } | |
| ] | |
| }, | |
| "ansi2html" : { | |
| "vulnerabilities" : [ | |
| { "below" : "100", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/51" ] } | |
| ] | |
| }, | |
| "milliseconds" : { | |
| "vulnerabilities" : [ | |
| { "below" : "0.1.2", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/59" ] } | |
| ] | |
| }, | |
| "keystone" : { | |
| "vulnerabilities" : [ | |
| { "below" : "0.3.16", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/60" ] } | |
| ] | |
| }, | |
| "ecstatic" : { | |
| "vulnerabilities" : [ | |
| { "below" : "1.4.0", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/64" ] } | |
| ] | |
| }, | |
| "grunt-gh-pages" : { | |
| "vulnerabilities" : [ | |
| { "below" : "0.10.0", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/85" ] } | |
| ] | |
| }, | |
| "riot-compiler" : { | |
| "vulnerabilities" : [ | |
| { "below" : "2.3.22", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/86" ] } | |
| ] | |
| }, | |
| "node-uuid" : { | |
| "vulnerabilities" : [ | |
| { "below" : "1.4.4", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/93" ] } | |
| ] | |
| }, | |
| "restafary" : { | |
| "vulnerabilities" : [ | |
| { "below" : "1.6.1", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/89" ] } | |
| ] | |
| }, | |
| "droppy" : { | |
| "vulnerabilities" : [ | |
| { "below" : "3.5.0", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/91" ] } | |
| ] | |
| }, | |
| "airbrake" : { | |
| "vulnerabilities" : [ | |
| { "below" : "0.4.0", | |
| "severity" : "medium", | |
| "info" : [ "https://nodesecurity.io/advisories/96" ] | |
| } | |
| ] | |
| }, | |
| "jsrender" : { | |
| "vulnerabilities" : [ | |
| { "below" : "0.9.74", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/97" ] } | |
| ] | |
| }, | |
| "npm" : { | |
| "vulnerabilities" : [ | |
| { "below" : "3.8.2", "atOrAbove": "3.0.0", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/98" ] }, | |
| { "below" : "2.15.1", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/98" ] }, | |
| { | |
| "below": "1.3.3", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "npm_predictable-temp-filenames-allow-overwrite-of-arbitrary-files" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/152" | |
| ] | |
| } | |
| ] | |
| }, | |
| "console-io" : { | |
| "vulnerabilities" : [ | |
| { "below" : "2.7.0", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/90" ] } | |
| ] | |
| }, | |
| "express-restify-mongoose" : { | |
| "vulnerabilities" : [ | |
| { "below" : "2.5.0", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/92" ] }, | |
| { "below" : "3.1.0", "severity" : "high", "atOrAbove":"3.0.0", "info" : [ "https://nodesecurity.io/advisories/92" ] } | |
| ] | |
| }, | |
| "mysql" : { | |
| "vulnerabilities" : [ | |
| { "below" : "2.0.0-alpha8", "severity" : "medium", "identifiers": { "summary" : "SQL Injection due to unescaped object keys" } , "info" : [ "https://nodesecurity.io/advisories/66" ] } | |
| ] | |
| }, | |
| "bittorrent-dht" : { | |
| "vulnerabilities" : [ | |
| { "below" : "5.1.3", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/68" ] } | |
| ] | |
| }, | |
| "jadedown" : { | |
| "vulnerabilities" : [ | |
| { "below" : "100", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/52" ] } | |
| ] | |
| }, | |
| "jshamcrest" : { | |
| "vulnerabilities" : [ | |
| { "below" : "100", "severity" : "high", "info" : [ "https://nodesecurity.io/advisories/53" ] } | |
| ] | |
| }, | |
| "ws" : { | |
| "vulnerabilities" : [ | |
| { "below" : "1.0.1", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/67" ] }, | |
| { | |
| "below": "1.1.1", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "DoS due to excessively large websocket message" }, | |
| "info": [ "https://nodesecurity.io/advisories/120" ] | |
| } | |
| ] | |
| }, | |
| "gm" : { | |
| "vulnerabilities" : [ | |
| { "below" : "1.21.1", "severity" : "medium", "info" : [ "https://nodesecurity.io/advisories/54", "https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31" ] } | |
| ] | |
| }, | |
| "datatables": { | |
| "vulnerabilities": [ | |
| { | |
| "below" : "1.10.9", | |
| "severity" : "medium", | |
| "info": [ "https://nodesecurity.io/advisories/5" ] | |
| } | |
| ] | |
| }, | |
| "geddy": { | |
| "vulnerabilities": [ | |
| { | |
| "below" : "13.0.8", | |
| "severity" : "medium", | |
| "info": [ "https://nodesecurity.io/advisories/10" ] | |
| } | |
| ] | |
| }, | |
| "jquery-ujs": { | |
| "vulnerabilities": [ | |
| { | |
| "below" : "1.0.4", | |
| "severity" : "medium", | |
| "info": [ "https://nodesecurity.io/advisories/15" ] | |
| } | |
| ] | |
| }, | |
| "ldapauth-fork": { | |
| "vulnerabilities": [ | |
| { | |
| "below" : "2.3.3", | |
| "severity" : "medium", | |
| "info": [ "https://nodesecurity.io/advisories/18" ] | |
| } | |
| ] | |
| }, | |
| "ldapauth": { | |
| "vulnerabilities": [ | |
| { | |
| "below" : "2.2.5", | |
| "severity" : "medium", | |
| "info": [ "https://nodesecurity.io/advisories/19" ] | |
| } | |
| ] | |
| }, | |
| "ungit": { | |
| "vulnerabilities": [ | |
| { | |
| "below" : "0.9.0", | |
| "severity" : "medium", | |
| "info": [ "https://nodesecurity.io/advisories/40" ] | |
| } | |
| ] | |
| }, | |
| "handlebars" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.0.0.beta.3", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "poorly sanitized input passed to eval()" | |
| }, | |
| "info" : [ "https://github.com/wycats/handlebars.js/pull/68" ] | |
| }, | |
| { | |
| "below" : "4.0.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Quoteless Attributes in Templates can lead to Content Injection" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/61" ] | |
| }, | |
| { | |
| "atOrAbove" : "4.0.0", | |
| "below" : "4.0.13", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "A prototype pollution vulnerability in handlebars may lead to remote code execution if an attacker can control the template" | |
| }, | |
| "info" : [ | |
| "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692", | |
| "https://github.com/wycats/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86" | |
| ] | |
| }, | |
| { | |
| "atOrAbove" : "4.0.0", | |
| "below" : "4.0.14", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "A prototype pollution vulnerability in handlebars may lead to remote code execution if an attacker can control the template" | |
| }, | |
| "info" : [ | |
| "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-174183", | |
| "https://github.com/wycats/handlebars.js/issues/1495", | |
| "https://github.com/wycats/handlebars.js/commit/cd38583216dce3252831916323202749431c773e" | |
| ] | |
| }, | |
| { | |
| "atOrAbove" : "4.1.0", | |
| "below" : "4.1.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "A prototype pollution vulnerability in handlebars may lead to remote code execution if an attacker can control the template" | |
| }, | |
| "info" : [ | |
| "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-174183", | |
| "https://github.com/wycats/handlebars.js/issues/1495", | |
| "https://github.com/wycats/handlebars.js/commit/cd38583216dce3252831916323202749431c773e" | |
| ] | |
| } | |
| ] | |
| }, | |
| "marked": { | |
| "vulnerabilities" : [ | |
| { | |
| "below": "0.3.6", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "marked_content-injection" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/101" | |
| ] | |
| }, | |
| { | |
| "below" : "0.3.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE": ["CVE-2014-1850", "CVE-2014-3743"], | |
| "advisory": "marked_multiple_content_injection_vulnerabilities" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/22" ] | |
| }, | |
| { | |
| "below" : "0.3.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "advisory": "marked_redos" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/23" ] | |
| }, | |
| { | |
| "below" : "0.3.3", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE": ["CVE-2015-1370"], | |
| "advisory": "marked_vbscript_injection" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/24" ] | |
| }, | |
| { | |
| "below" : "0.3.6", | |
| "severity": "medium", | |
| "identifiers": { | |
| "advisory": "Cross-Site Scripting (XSS) Due To Sanitization Bypass Using HTML Entities" | |
| }, | |
| "info" : [ "https://srcclr.com/security/cross-site-scripting-xss-due-to/javascript/s-2309", "https://github.com/markedjs/marked/pull/592" ] | |
| } | |
| ] | |
| }, | |
| "js-yaml": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "2.0.5", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE": ["CVE-2013-4660"], | |
| "advisory": "JS-YAML_Deserialization_Code_Execution" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/16" ] | |
| } | |
| ] | |
| }, | |
| "st": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "0.2.5", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE": ["CVE-2014-3744"], | |
| "advisory": "st_directory_traversal" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/36" ] | |
| } | |
| ] | |
| }, | |
| "hapi": { | |
| "vulnerabilities" : [ | |
| { | |
| "below": "16.1.1", | |
| "atOrAbove": "15.0.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "hapi_denial-of-service-via-malformed-accept-encoding-header" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/335" | |
| ] | |
| }, | |
| { | |
| "atOrAbove" : "2.0", | |
| "below" : "2.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE": ["CVE-2014-3742"], | |
| "advisory": "hapi_File_descriptor_leak_DoS_vulnerability" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/11", "https://github.com/spumko/hapi/issues/1427" ] | |
| }, | |
| { | |
| "below" : "6.1.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE": ["CVE-2014-4671"], | |
| "advisory": "hapijs-jsonp-CVE-2014-4671A" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/12" ] | |
| }, | |
| { | |
| "below" : "11.0.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary" : "Could allow forbidden CORS headers" | |
| }, | |
| "info" : [ | |
| "https://nodesecurity.io/advisories/45", | |
| "https://github.com/hapijs/hapi/issues/2850", | |
| "https://github.com/hapijs/hapi/issues/2840" | |
| ] | |
| }, | |
| { | |
| "below" : "11.1.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary" : "Denial of service - Potential socket exhaustion" | |
| }, | |
| "info" : [ | |
| "https://nodesecurity.io/advisories/63", | |
| "https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580", | |
| "https://github.com/jfhbrook/node-ecstatic/pull/179" | |
| ] | |
| }, | |
| { | |
| "below" : "11.1.4", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary" : "Route level CORS config overrides connection level defaults" | |
| }, | |
| "info" : [ | |
| "https://nodesecurity.io/advisories/65" | |
| ] | |
| } | |
| ] | |
| }, | |
| "printer" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "0.0.2", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE": ["CVE-2014-3741"], | |
| "advisory": "printer_potential_command_injection" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/27" ] | |
| } | |
| ] | |
| }, | |
| "ms" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "0.7.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Regular expression denial of service" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/46" ] } | |
| ] | |
| }, | |
| "handlebars-runtime" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.0.0.beta.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "poorly sanitized input passed to eval()" | |
| }, | |
| "info" : [ "https://github.com/wycats/handlebars.js/pull/68" ] } | |
| ] | |
| }, | |
| "ember" : { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove" : "1.3.0-*", | |
| "below" : "1.3.2", | |
| "severity": "high", | |
| "identifiers": {"CVE": ["CVE-2014-0046"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.2.0-*", | |
| "below" : "1.2.2", | |
| "severity": "high", | |
| "identifiers": {"CVE": ["CVE-2014-0046"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.4.0-*", | |
| "below" : "1.4.0-beta.2", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.3.0-*", | |
| "below" : "1.3.1", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.2.0-*", | |
| "below" : "1.2.1", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.1.0-*", | |
| "below" : "1.1.3", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.0.0-*", | |
| "below" : "1.0.1", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.0.0-rc.1", | |
| "below" : "1.0.0-rc.1.1", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2013-4170"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.0.0-rc.2", | |
| "below" : "1.0.0-rc.2.1", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2013-4170"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.0.0-rc.3", | |
| "below" : "1.0.0-rc.3.1", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2013-4170"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.0.0-rc.4", | |
| "below" : "1.0.0-rc.4.1", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2013-4170"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.0.0-rc.5", | |
| "below" : "1.0.0-rc.5.1", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2013-4170"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.0.0-rc.6", | |
| "below" : "1.0.0-rc.6.1", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2013-4170"]}, | |
| "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ] | |
| }, | |
| { "below" : "0.9.7.1", "info" : [ "https://github.com/emberjs/ember.js/blob/master/CHANGELOG" ] }, | |
| { | |
| "below" : "0.9.7", | |
| "severity": "medium", | |
| "identifiers": { | |
| "bug": "699", | |
| "summary": "Bound attributes aren't escaped properly" | |
| }, | |
| "info" : [ "https://github.com/emberjs/ember.js/issues/699" ] | |
| } | |
| ] | |
| }, | |
| "eslint-utils": { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove" : "1.2.0", | |
| "below" : "1.4.1", | |
| "severity" : "high", | |
| "identifiers" : { | |
| "summary" : "Arbitrary Code Execution" | |
| }, | |
| "info" : ["https://www.npmjs.com/advisories/1118"] | |
| } | |
| ] | |
| }, | |
| "event-stream" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below":"3.3.7", | |
| "atOrAbove" : "3.3.6", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Project compromised, malicious version published" | |
| }, | |
| "info" : [ "https://github.com/indexzero/ps-tree/pull/34" ] } | |
| ] | |
| }, | |
| "dojo" : { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove" : "0.4", | |
| "below" : "0.4.4", | |
| "severity": "high", | |
| "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272"]}, | |
