genignored / goof Goto Github PK
View Code? Open in Web Editor NEWThis project forked from snyk-labs/nodejs-goof
Super vulnerable todo list application
License: Apache License 2.0
This project forked from snyk-labs/nodejs-goof
Super vulnerable todo list application
License: Apache License 2.0
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.5.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/marked/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
marked before 1.1.1 is vulnerable to Regular Expression Denial of Service (REDoS). rules.js have multiple unused capture groups which can lead to a Denial of Service.
Publish Date: 2020-07-02
URL: WS-2020-0163
Base Score Metrics:
Type: Upgrade version
Origin: https://github.com/markedjs/marked/releases/tag/v1.1.1
Release Date: 2020-07-02
Fix Resolution: marked - 1.1.1
Step up your Open Source Security Game with WhiteSource here
A javascript text diff implementation.
Library home page: https://registry.npmjs.org/diff/-/diff-1.4.0.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/diff/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
Publish Date: 2018-03-05
URL: WS-2018-0590
Type: Upgrade version
Origin: kpdecker/jsdiff@2aec429
Release Date: 2019-06-11
Fix Resolution: 3.5.0
Step up your Open Source Security Game with WhiteSource here
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/handlebars/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Arbitrary Code Execution vulnerability found in handlebars before 4.5.2. Lookup helper fails to validate templates. Attack may submit templates that execute arbitrary JavaScript in the system.
Publish Date: 2019-11-13
URL: WS-2019-0331
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1316
Release Date: 2019-12-05
Fix Resolution: handlebars - 4.5.2
Step up your Open Source Security Game with WhiteSource here
Get, set, or delete a property from a nested object using a dot path
Library home page: https://registry.npmjs.org/dot-prop/-/dot-prop-4.2.0.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/dot-prop/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
Publish Date: 2020-02-04
URL: CVE-2020-8116
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116
Release Date: 2020-02-04
Fix Resolution: dot-prop - 5.1.1
Step up your Open Source Security Game with WhiteSource here
A comprehensive library for mime-type mapping
Library home page: https://registry.npmjs.org/mime/-/mime-1.2.11.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/st/node_modules/mime/package.json
Dependency Hierarchy:
A comprehensive library for mime-type mapping
Library home page: https://registry.npmjs.org/mime/-/mime-1.3.4.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/mime/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
Publish Date: 2018-06-07
URL: CVE-2017-16138
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138
Release Date: 2018-06-07
Fix Resolution: 1.4.1,2.0.3
Step up your Open Source Security Game with WhiteSource here
JavaScript library for DOM operations
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js
Path to dependency file: goof/node_modules/vm-browserify/example/run/index.html
Path to vulnerable library: goof/node_modules/vm-browserify/example/run/index.html
Dependency Hierarchy:
JavaScript library for DOM operations
Library home page: https://registry.npmjs.org/jquery/-/jquery-2.2.4.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/jquery/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Publish Date: 2020-04-29
URL: CVE-2020-11023
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023
Release Date: 2020-04-29
Fix Resolution: jquery - 3.5.0
Step up your Open Source Security Game with WhiteSource here
Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.
Library home page: https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/union-value/node_modules/set-value/package.json
Dependency Hierarchy:
Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.
Library home page: https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/set-value/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
set-value is vulnerable to Prototype Pollution in versions lower than 3.0.1. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype and proto payloads.
Publish Date: 2019-08-23
URL: CVE-2019-10747
Base Score Metrics:
Type: Upgrade version
Origin: jonschlinkert/set-value@95e9d99
Release Date: 2019-07-24
Fix Resolution: 2.0.1,3.0.1
Step up your Open Source Security Game with WhiteSource here
Deeply mix the properties of objects into the first object. Like merge-deep, but doesn't clone.
Library home page: https://registry.npmjs.org/mixin-deep/-/mixin-deep-1.3.1.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/mixin-deep/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
mixin-deep is vulnerable to Prototype Pollution in versions before 1.3.2 and version 2.0.0. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
Publish Date: 2019-08-23
URL: CVE-2019-10746
Base Score Metrics:
Type: Upgrade version
Origin: jonschlinkert/mixin-deep@8f464c8
Release Date: 2019-07-11
Fix Resolution: 1.3.2,2.0.1
Step up your Open Source Security Game with WhiteSource here
JavaScript library for DOM operations
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js
Path to dependency file: goof/node_modules/vm-browserify/example/run/index.html
Path to vulnerable library: goof/node_modules/vm-browserify/example/run/index.html
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
Publish Date: 2018-01-18
URL: CVE-2012-6708
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2012-6708
Release Date: 2018-01-18
Fix Resolution: jQuery - v1.9.0
Step up your Open Source Security Game with WhiteSource here
Mongoose MongoDB ODM
Library home page: https://registry.npmjs.org/mongoose/-/mongoose-4.2.4.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/mongoose/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Automattic Mongoose through 5.7.4 allows attackers to bypass access control (in some applications) because any query object with a _bsontype attribute is ignored. For example, adding "_bsontype":"a" can sometimes interfere with a query filter. NOTE: this CVE is about Mongoose's failure to work around this _bsontype special case that exists in older versions of the bson parser (aka the mongodb/js-bson project).