| "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2272/" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.0", | |
| "below" : "1.0.3", | |
| "severity": "high", | |
| "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272", "CVE-2010-2273"]}, | |
| "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.1", | |
| "below" : "1.1.2", | |
| "severity": "high", | |
| "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272", "CVE-2010-2273"]}, | |
| "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.2", | |
| "below" : "1.2.4", | |
| "severity": "high", | |
| "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272", "CVE-2010-2273"]}, | |
| "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.3", | |
| "below" : "1.3.3", | |
| "severity": "high", | |
| "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272", "CVE-2010-2273"]}, | |
| "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.4", | |
| "below" : "1.4.2", | |
| "severity": "high", | |
| "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272", "CVE-2010-2273"]}, | |
| "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ] | |
| }, | |
| { | |
| "below" : "1.4.2", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2010-2275"]}, | |
| "info" : [ "http://www.cvedetails.com/cve/CVE-2010-2275/"] | |
| }, | |
| { | |
| "below" : "1.1", | |
| "severity": "medium", | |
| "identifiers": {"CVE": ["CVE-2008-6681"]}, | |
| "info" : [ "http://www.cvedetails.com/cve/CVE-2008-6681/"] | |
| }, | |
| { | |
| "below": "1.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "dojo_cross-site-scripting" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/107" | |
| ] | |
| }, | |
| { | |
| "below" : "1.14", | |
| "severity": "medium", | |
| "identifiers": { "CVE": ["CVE-2018-15494"] }, | |
| "info" : [ "https://dojotoolkit.org/blog/dojo-1-14-released" ] | |
| } | |
| ] | |
| }, | |
| "mustache" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "0.3.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "bug": "112", | |
| "summary": "execution of arbitrary javascript" | |
| }, | |
| "info" : [ "https://github.com/janl/mustache.js/issues/112" ] | |
| }, | |
| { | |
| "below" : "2.2.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Quoteless Attributes in Templates can lead to Content Injection" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/62" ] | |
| } | |
| ] | |
| }, | |
| "syntax-error" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.1.1", | |
| "severity": "medium", | |
| "identifiers": {"advisory": "syntax-error-potential-script-injection"}, | |
| "info" : [ "https://nodesecurity.io/advisories/37" ] | |
| } | |
| ] | |
| }, | |
| "crumb" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "3.0.0", | |
| "severity": "medium", | |
| "identifiers": {"advisory": "crumb_cors_token_disclosure"}, | |
| "info" : [ "https://nodesecurity.io/advisories/4" ] | |
| } | |
| ] | |
| }, | |
| "qs" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.0.0", | |
| "severity": "medium", | |
| "identifiers": {"advisory": "qs_dos_extended_event_loop_blocking"}, | |
| "info" : [ "https://nodesecurity.io/advisories/28" ] | |
| }, | |
| { | |
| "below": "1.0.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "qs_denial-of-service-memory-exhaustion" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/29" | |
| ] | |
| } | |
| ] | |
| }, | |
| "bassmaster": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.5.2", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE" : "CVE-2014-7205", | |
| "summary": "bassmaster_arbitrary-javascript-execution" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/1" | |
| ] | |
| } | |
| ] | |
| }, | |
| "send" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "0.8.4", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE": ["CVE-2014-6394"], | |
| "advisory": "send-directory-traversal" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/32" ] | |
| }, | |
| { | |
| "below" : "0.11.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "discloses root path" | |
| }, | |
| "info" : [ | |
| "https://nodesecurity.io/advisories/56", | |
| "https://github.com/pillarjs/send/pull/70", | |
| "https://github.com/expressjs/serve-static/blob/master/HISTORY.md#181--2015-01-20" | |
| ] | |
| } | |
| ] | |
| }, | |
| "yar" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "2.2.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE": ["CVE-2014-4179"], | |
| "advisory": "yar-DoS" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/44" | |
| ] | |
| } | |
| ] | |
| }, | |
| "codem-transcode": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.5.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE": ["CVE-2013-7377"], | |
| "summary": "codem-transcode_potential-command-injection" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/2" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ep_imageconvert" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "0.0.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE": ["CVE-2013-3364"], | |
| "advisory": "ep_imageconvert_command_injection" | |
| }, | |
| "info" : [ | |
| "https://nodesecurity.io/advisories/7" | |
| ] | |
| } | |
| ] | |
| }, | |
| "sanitize-html": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.4.3", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Sanitization not applied recursively" | |
| }, | |
| "info" : [ "https://github.com/punkave/sanitize-html/issues/29", "https://nodesecurity.io/advisories/135" ] | |
| }, | |
| { | |
| "below": "1.2.3", | |
| "atOrAbove": "1.2.2", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "sanitize-html_cross-site-scripting" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/155" | |
| ] | |
| }, | |
| { | |
| "below": "1.11.4", | |
| "atOrAbove": "1.11.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "sanitize-html_cross-site-scripting" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/154" | |
| ] | |
| } | |
| ] | |
| }, | |
| "sequelize-restful": { | |
| "vulnerabilities" : [ { "below" : "0.3.1", "info" : [ "https://github.com/sequelize/sequelize-restful/issues/16" ] } ] | |
| }, | |
| "sequelize" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "2.0.0-rc8", | |
| "severity" : "medium", | |
| "identifiers" : { "CVE":[ "CVE-2015-1369" ] }, | |
| "info" : [ "https://nodesecurity.io/advisories/33", "https://github.com/sequelize/sequelize/issues/2906" ] | |
| }, | |
| { | |
| "below": "3.23.6", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "SQL Injection via GeoJSON" }, | |
| "info": [ "https://nodesecurity.io/advisories/122" ] | |
| }, | |
| { | |
| "below": "3.17.0", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "SQL injection" }, | |
| "info": [ "https://nodesecurity.io/advisories/112" ] | |
| }, | |
| { | |
| "below": "3.0.0", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "Potential SQL Injection" }, | |
| "info": [ "https://nodesecurity.io/advisories/109" ] | |
| }, | |
| { | |
| "below": "1.7.0-alpha3", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "SQL injection" }, | |
| "info": [ "https://nodesecurity.io/advisories/113" ] | |
| }, | |
| { | |
| "below": "3.20.0", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "Improper Escaping of Bound Arrays" }, | |
| "info": [ "https://nodesecurity.io/advisories/102" ] | |
| } | |
| ] | |
| }, | |
| "paypal-ipn": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "3.0.0", | |
| "severity": "medium", | |
| "identifiers": {"advisory": "paypal-ipn-validation-bypass"}, | |
| "info" : [ "http://nodesecurity.io/advisories/paypal-ipn-validation-bypass" ] | |
| } | |
| ] | |
| }, | |
| "fancy-server": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "0.1.4", | |
| "severity": "medium", | |
| "identifiers": {"advisory": "fancy-server-directory-traversal"}, | |
| "info" : [ "http://nodesecurity.io/advisories/fancy-server-directory-traversal" ] | |
| } | |
| ] | |
| }, | |
| "nhouston": { | |
| "vulnerabilities" : [ | |
| { | |
| "below":"100.0.0", | |
| "atOrAbove" : "0.0.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE": ["CVE-2014-8883"], | |
| "advisory": "nhouston-directory-traversal" | |
| }, | |
| "info" : [ "http://nodesecurity.io/advisories/nhouston-directory-traversal" ] | |
| } | |
| ] | |
| }, | |
| "bleach": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "100", | |
| "severity": "medium", | |
| "identifiers": { "CVE": ["CVE-2014-8881"] , "summary" : "Regular expression denial of service - no fix available" }, | |
| "info" : [ "https://nodesecurity.io/advisories/47" ] | |
| } | |
| ] | |
| }, | |
| "vue" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "2.5.17", | |
| "severity" : "medium", | |
| "identifiers" : { | |
| "summary" : "potential xss in ssr when using v-bind" | |
| }, | |
| "info" : [ "https://github.com/vuejs/vue/releases/tag/v2.5.17" ] | |
| }, | |
| { | |
| "below" : "2.4.3", | |
| "severity" : "medium", | |
| "identifiers" : { | |
| "summary" : "possible xss vector " | |
| }, | |
| "info" : [ "https://github.com/vuejs/vue/releases/tag/v2.4.3" ] | |
| } | |
| ] | |
| }, | |
| "react-dom": { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove" : "16.0.0", | |
| "below" : "16.0.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE": ["CVE-2018-6341"], | |
| "summary" : "RCE affecting some server-rendered React apps" | |
| }, | |
| "info" : [ "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ] | |
| }, | |
| { | |
| "atOrAbove" : "16.1.0", | |
| "below" : "16.1.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE": ["CVE-2018-6341"], | |
| "summary" : "RCE affecting some server-rendered React apps" | |
| }, | |
| "info" : [ "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ] | |
| }, | |
| { | |
| "atOrAbove" : "16.2.0", | |
| "below" : "16.2.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE": ["CVE-2018-6341"], | |
| "summary" : "RCE affecting some server-rendered React apps" | |
| }, | |
| "info" : [ "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ] | |
| }, | |
| { | |
| "atOrAbove" : "16.3.0", | |
| "below" : "16.3.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE": ["CVE-2018-6341"], | |
| "summary" : "RCE affecting some server-rendered React apps" | |
| }, | |
| "info" : [ "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ] | |
| }, | |
| { | |
| "atOrAbove" : "16.4.0", | |
| "below" : "16.4.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE": ["CVE-2018-6341"], | |
| "summary" : "RCE affecting some server-rendered React apps" | |
| }, | |
| "info" : [ "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ] | |
| } | |
| ] | |
| }, | |
| "mqtt-packet": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "3.4.6", | |
| "severity": "high", | |
| "identifiers": { "summary" : "Denial of service" }, | |
| "info" : [ "https://nodesecurity.io/advisories/75" ] | |
| }, | |
| { | |
| "atOrAbove" : "4.0.0", | |
| "below" : "4.0.5", | |
| "severity": "high", | |
| "identifiers": { "summary" : "Denial of service" }, | |
| "info" : [ "https://nodesecurity.io/advisories/75" ] | |
| } | |
| ] | |
| }, | |
| "is-my-json-valid": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "2.12.4", | |
| "severity": "medium", | |
| "identifiers": { "summary" : "Regex denial of service" }, | |
| "info" : [ "https://nodesecurity.io/advisories/76" ] | |
| } | |
| ] | |
| }, | |
| "i18n-node-angular": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.4.0", | |
| "severity": "high", | |
| "identifiers": { "summary" : "Denial of Service and Content Injection" }, | |
| "info" : [ "https://nodesecurity.io/advisories/80" ] | |
| } | |
| ] | |
| }, | |
| "hapi-auth-jwt2": { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove" : "5.1.1", | |
| "below" : "5.1.2", | |
| "severity": "high", | |
| "identifiers": { "summary" : "Authentication Bypass" }, | |
| "info" : [ "https://nodesecurity.io/advisories/81", "https://github.com/dwyl/hapi-auth-jwt2/issues/111", "https://github.com/dwyl/hapi-auth-jwt2/pull/112" ] | |
| } | |
| ] | |
| }, | |
| "moment": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "2.11.2", | |
| "severity": "medium", | |
| "identifiers": { "summary" : "Regex denial of service" }, | |
| "info" : [ "https://nodesecurity.io/advisories/55" ] | |
| } | |
| ] | |
| }, | |
| "hawk": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "3.1.3", | |
| "severity": "medium", | |
| "identifiers": { "summary" : "Regex denial of service" }, | |
| "info" : [ "https://nodesecurity.io/advisories/77" ] | |
| }, | |
| { | |
| "atOrAbove" : "4.0.0", | |
| "below" : "4.1.1", | |
| "severity": "medium", | |
| "identifiers": { "summary" : "Regex denial of service" }, | |
| "info" : [ "https://nodesecurity.io/advisories/77" ] | |
| } | |
| ] | |
| }, | |
| "mapbox.js": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.6.5", | |
| "severity": "medium", | |
| "identifiers": { "summary" : "XSS" }, | |
| "info" : [ "https://nodesecurity.io/advisories/49" ] | |
| }, | |
| { | |
| "atOrAbove" : "2.0.0", | |
| "below" : "2.1.7", | |
| "severity": "medium", | |
| "identifiers": { "summary" : "XSS" }, | |
| "info" : [ "https://nodesecurity.io/advisories/49" ] | |
| }, | |
| { | |
| "below" : "1.6.6", | |
| "severity": "medium", | |
| "identifiers": { "summary" : "XSS" }, | |
| "info" : [ "https://nodesecurity.io/advisories/74" ] | |
| }, | |
| { | |
| "atOrAbove" : "2.0.0", | |
| "below" : "2.2.4", | |
| "severity": "medium", | |
| "identifiers": { "summary" : "XSS" }, | |
| "info" : [ "https://nodesecurity.io/advisories/74" ] | |
| } | |
| ] | |
| }, | |
| "secure-compare": { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove" : "3.0.0", | |
| "below" : "3.0.1", | |
| "severity": "medium", | |
| "identifiers": { "summary": "do not actually compare two strings properly" }, | |
| "info" : [ "https://nodesecurity.io/advisories/50", "https://github.com/vdemedes/secure-compare/pull/1" ] | |
| } | |
| ] | |
| }, | |
| "semver": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "4.3.2", | |
| "severity": "medium", | |
| "identifiers": { | |
| "advisory": "semver_dos", | |
| "summary": "semver_regular-expression-denial-of-service" | |
| }, | |
| "info" : [ "http://nodesecurity.io/advisories/31" ] | |
| } | |
| ] | |
| }, | |
| "serve-static": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.6.5", | |
| "severity": "medium", | |
| "identifiers": {"advisory": "serve-static-open-redirect", "CVE":["CVE-2015-1164"]}, | |
| "info" : [ "http://nodesecurity.io/advisories/serve-static-open-redirect" ] | |
| }, | |
| { | |
| "below" : "1.7.2", | |
| "atOrAbove" : "1.7.0", | |
| "severity": "medium", | |
| "identifiers": {"advisory": "serve-static-open-redirect", "CVE":["CVE-2015-1164"]}, | |
| "info" : [ "http://nodesecurity.io/advisories/serve-static-open-redirect" ] | |
| } | |
| ] | |
| }, | |
| "serve-index": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.6.3", | |
| "severity": "medium", | |
| "identifiers": { | |
| "advisory": "serve-static-xss", | |
| "summary": "serve-index_cross-site-scripting" | |
| }, | |
| "info" : [ "http://nodesecurity.io/advisories/serve-static-xss" ] | |
| } | |
| ] | |
| }, | |
| "inert": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.1.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "advisory": "inert_hidden_directories_always_served", | |
| "summary": "inert_hidden-directories-always-served" | |
| }, | |
| "info" : [ "http://nodesecurity.io/advisories/inert_hidden_directories_always_served" ] | |
| } | |
| ] | |
| }, | |
| "electron": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.6.16", | |
| "severity": "high", | |
| "identifiers": { | |
| "advisory": "Update electron to a version that is not vulnerable.", | |
| "CVE" : ["CVE-2018-1000006"] | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/563" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.7.0", | |
| "below" : "1.7.11", | |
| "severity": "high", | |
| "identifiers": { | |
| "advisory": "Update electron to a version that is not vulnerable.", | |
| "CVE" : ["CVE-2018-1000006"] | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/563" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.8.0", | |
| "below" : "1.8.2-beta.4", | |
| "severity": "high", | |
| "identifiers": { | |
| "advisory": "Update electron to a version that is not vulnerable.", | |
| "CVE" : ["CVE-2018-1000006"] | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/563" ] | |
| }, | |
| { | |
| "below" : "1.6.14", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Remote code execution" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/539" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.7.0", | |
| "below" : "1.7.8", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Remote code execution" | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/539" ] | |
| }, | |
| { | |
| "below" : "1.7.13", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Remote code execution", | |
| "CVE" : ["CVE-2018-1000136"] | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/574" ] | |
| }, | |
| { | |
| "atOrAbove" : "1.8.4", | |
| "below" : "1.8.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Remote code execution", | |
| "CVE" : ["CVE-2018-1000136"] | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/574" ] | |
| }, | |
| { | |
| "atOrAbove" : "2.0.0-beta.5", | |
| "below" : "2.0.0-beta.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Remote code execution", | |
| "CVE" : ["CVE-2018-1000136"] | |
| }, | |
| "info" : [ "https://nodesecurity.io/advisories/574" ] | |
| } | |
| ] | |
| }, | |
| "electron-packager": { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove" : "5.1.2", | |
| "below" : "7.0.0", | |
| "severity": "low", | |
| "identifiers": {"advisory": "SSL Validation Defaults to False"}, | |
| "info" : [ "https://nodesecurity.io/advisories/104" ] | |
| } | |
| ] | |
| }, | |
| "csrf-lite": { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove":"0.1.1", | |
| "below" : "0.1.2", | |
| "severity": "medium", | |
| "identifiers": {"advisory": "Non-Constant Time String Comparison"}, | |
| "info" : [ "https://nodesecurity.io/advisories/94" ] | |
| } | |
| ] | |
| }, | |
| "engine.io-client": { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove":"1.6.8", | |
| "below" : "1.6.9", | |
| "severity": "high", | |
| "identifiers": {"advisory": "Insecure Defaults Allow MITM Over TLS"}, | |
| "info" : [ "https://nodesecurity.io/advisories/99" ] | |
| } | |
| ] | |
| }, | |
| "cli": { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "1.0.0", | |
| "severity": "low", | |
| "identifiers": {"advisory": "Arbitrary File Write"}, | |
| "info" : [ "https://nodesecurity.io/advisories/95" ] | |
| } | |
| ] | |
| }, | |
| "negotiator": { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove":"0.6.0", | |
| "below" : "0.6.1", | |
| "severity": "high", | |
| "identifiers": {"advisory": "Regular Expression Denial of Service"}, | |
| "info" : [ "https://nodesecurity.io/advisories/106" ] | |
| } | |
| ] | |
| }, | |
| "minimatch": { | |
| "vulnerabilities" : [ | |
| { | |
| "atOrAbove":"3.0.1", | |
| "below" : "3.0.2", | |
| "severity": "high", | |
| "identifiers": {"advisory": "Regular Expression Denial of Service"}, | |
| "info" : [ "https://nodesecurity.io/advisories/118" ] | |
| } | |
| ] | |
| }, | |
| "sails": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.12.8", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Broken CORS" }, | |
| "info": [ "https://nodesecurity.io/advisories/148" ] | |
| } | |
| ] | |
| }, | |
| "reduce-css-calc": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.2.5", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Arbitrary Code Injection" }, | |
| "info": [ "https://nodesecurity.io/advisories/144" ] | |
| } | |
| ] | |
| }, | |
| "nunjucks": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.4.3", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "XSS in autoescape mode" }, | |
| "info": [ "https://nodesecurity.io/advisories/147" ] | |
| } | |
| ] | |
| }, | |
| "pouchdb": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "6.0.5", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Arbitrary Code Injection" }, | |
| "info": [ "https://nodesecurity.io/advisories/143" ] | |
| } | |
| ] | |
| }, | |
| "plotly.js": { | |
| "vulnerabilities": [ | |
| { | |
| "atOrAbove": "1.10.4", | |
| "below": "1.16.0", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "Cross Site Scripting (XSS)" }, | |
| "info": [ "https://nodesecurity.io/advisories/145" ] | |
| } | |
| ] | |
| }, | |
| "uws": { | |
| "vulnerabilities": [ | |
| { | |
| "atOrAbove": "0.10.0", | |
| "below": "0.10.9", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Denial of Service" }, | |
| "info": [ "https://nodesecurity.io/advisories/149" ] | |
| } | |
| ] | |
| }, | |
| "cookie-signature": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.6", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "Timing attack vulnerability" }, | |
| "info": [ "https://nodesecurity.io/advisories/134" ] | |
| } | |
| ] | |
| }, | |
| "mqtt": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.0", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Denial of Service" }, | |
| "info": [ "https://nodesecurity.io/advisories/140" ] | |
| } | |
| ] | |
| }, | |
| "pivottable": { | |
| "vulnerabilities": [ | |
| { | |
| "atOrAbove": "1.4.0", | |
| "below": "2.0.0", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "XSS" }, | |
| "info": [ "https://nodesecurity.io/advisories/139" ] | |
| } | |
| ] | |
| }, | |
| "c3": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.4.11", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "XSS via tooltips" }, | |
| "info": [ "https://nodesecurity.io/advisories/138" ] | |
| } | |
| ] | |
| }, | |
| "swagger-ui": { | |
| "vulnerabilities": [ | |
| { | |
| "atOrAbove": "2.1.4", | |
| "below": "2.1.5", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "XSS via Content-type header" }, | |
| "info": [ "https://nodesecurity.io/advisories/131" ] | |
| }, | |
| { | |
| "atOrAbove": "2.1.4", | |
| "below": "2.1.5", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "XSS in Consumes/Produces Parameter" }, | |
| "info": [ "https://nodesecurity.io/advisories/123" ] | |
| }, | |
| { | |
| "below": "2.2.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "swagger-ui_xss-in-key-names" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/126" | |
| ] | |
| }, | |
| { | |
| "below": "2.1.0-M3", | |
| "atOrAbove": "2.1.0-M1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "swagger-ui_xss-in-url-query-string-parameter" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/137" | |
| ] | |
| } | |
| ] | |
| }, | |
| "node-krb5": { | |
| "vulnerabilities": [ | |
| { | |
| "below":"100.0.0", | |
| "atOrAbove": "0.0.0", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "Spoofing attack due to unvalidated KDC" }, | |
| "info": [ "https://nodesecurity.io/advisories/136" ] | |
| } | |
| ] | |
| }, | |
| "ezseed-transmission": { | |
| "vulnerabilities": [ | |
| { | |
| "atOrAbove": "0.0.10", | |
| "below": "0.0.15", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "Insecure Defaults Leads to Potential MITM" }, | |
| "info": [ "https://nodesecurity.io/advisories/114" ] | |
| } | |
| ] | |
| }, | |
| "jws": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.0.0", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Forgeable Public/Private Tokens" }, | |
| "info": [ "https://nodesecurity.io/advisories/88" ] | |
| } | |
| ] | |
| }, | |
| "fuelux": { | |
| "vulnerabilities": [ | |
| { | |
| "below":"3.15.7", | |
| "atOrAbove": "0.0.0", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "XSS in Pillbox" }, | |
| "info": [ "https://nodesecurity.io/advisories/133" ] | |
| } | |
| ] | |
| }, | |
| "jqtree": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.3.4", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "XSS in drag and drop node" }, | |
| "info": [ "https://nodesecurity.io/advisories/132" ] | |
| } | |
| ] | |
| }, | |
| "emojione": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.3.1", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "XSS in primary functions" }, | |
| "info": [ "https://nodesecurity.io/advisories/129" ] | |
| } | |
| ] | |
| }, | |
| "rendr": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.4", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "XSS in client rendered block templates" }, | |
| "info": [ "https://nodesecurity.io/advisories/128" ] | |
| } | |
| ] | |
| }, | |
| "tough-cookie": { | |
| "vulnerabilities": [ | |
| { | |
| "atOrAbove": "0.9.7", | |
| "below": "2.3.0", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "ReDoS via long string of semicolons" }, | |
| "info": [ "https://nodesecurity.io/advisories/130" ] | |
| } | |
| ] | |
| }, | |
| "jquery-ui": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.12.0", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "XSS in dialog closeText" }, | |
| "info": [ "https://nodesecurity.io/advisories/127" ] | |
| } | |
| ] | |
| }, | |
| "gmail-js": { | |
| "vulnerabilities": [ | |
| { | |
| "below":"100.0.0", | |
| "atOrAbove": "0.0.0", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "DOM-based XSS" }, | |
| "info": [ "https://nodesecurity.io/advisories/125" ] | |
| } | |
| ] | |
| }, | |
| "bootstrap-tagsinput": { | |
| "vulnerabilities": [ | |
| { | |
| "below":"100.0.0", | |
| "atOrAbove": "0.0.0", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "XSS in itemTitle parameter" }, | |
| "info": [ "https://nodesecurity.io/advisories/124" ] | |
| } | |
| ] | |
| }, | |
| "call": { | |
| "vulnerabilities": [ | |
| { | |
| "atOrAbove": "2.0.1", | |
| "below": "3.0.2", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "Invalid input to route validation rules" }, | |
| "info": [ "https://nodesecurity.io/advisories/121" ] | |
| } | |
| ] | |
| }, | |
| "shell-quote": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.6.1", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Potential Command Injection" }, | |
| "info": [ "https://nodesecurity.io/advisories/117" ] | |
| } | |
| ] | |
| }, | |
| "waterline-sequel": { | |
| "vulnerabilities": [ | |
| { | |
| "atOrAbove" : "0.5.0", | |
| "below": "0.5.1", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "SQL injection" }, | |
| "info": [ "https://nodesecurity.io/advisories/115" ] | |
| } | |
| ] | |
| }, | |
| "igniteui": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.0.6", | |
| "severity" : "low", | |
| "identifiers": { "advisory": "Resources Downloaded over Insecure Protocol" }, | |
| "info": [ "https://nodesecurity.io/advisories/116" ] | |
| } | |
| ] | |
| }, | |
| "jwt-simple": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.3.0", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "Forgeable Public/Private Tokens" }, | |
| "info": [ "https://nodesecurity.io/advisories/87" ] | |
| } | |
| ] | |
| }, | |
| "appium-chromedriver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.9.4", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Downloads Resources over HTTP" }, | |
| "info": [ "https://nodesecurity.io/advisories/162" ] | |
| } | |
| ] | |
| }, | |
| "aerospike": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.4.2", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Downloads Resources over HTTP" }, | |
| "info": [ "https://nodesecurity.io/advisories/167" ] | |
| } | |
| ] | |
| }, | |
| "selenium-download": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.0.7", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Downloads Resources over HTTP" }, | |
| "info": [ "https://nodesecurity.io/advisories/164" ] | |
| } | |
| ] | |
| }, | |
| "galenframework-cli": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.3.1", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Downloads Resources over HTTP" }, | |
| "info": [ "https://nodesecurity.io/advisories/170" ] | |
| } | |
| ] | |
| }, | |
| "passport-azure-ad": { | |
| "vulnerabilities": [ | |
| { | |
| "atOrAbove": "1.0.0", | |
| "below" : "1.4.6", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Authentication bypass" }, | |
| "info": [ "https://nodesecurity.io/advisories/151" ] | |
| }, | |
| { | |
| "atOrAbove": "2.0.0", | |
| "below" : "2.0.1", | |
| "severity" : "high", | |
| "identifiers": { "advisory": "Authentication bypass" }, | |
| "info": [ "https://nodesecurity.io/advisories/151" ] | |
| } | |
| ] | |
| }, | |
| "bitty": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "100.0.0", | |
| "severity" : "medium", | |
| "identifiers": { "advisory": "Directory Traversal" }, | |
| "info": [ "https://nodesecurity.io/advisories/150" ] | |
| } | |
| ] | |
| }, | |
| "shout": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.50.0", | |
| "atOrAbove": "0.44.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "shout_html-injection" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/322" | |
| ] | |
| } | |
| ] | |
| }, | |