Publish Date: 2019-10-10
URL: CVE-2019-17426
Base Score Metrics:
Type: Upgrade version
Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17426
Release Date: 2019-10-10
Fix Resolution: 5.7.5
Step up your Open Source Security Game with WhiteSource here
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/handlebars/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's proto and defineGetter properties, which may allow an attacker to execute arbitrary code through crafted payloads.
Publish Date: 2019-12-20
URL: CVE-2019-19919
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1164
Release Date: 2019-12-20
Fix Resolution: 4.3.0
Step up your Open Source Security Game with WhiteSource here
JavaScript library for DOM operations
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js
Path to dependency file: goof/node_modules/vm-browserify/example/run/index.html
Path to vulnerable library: goof/node_modules/vm-browserify/example/run/index.html
Dependency Hierarchy:
JavaScript library for DOM operations
Library home page: https://registry.npmjs.org/jquery/-/jquery-2.2.4.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/jquery/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Publish Date: 2020-04-29
URL: CVE-2020-11022
Base Score Metrics:
Type: Upgrade version
Origin: https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
Release Date: 2020-04-29
Fix Resolution: jQuery - 3.5.0
Step up your Open Source Security Game with WhiteSource here
A Javascript implementation of zip for nodejs. Allows user to create or extract zip files both in memory or to/from disk
Library home page: https://registry.npmjs.org/adm-zip/-/adm-zip-0.4.7.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/adm-zip/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
adm-zip npm library before 0.4.9 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
Publish Date: 2018-07-25
URL: CVE-2018-1002204
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-1002204
Release Date: 2018-07-25
Fix Resolution: 0.4.9
Step up your Open Source Security Game with WhiteSource here
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.5.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/marked/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
marked before 0.4.0 is vulnerable to Regular Expression Denial of Service (REDoS) through heading in marked.js.
Publish Date: 2018-04-16
URL: WS-2018-0628
Base Score Metrics:
Type: Upgrade version
Origin: https://github.com/markedjs/marked/releases/tag/0.4.0
Release Date: 2018-04-16
Fix Resolution: marked - 0.4.0
Step up your Open Source Security Game with WhiteSource here
JavaScript library for DOM operations
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js
Path to dependency file: goof/node_modules/vm-browserify/example/run/index.html
Path to vulnerable library: goof/node_modules/vm-browserify/example/run/index.html
Dependency Hierarchy:
JavaScript library for DOM operations
Library home page: https://registry.npmjs.org/jquery/-/jquery-2.2.4.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/jquery/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
Publish Date: 2018-01-18
URL: CVE-2015-9251
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-9251
Release Date: 2018-01-18
Fix Resolution: jQuery - v3.0.0
Step up your Open Source Security Game with WhiteSource here
{G,S}et object values using MongoDB path notation
Library home page: https://registry.npmjs.org/mpath/-/mpath-0.1.1.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/mpath/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
A prototype pollution vulnerability was found in module mpath <0.5.1 that allows an attacker to inject arbitrary properties onto Object.prototype.
Publish Date: 2019-02-01
URL: CVE-2018-16490
Base Score Metrics:
Type: Upgrade version
Origin: https://hackerone.com/reports/390860
Release Date: 2019-02-01
Fix Resolution: 0.5.1
Step up your Open Source Security Game with WhiteSource here
the bare-bones internationalization library used by yargs
Library home page: https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/typeorm/node_modules/y18n/package.json,goof/node_modules/cli-highlight/node_modules/y18n/package.json
Dependency Hierarchy:
the bare-bones internationalization library used by yargs
Library home page: https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/y18n/package.json,goof/node_modules/y18n/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('proto'); y18n.updateLocale({polluted: true}); console.log(polluted); // true
Publish Date: 2020-11-17
URL: CVE-2020-7774
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7774
Release Date: 2020-11-17
Fix Resolution: 5.0.5
Step up your Open Source Security Game with WhiteSource here
Mongoose MongoDB ODM
Library home page: https://registry.npmjs.org/mongoose/-/mongoose-4.2.4.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/mongoose/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Versions of mongoose before 4.3.6, 3.8.39 are vulnerable to remote memory exposure.
Trying to save a number to a field of type Buffer on the affected mongoose versions allocates a chunk of uninitialized memory and stores it in the database.
Publish Date: 2016-01-15
URL: WS-2018-0077
Base Score Metrics:
Type: Upgrade version
Origin: Automattic/mongoose#3764
Release Date: 2018-01-27
Fix Resolution: 3.8.39,4.3.6
Step up your Open Source Security Game with WhiteSource here
Sign and unsign cookies
Library home page: https://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.5.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/cookie-signature/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Node-cookie-signature before 1.0.6 is affected by a timing attack due to the type of comparison used.
Publish Date: 2019-11-19
URL: CVE-2016-1000236
Base Score Metrics:
Type: Upgrade version
Origin: tj/node-cookie-signature@3979108
Release Date: 2019-11-19
Fix Resolution: 1.0.4
Step up your Open Source Security Game with WhiteSource here
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/handlebars/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
handlebars before 3.0.8 and 4.x before 4.5.2 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system.