| "growl": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.9.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "growl_command-injection" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/146" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ikst": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "ikst_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/249" | |
| ] | |
| } | |
| ] | |
| }, | |
| "gfe-sass": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "gfe-sass_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/291" | |
| ] | |
| } | |
| ] | |
| }, | |
| "hftp": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "hftp_directory-traversal" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/384" | |
| ] | |
| } | |
| ] | |
| }, | |
| "f2e-server": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.12.12", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "f2e-server_directory-traversal" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/346" | |
| ] | |
| } | |
| ] | |
| }, | |
| "gomeplus-h5-proxy": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "gomeplus-h5-proxy_directory-traversal" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/350" | |
| ] | |
| } | |
| ] | |
| }, | |
| "badjs-sourcemap-server": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "badjs-sourcemap-server_directory-traversal" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/349" | |
| ] | |
| } | |
| ] | |
| }, | |
| "hubl-server": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "hubl-server_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/334" | |
| ] | |
| } | |
| ] | |
| }, | |
| "pidusage": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.5", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "pidusage_command-injection" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/356" | |
| ] | |
| } | |
| ] | |
| }, | |
| "windows-cpu": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "windows-cpu_command-execution" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/336" | |
| ] | |
| } | |
| ] | |
| }, | |
| "brace-expansion": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.7", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "brace-expansion_redos" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/338" | |
| ] | |
| } | |
| ] | |
| }, | |
| "socket.io": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.9.7", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "socketio_insecure-randomness" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/321" | |
| ] | |
| } | |
| ] | |
| }, | |
| "useragent": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.1.13", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "useragent_redos-via-long-useragent-header" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/312" | |
| ] | |
| } | |
| ] | |
| }, | |
| "hostr": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.3.6", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "hostr_directory-traversal" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/303" | |
| ] | |
| } | |
| ] | |
| }, | |
| "react-native-meteor-oauth": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "react-native-meteor-oauth_random-token-based-off-mathrandom" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/157" | |
| ] | |
| } | |
| ] | |
| }, | |
| "jquery": { | |
| "vulnerabilities": [ | |
| { | |
| "below" : "3.5.0", | |
| "identifiers": { | |
| "summary": "Regex in its jQuery.htmlPrefilter sometimes may introduce XSS" | |
| }, | |
| "severity" : "medium", | |
| "info" : [ "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" ] | |
| }, | |
| { | |
| "below" : "3.4.0", | |
| "identifiers": { | |
| "CVE" : [ "CVE-2019-11358" ], | |
| "summary": "jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution" | |
| }, | |
| "severity" : "low", | |
| "info" : [ "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/", "https://nvd.nist.gov/vuln/detail/CVE-2019-11358", "https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b" ] | |
| }, | |
| { | |
| "below": "3.0.0", | |
| "atOrAbove": "3.0.0-rc1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "CVE": ["CVE-2016-10707"], | |
| "summary": "jquery_exceeding-stack-call-limit-dos" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/330" | |
| ] | |
| }, | |
| { | |
| "below": "3.0.0", | |
| "atOrAbove" : "1.12.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "jquery_xss" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/328" | |
| ] | |
| }, | |
| { | |
| "below": "1.12.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "jquery_xss" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/328" | |
| ] | |
| }, | |
| { | |
| "below": "1.9.0", | |
| "atOrAbove": "1.7.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "jquery_xss-via-improper-selector-detection" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/329" | |
| ] | |
| } | |
| ] | |
| }, | |
| "request": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.47.0", | |
| "atOrAbove": "2.2.6", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "request_remote-memory-exposure" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/309" | |
| ] | |
| }, | |
| { | |
| "below": "2.68.0", | |
| "atOrAbove": "2.52.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "request_remote-memory-exposure" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/309" | |
| ] | |
| } | |
| ] | |
| }, | |
| "nes": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "6.4.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "nes_denial-of-service" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/331" | |
| ] | |
| } | |
| ] | |
| }, | |
| "sync-exec": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "sync-exec_tmp-files-readable-by-other-users" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/310" | |
| ] | |
| } | |
| ] | |
| }, | |
| "decamelize": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.2", | |
| "atOrAbove": "1.1.0", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "decamelize_regular-expression-denial-of-service" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/308" | |
| ] | |
| } | |
| ] | |
| }, | |
| "Morris.js": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "atOrAbove": "0.5.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "morrisjs_morrisjs" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/307" | |
| ] | |
| } | |
| ] | |
| }, | |
| "uri-js": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.0.0", | |
| "atOrAbove": "2.1.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "uri-js_regular-expression-denial-of-service" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/100" | |
| ] | |
| } | |
| ] | |
| }, | |
| "summit": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.99.9999", | |
| "atOrAbove": "0.1.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "summit_unsafe-eval" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/315" | |
| ] | |
| } | |
| ] | |
| }, | |
| "gitbook": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.2.2", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "gitbook_cross-site-scripting" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/159" | |
| ] | |
| } | |
| ] | |
| }, | |
| "restify": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "4.1.0", | |
| "atOrAbove": "2.0.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "restify_xss" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/314" | |
| ] | |
| } | |
| ] | |
| }, | |
| "dns-sync": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.1.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "dns-sync_command-injection" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/153" | |
| ] | |
| } | |
| ] | |
| }, | |
| "forms": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.3.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "forms_lack-of-html-escaping" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/158" | |
| ] | |
| } | |
| ] | |
| }, | |
| "http-proxy": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.7.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "http-proxy_insufficient-error-handling" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/323" | |
| ] | |
| } | |
| ] | |
| }, | |
| "yui": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.10.3", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "yui_xss-via-swf-files" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/332" | |
| ] | |
| } | |
| ] | |
| }, | |
| "i18next": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.4.4", | |
| "atOrAbove": "2.0.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "i18next_cross-site-scripting" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/326" | |
| ] | |
| }, | |
| { | |
| "below": "1.10.3", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "i18next_cross-site-scripting" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/325" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ag-grid": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "ag-grid_xss-via-angular-expression" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/327" | |
| ] | |
| } | |
| ] | |
| }, | |
| "node-jose": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.9.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "node-jose_invalid-curve-attack" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/324" | |
| ] | |
| } | |
| ] | |
| }, | |
| "remarkable": { | |
| "vulnerabilities": [ | |
| { | |
| "below" : "1.4.1", | |
| "severity": "high", | |
| "identifiers": {"advisory": "remarkable_content_injection"}, | |
| "info" : [ "http://nodesecurity.io/advisories/remarkable_content_injection" ] | |
| }, | |
| { | |
| "below": "1.7.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "remarkable_xss-in-data-uri" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/319" | |
| ] | |
| }, | |
| { | |
| "below": "1.4.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "remarkable_content-injection" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/30" | |
| ] | |
| } | |
| ] | |
| }, | |
| "http-signature": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.10.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "http-signature_header-forgery" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/318" | |
| ] | |
| } | |
| ] | |
| }, | |
| "serialize-to-js": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "serialize-to-js_arbitrary-code-execution" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/313" | |
| ] | |
| } | |
| ] | |
| }, | |
| "node-serialize": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "node-serialize_code-execution-through-iife" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/311" | |
| ] | |
| } | |
| ] | |
| }, | |
| "fury-adapter-swagger": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.9.7", | |
| "atOrAbove": "0.2.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "fury-adapter-swagger_arbitrary-file-read" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/305" | |
| ] | |
| } | |
| ] | |
| }, | |
| "windows-build-tools": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "windows-build-tools_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/304" | |
| ] | |
| } | |
| ] | |
| }, | |
| "mystem-fix": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "mystem-fix_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/301" | |
| ] | |
| } | |
| ] | |
| }, | |
| "react-native-baidu-voice-synthesizer": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "react-native-baidu-voice-synthesizer_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/302" | |
| ] | |
| } | |
| ] | |
| }, | |
| "windows-latestchromedriver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "windows-latestchromedriver_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/295" | |
| ] | |
| } | |
| ] | |
| }, | |
| "npm-test-sqlite3-trunk": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "npm-test-sqlite3-trunk_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/297" | |
| ] | |
| } | |
| ] | |
| }, | |
| "alto-saxophone": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.25.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "alto-saxophone_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/172" | |
| ] | |
| } | |
| ] | |
| }, | |
| "pm2-kafka": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "pm2-kafka_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/299" | |
| ] | |
| } | |
| ] | |
| }, | |
| "haxeshim": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "haxeshim_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/300" | |
| ] | |
| } | |
| ] | |
| }, | |
| "windows-seleniumjar": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "windows-seleniumjar_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/296" | |
| ] | |
| } | |
| ] | |
| }, | |
| "openframe-ascii-image": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "openframe-ascii-image_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/298" | |
| ] | |
| } | |
| ] | |
| }, | |
| "windows-iedriver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "windows-iedriver_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/293" | |
| ] | |
| } | |
| ] | |
| }, | |
| "haxe3": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "haxe3_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/294" | |
| ] | |
| } | |
| ] | |
| }, | |
| "windows-selenium-chromedriver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "windows-selenium-chromedriver_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/285" | |
| ] | |
| } | |
| ] | |
| }, | |
| "fis-sass-all": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "fis-sass-all_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/287" | |
| ] | |
| } | |
| ] | |
| }, | |
| "pk-app-wonderbox": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "pk-app-wonderbox_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/289" | |
| ] | |
| } | |
| ] | |
| }, | |
| "healthcenter": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "healthcenter_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/288" | |
| ] | |
| } | |
| ] | |
| }, | |
| "arcanist": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "arcanist_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/286" | |
| ] | |
| } | |
| ] | |
| }, | |
| "massif": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "massif_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/290" | |
| ] | |
| } | |
| ] | |
| }, | |
| "roslib-socketio": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "roslib-socketio_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/292" | |
| ] | |
| } | |
| ] | |
| }, | |
| "adamvr-geoip-lite": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "adamvr-geoip-lite_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/283" | |
| ] | |
| } | |
| ] | |
| }, | |
| "selenium-standalone-painful": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "selenium-standalone-painful_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/284" | |
| ] | |
| } | |
| ] | |
| }, | |
| "serc.js": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "sercjs_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/277" | |
| ] | |
| } | |
| ] | |
| }, | |
| "google-closure-tools-latest": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "google-closure-tools-latest_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/274" | |
| ] | |
| } | |
| ] | |
| }, | |
| "rs-brightcove": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "rs-brightcove_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/273" | |
| ] | |
| } | |
| ] | |
| }, | |
| "libsbmlsim": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "libsbmlsim_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/275" | |
| ] | |
| } | |
| ] | |
| }, | |
| "limbus-buildgen": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.1.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "limbus-buildgen_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/276" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ipip-coffee": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "ipip-coffee_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/279" | |
| ] | |
| } | |
| ] | |
| }, | |
| "cloudpub-redis": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "cloudpub-redis_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/282" | |
| ] | |
| } | |
| ] | |
| }, | |
| "mystem-wrapper": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "mystem-wrapper_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/280" | |
| ] | |
| } | |
| ] | |
| }, | |
| "windows-seleniumjar-mirror": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "windows-seleniumjar-mirror_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/281" | |
| ] | |
| } | |
| ] | |
| }, | |
| "soci": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "soci_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/270" | |
| ] | |
| } | |
| ] | |
| }, | |
| "libsbml": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "libsbml_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/272" | |
| ] | |
| } | |
| ] | |
| }, | |
| "selenium-portal": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "selenium-portal_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/260" | |
| ] | |
| } | |
| ] | |
| }, | |
| "tomita-parser": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "tomita-parser_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/261" | |
| ] | |
| } | |
| ] | |
| }, | |
| "herbivore": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "herbivore_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/258" | |
| ] | |
| } | |
| ] | |
| }, | |
| "mystem": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "mystem_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/259" | |
| ] | |
| } | |
| ] | |
| }, | |
| "wixtoolset": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "wixtoolset_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/264" | |
| ] | |
| } | |
| ] | |
| }, | |
| "tomita": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "tomita_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/267" | |
| ] | |
| } | |
| ] | |
| }, | |
| "phantomjs-cheniu": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "phantomjs-cheniu_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/262" | |
| ] | |
| } | |
| ] | |
| }, | |
| "fis-parser-sass-bin": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "fis-parser-sass-bin_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/269" | |
| ] | |
| } | |
| ] | |
| }, | |
| "poco": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "poco_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/271" | |
| ] | |
| } | |
| ] | |
| }, | |
| "native-opencv": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "999.99.9999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "native-opencv_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/263" | |
| ] | |
| } | |
| ] | |
| }, | |
| "co-cli-installer": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "co-cli-installer_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/268" | |
| ] | |
| } | |
| ] | |
| }, | |
| "qbs": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "qbs_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/266" | |
| ] | |
| } | |
| ] | |
| }, | |
| "clang-extra": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "clang-extra_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/265" | |
| ] | |
| } | |
| ] | |
| }, | |
| "sfml": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "sfml_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/256" | |
| ] | |
| } | |
| ] | |
| }, | |
| "xd-testing": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "xd-testing_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/257" | |
| ] | |
| } | |
| ] | |
| }, | |
| "prebuild-lwip": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "prebuild-lwip_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/248" | |
| ] | |
| } | |
| ] | |
| }, | |
| "webdriver-launcher": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "webdriver-launcher_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/246" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ntfserver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "ntfserver_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/253" | |
| ] | |
| } | |
| ] | |
| }, | |
| "frames-compiler": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "frames-compiler_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/247" | |
| ] | |
| } | |
| ] | |
| }, | |
| "marionette-socket-host": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "marionette-socket-host_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/252" | |
| ] | |
| } | |
| ] | |
| }, | |
| "node-air-sdk": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "node-air-sdk_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/250" | |
| ] | |
| } | |
| ] | |
| }, | |
| "resourcehacker": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "resourcehacker_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/254" | |
| ] | |
| } | |
| ] | |
| }, | |
| "grunt-images": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "grunt-images_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/255" | |
| ] | |
| } | |
| ] | |
| }, | |
| "slimerjs-edge": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "slimerjs-edge_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/243" | |
| ] | |
| } | |
| ] | |
| }, | |
| "jstestdriver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "jstestdriver_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/244" | |
| ] | |
| } | |
| ] | |
| }, | |
| "cmake": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "cmake_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/233" | |
| ] | |
| } | |
| ] | |
| }, | |
| "node-bsdiff-android": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "node-bsdiff-android_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/234" | |
| ] | |
| } | |
| ] | |
| }, | |
| "node-thulac": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "node-thulac_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/236" | |
| ] | |
| } | |
| ] | |
| }, | |
| "redis-srvr": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "redis-srvr_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/238" | |
| ] | |
| } | |
| ] | |
| }, | |
| "js-given": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "js-given_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/241" | |
| ] | |
| } | |
| ] | |
| }, | |
| "haxe-dev": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "haxe-dev_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/237" | |
| ] | |
| } | |
| ] | |
| }, | |
| "grunt-ccompiler": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "grunt-ccompiler_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/239" | |
| ] | |
| } | |
| ] | |
| }, | |
| "broccoli-closure": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.3.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "broccoli-closure_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/242" | |
| ] | |
| } | |
| ] | |
| }, | |
| "scalajs-standalone-bin": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "scalajs-standalone-bin_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/231" | |
| ] | |
| } | |
| ] | |
| }, | |
| "dwebp-bin": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "dwebp-bin_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/232" | |
| ] | |
| } | |
| ] | |
| }, | |
| "apk-parser2": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "apk-parser2_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/223" | |
| ] | |
| } | |
| ] | |
| }, | |
| "jvminstall": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "jvminstall_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/225" | |
| ] | |
| } | |
| ] | |
| }, | |
| "install-g-test": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "install-g-test_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/228" | |
| ] | |
| } | |
| ] | |
| }, | |
| "nw-with-arm": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "nw-with-arm_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/226" | |
| ] | |
| } | |
| ] | |
| }, | |
| "selenium-wrapper": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "selenium-wrapper_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/224" | |
| ] | |
| } | |
| ] | |
| }, | |
| "scala-bin": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "scala-bin_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/227" | |
| ] | |
| } | |
| ] | |
| }, | |
| "mystem3": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "mystem3_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/229" | |
| ] | |
| } | |
| ] | |
| }, | |
| "headless-browser-lite": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "headless-browser-lite_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/230" | |
| ] | |
| } | |
| ] | |
| }, | |
| "selenium-chromedriver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "selenium-chromedriver_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/222" | |
| ] | |
| } | |
| ] | |
| }, | |
| "macaca-chromedriver-zxa": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "macaca-chromedriver-zxa_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/221" | |
| ] | |
| } | |
| ] | |
| }, | |
| "nodeschnaps": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "nodeschnaps_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/212" | |
| ] | |
| } | |
| ] | |
| }, | |
| "fibjs": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "fibjs_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/217" | |
| ] | |
| } | |
| ] | |
| }, | |
| "atom-node-module-installer": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "atom-node-module-installer_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/216" | |
| ] | |
| } | |
| ] | |
| }, | |
| "pennyworth": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "pennyworth_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/213" | |
| ] | |
| } | |
| ] | |
| }, | |
| "node-browser": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "node-browser_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/214" | |
| ] | |
| } | |
| ] | |
| }, | |
| "box2d-native": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "box2d-native_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/219" | |
| ] | |
| } | |
| ] | |
| }, | |
| "openframe-image": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "openframe-image_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/218" | |
| ] | |
| } | |
| ] | |
| }, | |
| "curses": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "curses_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/215" | |
| ] | |
| } | |
| ] | |
| }, | |
| "httpsync": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "httpsync_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/210" | |
| ] | |
| } | |
| ] | |
| }, | |
| "bionode-sra": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "bionode-sra_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/211" | |
| ] | |
| } | |
| ] | |
| }, | |
| "dalek-browser-ie-canary": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "dalek-browser-ie-canary_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/205" | |
| ] | |
| } | |
| ] | |
| }, | |
| "strider-sauce": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "strider-sauce_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/202" | |
| ] | |
| } | |
| ] | |
| }, | |
| "unicode-json": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "unicode-json_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/206" | |
| ] | |
| } | |
| ] | |
| }, | |
| "chromedriver126": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "chromedriver126_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/203" | |
| ] | |
| } | |
| ] | |
| }, | |
| "robot-js": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "robot-js_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/201" | |
| ] | |
| } | |
| ] | |
| }, | |
| "openframe-glslviewer": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "openframe-glslviewer_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/208" | |
| ] | |
| } | |
| ] | |
| }, | |
| "grunt-webdriver-qunit": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "grunt-webdriver-qunit_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/207" | |
| ] | |
| } | |
| ] | |
| }, | |
| "dalek-browser-ie": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "dalek-browser-ie_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/209" | |
| ] | |
| } | |
| ] | |
| }, | |
| "dalek-browser-chrome": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "dalek-browser-chrome_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/199" | |
| ] | |
| } | |
| ] | |
| }, | |
| "air-sdk": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "air-sdk_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/200" | |
| ] | |
| } | |
| ] | |
| }, | |
| "haxe": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "haxe_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/177" | |
| ] | |
| } | |
| ] | |
| }, | |
| "webdrvr": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "webdrvr_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/193" | |
| ] | |
| } | |
| ] | |
| }, | |
| "webrtc-native": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "webrtc-native_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/176" | |
| ] | |
| } | |
| ] | |
| }, | |
| "sauce-connect": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "sauce-connect_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/186" | |
| ] | |
| } | |
| ] | |
| }, | |
| "arrayfire-js": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "arrayfire-js_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/192" | |
| ] | |
| } | |
| ] | |
| }, | |
| "cobalt-cli": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "cobalt-cli_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/197" | |
| ] | |
| } | |
| ] | |
| }, | |
| "imageoptim": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "imageoptim_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/194" | |
| ] | |
| } | |
| ] | |
| }, | |
| "jdf-sass": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "jdf-sass_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/198" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ipip": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "ipip_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/184" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ibapi": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "ibapi_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/182" | |
| ] | |
| } | |
| ] | |
| }, | |
| "jser-stat": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "jser-stat_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/188" | |
| ] | |
| } | |
| ] | |
| }, | |
| "prince": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "prince_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/185" | |
| ] | |
| } | |
| ] | |
| }, | |
| "cue-sdk-node": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "cue-sdk-node_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/190" | |
| ] | |
| } | |
| ] | |
| }, | |
| "selenium-binaries": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "selenium-binaries_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/175" | |
| ] | |
| } | |
| ] | |
| }, | |
| "nw": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "nw_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/166" | |
| ] | |
| } | |
| ] | |
| }, | |
| "wasdk": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "wasdk_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/179" | |
| ] | |
| } | |
| ] | |
| }, | |
| "macaca-chromedriver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.29", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "macaca-chromedriver_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/180" | |
| ] | |
| } | |
| ] | |
| }, | |
| "libxl": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "libxl_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/178" | |
| ] | |
| } | |
| ] | |
| }, | |
| "dalek-browser-chrome-canary": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "dalek-browser-chrome-canary_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/181" | |
| ] | |
| } | |
| ] | |
| }, | |
| "closure-util": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "closure-utils_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/165" | |
| ] | |
| } | |
| ] | |
| }, | |
| "closurecompiler": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "closurecompiler_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/169" | |
| ] | |
| } | |
| ] | |
| }, | |
| "steroids": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "steroids_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/168" | |
| ] | |
| } | |
| ] | |
| }, | |
| "nodewebkit": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "nodewebkit_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/173" | |
| ] | |
| } | |
| ] | |
| }, | |
| "chromedriver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.26.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "chromedriver_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/160" | |
| ] | |
| } | |
| ] | |
| }, | |
| "unicode": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "unicode_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/161" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ibm_db": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "ibm_db_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/163" | |
| ] | |
| } | |
| ] | |
| }, | |
| "fuseki": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "fuseki_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/278" | |
| ] | |
| } | |
| ] | |
| }, | |
| "kindlegen": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "kindlegen_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/251" | |
| ] | |
| } | |
| ] | |
| }, | |
| "apk-parser3": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.1.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "apk-parser3_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/245" | |
| ] | |
| } | |
| ] | |
| }, | |
| "baryton-saxophone": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.0.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "baryton-saxophone_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/240" | |
| ] | |
| } | |
| ] | |
| }, | |
| "mongodb-instance": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.0.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "mongodb-instance_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/235" | |
| ] | |
| } | |
| ] | |
| }, | |
| "bkjs-wand": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.3.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "bkjs-wand_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/220" | |
| ] | |
| } | |
| ] | |
| }, | |
| "pngcrush-installer": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.8.10", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "pngcrush-installer_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/189" | |
| ] | |
| } | |
| ] | |
| }, | |
| "embedza": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.2.4", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "embedza_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/187" | |
| ] | |
| } | |
| ] | |
| }, | |
| "geoip-lite-country": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.4", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "geoip-lite-country_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/183" | |
| ] | |
| } | |
| ] | |
| }, | |
| "product-monitor": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.2.5", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "product-monitor_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/171" | |
| ] | |
| } | |
| ] | |
| }, | |
| "install-nw": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.5", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "install-nw_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/204" | |
| ] | |
| } | |
| ] | |
| }, | |
| "operadriver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.2.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "operadriver_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/196" | |
| ] | |
| } | |
| ] | |
| }, | |
| "apk-parser": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.1.6", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "apk-parser_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/195" | |
| ] | |
| } | |
| ] | |
| }, | |
| "go-ipfs-dep": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.4.4", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "go-ipfs-dep_insecure-fetch-of-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/156" | |
| ] | |
| } | |
| ] | |
| }, | |
| "iedriver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.0.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "iedriver_downloads-resources-over-http" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/174" | |
| ] | |
| } | |
| ] | |
| }, | |
| "backbone": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.5.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "backbone_cross-site-scripting" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/108" | |
| ] | |
| } | |
| ] | |
| }, | |
| "tar": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.0.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "tar_symlink-arbitrary-file-overwrite" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/57" | |
| ] | |
| } | |
| ] | |
| }, | |
| "jsonwebtoken": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "4.2.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "advisory": "jsonwebtoken_verification_bypass", | |
| "summary": "jsonwebtoken_verification-bypass" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/17" | |
| ] | |
| } | |
| ] | |
| }, | |
| "validator": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.22.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE": ["CVE-2014-8882"], | |
| "advisory": "validator-isurl-denial-of-service", | |
| "summary": "validator_regular-expression-denial-of-service" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/42" | |
| ] | |
| }, | |
| { | |
| "below": "2.0.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "advisory": "validator_XSS_Filter_Bypass_via_Encoded_URL", | |
| "summary": "validator_xss-filter-bypass-via-encoded-url" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/43", | |
| "https://github.com/chriso/validator.js/issues/181" | |
| ] | |
| }, | |
| { | |
| "below": "1.1.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "validator_multiple-xss-filter-bypasses" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/41", | |
| "https://nealpoole.com/blog/2013/07/xss-filter-bypass-in-validator-nodejs-module/" | |
| ] | |
| } | |
| ] | |
| }, | |
| "express": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "4.5", | |
| "atOrAbove": "4.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "express_no-charset-in-content-type-header" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/8" | |
| ] | |
| }, | |
| { | |
| "below": "3.11", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "express_no-charset-in-content-type-header" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/8" | |
| ] | |
| } | |
| ] | |
| }, | |
| "libyaml": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.2.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE": ["CVE-2013-6393"], | |
| "summary": "libyaml_heap-based-buffer-overflow" | |
| }, | |
| "info": [ | |
| "https://nodesecurity.io/advisories/21" | |
| ] | |
| } | |
| ] | |
| }, | |
| "fastify": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.38.0", | |
| "severity": "critical", | |
| "identifiers": { | |
| "CVE": [ | |
| "CVE-2018-3711" | |
| ], | |
| "summary": "denial-of-service vulnerability with large JSON payloads" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/303632" | |
| ] | |
| } | |
| ] | |
| }, | |
| "serve": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "6.4.9", | |
| "severity": "critical", | |
| "identifiers": { | |
| "CVE": [ | |
| "CVE-2018-3712" | |
| ], | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/307666" | |
| ] | |
| }, | |
| { | |
| "below": "6.5.0", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Information Exposure Through Directory Listing", | |
| "CVE": [ | |
| "CVE-2018-3718" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/308721" | |
| ] | |
| }, | |
| { | |
| "below": "7.0.1", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Information Exposure Through Directory Listing" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/330724", | |
| "https://hackerone.com/reports/330650" | |
| ] | |
| }, | |
| { | |
| "below": "7.3.1", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/358645" | |
| ] | |
| }, | |
| { | |
| "below": "10.0.2", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Stored" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/398285", | |
| "https://hackerone.com/reports/358641" | |
| ] | |
| }, | |
| { | |
| "below": "10.1.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Information Exposure Through Directory Listing" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/486933" | |
| ] | |
| } | |
| ] | |
| }, | |
| "augustine": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.2.4", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/296282" | |
| ] | |
| } | |
| ] | |
| }, | |
| "lactate": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.13.13", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/296645" | |
| ] | |
| } | |
| ] | |
| }, | |
| "redis-commander": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.4.6", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Reflected XSS" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/296377" | |
| ] | |
| } | |
| ] | |
| }, | |
| "featurebook": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.0.33", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/296305" | |
| ] | |
| } | |
| ] | |
| }, | |
| "serve-here": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.2.2", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/296254" | |
| ] | |
| } | |
| ] | |
| }, | |
| "html-janitor": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.0.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Bypassing sanitization using DOM clobbering" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/308158" | |
| ] | |
| }, | |
| { | |
| "below": "2.0.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - DOM" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/308155" | |
| ] | |
| } | |
| ] | |
| }, | |
| "lodash": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "4.0.0", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310443" | |
| ] | |
| }, | |
| { | |
| "below": "4.17.11", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/380873" | |
| ] | |
| }, | |
| { | |
| "below": "4.17.20", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack" | |
| }, | |
| "info": [ | |
| "https://snyk.io/vuln/SNYK-JS-LODASH-590103" | |
| ] | |
| } | |
| ] | |
| }, | |
| "hoek": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "4.2.1", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310439" | |
| ] | |
| } | |
| ] | |
| }, | |
| "mixin-deep": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.3.1", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/311236" | |
| ] | |
| }, | |
| { | |
| "below": "1.3.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack", | |
| "CVE": [ | |
| "CVE-2019-10746" | |
| ] | |
| }, | |
| "info": [ | |
| "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212" | |
| ] | |
| }, | |
| { | |
| "atOrAbove": "2.0.0", | |
| "below": "2.0.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack", | |
| "CVE": [ | |
| "CVE-2019-10746" | |
| ] | |
| }, | |
| "info": [ | |
| "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212" | |
| ] | |
| } | |
| ] | |
| }, | |
| "assign-deep": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.4.7", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310707" | |
| ] | |
| } | |
| ] | |
| }, | |
| "merge-deep": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.0.1", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310708" | |
| ] | |
| } | |
| ] | |
| }, | |
| "defaults-deep": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.2.4", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310514", | |
| "https://hackerone.com/reports/380878" | |
| ] | |
| } | |
| ] | |
| }, | |
| "public": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.1.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/312918" | |
| ] | |
| }, | |
| { | |
| "below": "0.1.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Stored", | |
| "CVE": [ | |
| "CVE-2018-3747" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/316346" | |
| ] | |
| }, | |
| { | |
| "below": "0.1.4", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/329950" | |
| ] | |
| } | |
| ] | |
| }, | |
| "crud-file-server": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.7.1", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS)", | |
| "CVE": [ | |
| "CVE-2018-3726" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/311101" | |
| ] | |
| }, | |
| { | |
| "below": "0.7.1", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE": [ | |
| "CVE-2018-3733" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310690" | |
| ] | |
| } | |
| ] | |
| }, | |
| "resolve-path": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.4.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/315760" | |
| ] | |
| } | |
| ] | |
| }, | |
| "localhost-now": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/312889", | |
| "https://hackerone.com/reports/329837" | |
| ] | |
| }, | |
| { | |
| "below": "99.999.99999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/334837" | |
| ] | |
| } | |
| ] | |
| }, | |
| "626": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/311216" | |
| ] | |
| } | |
| ] | |
| }, | |
| "anywhere": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.5.0", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Stored" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/309394" | |
| ] | |
| } | |
| ] | |
| }, | |
| "simplehttpserver": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.5.0", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Stored" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/309648" | |
| ] | |
| }, | |
| { | |
| "below": "0.2.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE":[ | |
| "CVE-2018-3787" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/357109" | |
| ] | |
| }, | |
| { | |
| "below": "0.3.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE":[ | |
| "CVE-2018-16478" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/403703" | |
| ] | |
| } | |
| ] | |
| }, | |
| "hekto": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.2.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/311218" | |
| ] | |
| }, | |
| { | |
| "below": "0.2.4", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Open Redirect", | |
| "CVE":[ | |
| "CVE-2018-3743" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/320693" | |
| ] | |
| } | |
| ] | |
| }, | |
| "uppy": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.22.3", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Stored XSS" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/311998" | |
| ] | |
| } | |
| ] | |
| }, | |
| "angular-http-server": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.4.4", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE": [ | |
| "CVE-2018-3713" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/309120", | |
| "https://hackerone.com/reports/330349" | |
| ] | |
| } | |
| ] | |
| }, | |
| "simple-server": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "~", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Stored XSS", | |
| "CVE": [ | |
| "CVE-2018-3717" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/309641" | |
| ] | |
| } | |
| ] | |
| }, | |
| "glance": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.0.4", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE": [ | |
| "CVE-2018-3715" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310106" | |
| ] | |
| }, | |
| { | |
| "below": "3.0.4", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Stored", | |
| "CVE": [ | |
| "CVE-2018-3748" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310133" | |
| ] | |
| }, | |
| { | |
| "below": "3.0.7", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Information Exposure Through Directory Listing" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/490379" | |
| ] | |
| } | |
| ] | |
| }, | |
| "stattic": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.2.4", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE": [ | |
| "CVE-2018-3734" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319003" | |
| ] | |
| } | |
| ] | |
| }, | |
| "node-srv": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.1.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE": [ | |
| "CVE-2018-3714" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/309124" | |
| ] | |
| } | |
| ] | |
| }, | |
| "general-file-server": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.9", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE": [ | |
| "CVE-2018-3724" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310943" | |
| ] | |
| } | |
| ] | |
| }, | |
| "metascraper": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.9.3", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Stored XSS" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/309367" | |
| ] | |
| } | |
| ] | |
| }, | |
| "whereis": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.9.3", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Command Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319476" | |
| ] | |
| } | |
| ] | |
| }, | |
| "protobufjs": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "5.0.3", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Denial of Service" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319576" | |
| ] | |
| }, | |
| { | |
| "atOrAbove": "6.0.0", | |
| "below": "6.8.6", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Denial of Service" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319576" | |
| ] | |
| } | |
| ] | |
| }, | |
| "https-proxy-agent": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.1.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Denial of Service" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319532" | |
| ] | |
| } | |
| ] | |
| }, | |
| "sshpk": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.13.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Denial of Service" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319593" | |
| ] | |
| } | |
| ] | |
| }, | |
| "http-proxy-agent": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.0.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Denial of Service" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/321631" | |
| ] | |
| } | |
| ] | |
| }, | |
| "atob": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.1.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Out-of-bounds Read", | |
| "CVE" : [ | |
| "CVE-2018-3745" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/321686" | |
| ] | |
| } | |
| ] | |
| }, | |
| "bracket-template": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.6", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Reflected" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/317125" | |
| ] | |
| } | |
| ] | |
| }, | |
| "deap": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.1", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack", | |
| "CVE": [ | |
| "CVE-2018-3749" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310446" | |
| ] | |
| } | |
| ] | |
| }, | |
| "deep-extend": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.5.1", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack", | |
| "CVE": [ | |
| "CVE-2018-3750" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/311333" | |
| ] | |
| } | |
| ] | |
| }, | |
| "merge-recursive": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.0.4", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack", | |
| "CVE": [ | |
| "CVE-2018-3751" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/311337" | |
| ] | |
| } | |
| ] | |
| }, | |
| "merge-options": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.1", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack", | |
| "CVE": [ | |
| "CVE-2018-3752" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/311336" | |
| ] | |
| } | |
| ] | |
| }, | |
| "merge-objects": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.6", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack", | |
| "CVE": [ | |
| "CVE-2018-3753" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310706" | |
| ] | |
| } | |
| ] | |
| }, | |
| "pdfinfojs": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.3.7", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Command Injection - Generic", | |
| "CVE": [ | |
| "CVE-2018-3746" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/330957" | |
| ] | |
| } | |
| ] | |
| }, | |
| "mcstatic": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.0.21", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE": [ | |
| "CVE-2018-3730" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/312907", | |
| "https://hackerone.com/reports/330285" | |
| ] | |
| } | |
| ] | |
| }, | |
| "cloudcmd": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "9.1.6", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/341044" | |
| ] | |
| } | |
| ] | |
| }, | |
| "foreman": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.0.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Denial of Service" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/320586" | |
| ] | |
| } | |
| ] | |
| }, | |
| "concat-with-sourcemaps": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.6", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Out-of-bounds Read" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/320166" | |
| ] | |
| } | |
| ] | |
| }, | |
| "superstatic": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "5.0.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal (Windows only)" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319951" | |
| ] | |
| } | |
| ] | |
| }, | |
| "stringstream": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.0.6", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Out-of-bounds Read" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/321670" | |
| ] | |
| } | |
| ] | |
| }, | |
| "fs-path": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Command Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/324491" | |
| ] | |
| } | |
| ] | |
| }, | |
| "buttle": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "OS Command Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/331032" | |
| ] | |
| }, | |
| { | |
| "below": "99.999.99999", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE":[ | |
| "CVE-2018-3766" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/358112" | |
| ] | |
| }, | |
| { | |
| "below": "99.999.99999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Stored" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/331110" | |
| ] | |
| }, | |
| { | |
| "below": "99.999.99999", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/404126" | |
| ] | |
| } | |
| ] | |
| }, | |
| "command-exists": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.2.4", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Command Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/324453" | |
| ] | |
| } | |
| ] | |
| }, | |
| "macaddress": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.2.9", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Command Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319467", | |
| "https://nodesecurity.io/advisories/654" | |
| ] | |
| } | |
| ] | |
| }, | |
| "base64url": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.0.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Out-of-bounds Read" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/321687" | |
| ] | |
| } | |
| ] | |
| }, | |
| "byte": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.4.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Out-of-bounds Read" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/330351" | |
| ] | |
| } | |
| ] | |
| }, | |
| "npmconf": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.1.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Out-of-bounds Read" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/320269" | |
| ] | |
| } | |
| ] | |
| }, | |
| "sql": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "SQL Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319465" | |
| ] | |
| } | |
| ] | |
| }, | |
| "base64-url": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.0.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Out-of-bounds Read" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/321692" | |
| ] | |
| } | |
| ] | |
| }, | |
| "react-marked-markdown": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.4.6", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS)" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/344069" | |
| ] | |
| } | |
| ] | |
| }, | |
| "query-mysql": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "SQL Injection", | |
| "CVE":[ | |
| "CVE-2018-3754" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/311244" | |
| ] | |
| } | |
| ] | |
| }, | |
| "html-pages": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.1.0", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE":[ | |
| "CVE-2018-3744" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/306607" | |
| ] | |
| }, | |
| { | |
| "below": "99.999.9999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/330356" | |
| ] | |
| } | |
| ] | |
| }, | |
| "sexstatic": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.99999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS)", | |
| "CVE":[ | |
| "CVE-2018-3755" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/328210" | |
| ] | |
| } | |
| ] | |
| }, | |
| "pdf-image": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.0.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Command Injection", | |
| "CVE":[ | |
| "CVE-2018-3757" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/340208" | |
| ] | |
| } | |
| ] | |
| }, | |
| "express-cart": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.6", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE": [ | |
| "CVE-2018-3758" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/343726" | |
| ] | |
| }, | |
| { | |
| "below": "1.1.7", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Privilege Escalation" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/343626" | |
| ] | |
| }, | |
| { | |
| "below": "1.1.8", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "SQL Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/397445" | |
| ] | |
| }, | |
| { | |
| "below": "99.999.9999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Reflected" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/395944" | |
| ] | |
| } | |
| ] | |
| }, | |
| "put": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Out-of-bounds Read" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/321702" | |
| ] | |
| } | |
| ] | |
| }, | |
| "utile": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Out-of-bounds Read" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/321701" | |
| ] | |
| } | |
| ] | |
| }, | |
| "file-static-server": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/310671" | |
| ] | |
| } | |
| ] | |
| }, | |
| "pullit": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.4.0", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Command Injection - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/315773" | |
| ] | |
| } | |
| ] | |
| }, | |
| "njwt": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Out-of-bounds Read" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/321704" | |
| ] | |
| } | |
| ] | |
| }, | |
| "funcster": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Code Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/350401" | |
| ] | |
| } | |
| ] | |
| }, | |
| "cryo": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Code Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/350418" | |
| ] | |
| } | |
| ] | |
| }, | |
| "memjs": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Denial of Service", | |
| "CVE":[ | |
| "CVE-2018-3767" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319809" | |
| ] | |
| } | |
| ] | |
| }, | |
| "url-parse": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.4.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Open Redirect", | |
| "CVE":[ | |
| "CVE-2018-3774" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/384029" | |
| ] | |
| } | |
| ] | |
| }, | |
| "markdown-pdf": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "9.0.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE":[ | |
| "CVE-2018-3770" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/360727" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ponse": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.0.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/383112" | |
| ] | |
| } | |
| ] | |
| }, | |
| "node-red": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.18.6", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Stored" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/349146" | |
| ] | |
| } | |
| ] | |
| }, | |
| "entitlements": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.3.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Command Injection - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/341869" | |
| ] | |
| } | |
| ] | |
| }, | |
| "statics-server": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Generic", | |
| "CVE": [ | |
| "CVE-2018-3771" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/355458" | |
| ] | |
| } | |
| ] | |
| }, | |
| "m-server": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.4.2", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319794" | |
| ] | |
| }, | |
| { | |
| "below": "1.4.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/319795" | |
| ] | |
| } | |
| ] | |
| }, | |
| "bruteser": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/342066" | |
| ] | |
| } | |
| ] | |
| }, | |
| "extend": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "3.0.2", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Prototype pollution attack" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/381185" | |
| ] | |
| } | |
| ] | |
| }, | |
| "egg-scripts": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.9.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Command Injection - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/388936" | |
| ] | |
| } | |
| ] | |
| }, | |
| "flintcms": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.1.10", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Privilege Escalation", | |
| "CVE": [ | |
| "CVE-2018-3783" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/386807" | |
| ] | |
| } | |
| ] | |
| }, | |
| "unzipper": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.8.13", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE": [ | |
| "CVE-2018-1002203" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/362119" | |
| ] | |
| } | |
| ] | |
| }, | |
| "adm-zip": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.4.9", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/362118" | |
| ] | |
| } | |
| ] | |
| }, | |
| "exceljs": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.6.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Cross-site Scripting (XSS) - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/356809" | |
| ] | |
| } | |
| ] | |
| }, | |
| "samsung-remote": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.3.5", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Command Injection - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/394294" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ps": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.0", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Command Injection - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/390848" | |
| ] | |
| } | |
| ] | |
| }, | |
| "ascii-art": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.4.4", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Command Injection - Generic" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/390631" | |
| ] | |
| } | |
| ] | |
| }, | |
| "http-live-simulator": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.6", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/384939" | |
| ] | |
| }, | |
| { | |
| "below": "1.0.7", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal", | |
| "CVE": [ | |
| "CVE-2018-16479" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/411405" | |
| ] | |
| } | |
| ] | |
| }, | |
| "merge": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.2.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Denial of Service" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/381194" | |
| ] | |
| } | |
| ] | |
| }, | |
| "samlify": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.4.0", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Signature wrapping allows SAML token forgery" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/356284" | |
| ] | |
| } | |
| ] | |
| }, | |
| "libnmap": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.4.16", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Command Injection - Generic", | |
| "CVE": [ | |
| "CVE-2018-16461" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/390865" | |
| ] | |
| } | |
| ] | |
| }, | |
| "apex-publish-static-files": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.0.1", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Command Injection - Generic", | |
| "CVE": [ | |
| "CVE-2018-16462" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/405694" | |
| ] | |
| } | |
| ] | |
| }, | |
| "morgan": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.9.1", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Code Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/390881" | |
| ] | |
| } | |
| ] | |
| }, | |
| "flatmap-stream@": { | |
| "vulnerabilities": [ | |
| { | |
| "atOrAbove": "0.1.1", | |
| "below": "0.1.2", | |
| "severity": "critical", | |
| "identifiers": { | |
| "summary": "Malicious package" | |
| }, | |
| "info": [ | |
| "https://github.com/dominictarr/event-stream/issues/116" | |
| ] | |
| } | |
| ] | |
| }, | |
| "knightjs": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE":[ | |
| "CVE-2018-16475" | |
| ], | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/403707" | |
| ] | |
| } | |
| ] | |
| }, | |
| "takeapeek": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE":[ | |
| "CVE-2018-16473" | |
| ], | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/403736" | |
| ] | |
| } | |
| ] | |
| }, | |
| "tianma-static": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE":[ | |
| "CVE-2018-16474" | |
| ], | |
| "summary": "Cross-site Scripting (XSS) - Stored" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/403692" | |
| ] | |
| } | |
| ] | |
| }, | |
| "cached-path-relative": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.0.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "CVE":[ | |
| "CVE-2018-16472" | |
| ], | |
| "summary": "Denial of Service" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/390847" | |
| ] | |
| } | |
| ] | |
| }, | |
| "mergify": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Prototype pollution" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/439098" | |
| ] | |
| } | |
| ] | |
| }, | |
| "zombie": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "6.1.3", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Code Injection" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/389583" | |
| ] | |
| } | |
| ] | |
| }, | |
| "just-extend": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "4.0.0", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Denial of Service" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/430291" | |
| ] | |
| } | |
| ] | |
| }, | |
| "mpath": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.5.1", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Prototype Pollution" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/390860" | |
| ] | |
| } | |
| ] | |
| }, | |
| "node.extend": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "2.0.1", | |
| "severity": "low", | |
| "identifiers": { | |
| "summary": "Denial of Service" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/430831" | |
| ] | |
| } | |
| ] | |
| }, | |
| "lutils-merge": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "99.999.9999", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Prototype pollution" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/439107" | |
| ] | |
| } | |
| ] | |
| }, | |
| "kill-port": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.3.2", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Command Injection - Generic", | |
| "CVE": [ | |
| "CVE-2019-5414" | |
| ] | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/389561" | |
| ] | |
| } | |
| ] | |
| }, | |
| "upmerge": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "0.1.8", | |
| "severity": "medium", | |
| "identifiers": { | |
| "summary": "Prototype pollution" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/439120" | |
| ] | |
| } | |
| ] | |
| }, | |
| "bower": { | |
| "vulnerabilities": [ | |
| { | |
| "below": "1.8.8", | |
| "severity": "high", | |
| "identifiers": { | |
| "summary": "Path Traversal" | |
| }, | |
| "info": [ | |
| "https://hackerone.com/reports/473811" | |
| ] | |
| } | |
| ] | |
| }, | |
| "dompurify" : { | |
| "vulnerabilities" : [ | |
| { | |
| "below" : "0.6.1", | |
| "severity": "medium", | |
| "identifiers": { }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases/tag/0.6.1" ] | |
| }, | |
| { | |
| "below" : "0.8.6", | |
| "severity": "medium", | |
| "identifiers": { }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases/tag/0.8.6" ] | |
| }, | |
| { | |
| "below" : "0.8.9", | |
| "severity": "low", | |
| "identifiers": { "summary": "safari UXSS" }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases/tag/0.8.9", "https://lists.ruhr-uni-bochum.de/pipermail/dompurify-security/2017-May/000006.html" ] | |
| }, | |
| { | |
| "below" : "0.9.0", | |
| "severity": "low", | |
| "identifiers": { "summary": "safari UXSS" }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases/tag/0.9.0" ] | |
| }, | |
| { | |
| "below" : "2.0.16", | |
| "severity": "low", | |
| "identifiers": { "summary": "Fixed an mXSS-based bypass caused by nested forms inside MathML" }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases" ] | |
| }, | |
| { | |
| "below" : "2.0.17", | |
| "severity": "low", | |
| "identifiers": { "summary": "Fixed another bypass causing mXSS by using MathML" }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases" ] | |
| }, | |
| { | |
| "below" : "2.1.1", | |
| "severity": "low", | |
| "identifiers": { "summary": "Fixed several possible mXSS patterns, thanks @hackvertor" }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases" ] | |
| }, | |
| { | |
| "below" : "2.2.0", | |
| "severity": "low", | |
| "identifiers": { "summary": "Fix a possible XSS in Chrome that is hidden behind #enable-experimental-web-platform-features" }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases" ] | |
| }, | |
| { | |
| "below" : "2.2.2", | |
| "severity": "low", | |
| "identifiers": { "summary": "Fixed an mXSS bypass dropped on us publicly via" }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases" ] | |
| }, | |
| { | |
| "below" : "2.2.3", | |
| "severity": "low", | |
| "identifiers": { "summary": "Fixed an mXSS issue reported" }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases" ] | |
| }, | |
| { | |
| "below" : "2.2.4", | |
| "severity": "low", | |
| "identifiers": { "summary": "Fixed a new MathML-based bypass submitted by PewGrand. Fixed a new SVG-related bypass submitted by SecurityMB" }, | |
| "info" : [ "https://github.com/cure53/DOMPurify/releases" ] | |
| } | |
| ] | |
| } | |
| } |