Publish Date: 2019-11-14
URL: WS-2019-0493
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1316
Release Date: 2019-11-14
Fix Resolution: handlebars - 3.0.8,4.5.2
Step up your Open Source Security Game with WhiteSource here
The config thing npm uses
Library home page: https://registry.npmjs.org/npmconf/-/npmconf-0.0.24.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/npmconf/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Versions of npmconf before 2.1.3 allocate and write to disk uninitialized memory contents when a typed number is passed as input on Node.js 4.x.
Publish Date: 2018-05-16
URL: WS-2018-0114
Base Score Metrics:
Type: Upgrade version
Origin: https://nodesecurity.io/advisories/653
Release Date: 2018-01-27
Fix Resolution: 2.1.3
Step up your Open Source Security Game with WhiteSource here
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.5.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/marked/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
The affected versions (through 0.3.5) in marked package are vulnerable to Cross-Site Scripting (XSS) Due To Sanitization Bypass Using HTML Entities
Publish Date: 2018-03-23
URL: WS-2018-0031
Type: Upgrade version
Origin: markedjs/marked#592
Release Date: 2018-03-23
Fix Resolution: 0.3.6
Step up your Open Source Security Game with WhiteSource here
Get the native type of a value.
Library home page: https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/nanomatch/node_modules/kind-of/package.json,goof/node_modules/nyc/node_modules/micromatch/node_modules/kind-of/package.json,goof/node_modules/nyc/node_modules/base/node_modules/kind-of/package.json,goof/node_modules/nyc/node_modules/test-exclude/node_modules/kind-of/package.json,goof/node_modules/nyc/node_modules/snapdragon-node/node_modules/kind-of/package.json,goof/node_modules/nyc/node_modules/use/node_modules/kind-of/package.json,goof/node_modules/nyc/node_modules/define-property/node_modules/kind-of/package.json,goof/node_modules/nyc/node_modules/extglob/node_modules/kind-of/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
Publish Date: 2019-12-30
URL: CVE-2019-20149
Base Score Metrics:
Type: Upgrade version
Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20149
Release Date: 2019-12-30
Fix Resolution: 6.0.3
Step up your Open Source Security Game with WhiteSource here
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/handlebars/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system.
Publish Date: 2019-11-19
URL: WS-2019-0492
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1324
Release Date: 2019-11-19
Fix Resolution: handlebars - 3.0.8,4.5.3
Step up your Open Source Security Game with WhiteSource here
Tiny ms conversion utility
Library home page: https://registry.npmjs.org/ms/-/ms-0.7.1.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/mquery/node_modules/ms/package.json,goof/node_modules/send/node_modules/ms/package.json,goof/node_modules/express/node_modules/ms/package.json,goof/node_modules/finalhandler/node_modules/ms/package.json,goof/node_modules/mongoose/node_modules/ms/package.json
Dependency Hierarchy:
Tiny milisecond conversion utility
Library home page: https://registry.npmjs.org/ms/-/ms-0.7.3.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/ms/package.json
Dependency Hierarchy:
Tiny ms conversion utility
Library home page: https://registry.npmjs.org/ms/-/ms-0.6.2.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/humanize-ms/node_modules/ms/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS).
Publish Date: 2017-04-12
URL: WS-2017-0247
Type: Upgrade version
Origin: vercel/ms#89
Release Date: 2017-04-12
Fix Resolution: 2.1.1
Step up your Open Source Security Game with WhiteSource here
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.10.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/lodash/package.json
Dependency Hierarchy:
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
Publish Date: 2019-07-26
URL: CVE-2019-10744
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-jf85-cpcp-j695
Release Date: 2019-07-08
Fix Resolution: lodash-4.17.12, lodash-amd-4.17.12, lodash-es-4.17.12, lodash.defaultsdeep-4.6.1, lodash.merge- 4.6.2, lodash.mergewith-4.6.2, lodash.template-4.5.0
Step up your Open Source Security Game with WhiteSource here
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.5.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/marked/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Marked is an application that is meant to parse and compile markdown. Due to the way that marked parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (sanitize: true) to inject a javascript: URL.
Publish Date: 2015-05-20
URL: WS-2015-0020
Base Score Metrics:
Type: Upgrade version
Origin: https://nodesecurity.io/advisories/101
Release Date: 2016-04-18
Fix Resolution: To mitigate the flaw you have a couple of options. There's a [pull request](https://github.com/markedjs/marked/pull/592) open that fixes this issue. Another option would be to switch to another markdown library such as remarkable.
Step up your Open Source Security Game with WhiteSource here
{G,S}et object values using MongoDB path notation
Library home page: https://registry.npmjs.org/mpath/-/mpath-0.1.1.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/mpath/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Mpath, versions 0.0.1--0.0.5, have a Prototype Pollution Vulnerability. An attacker can specify a path that include the prototype object.
Publish Date: 2018-08-30
URL: WS-2018-0224
Type: Upgrade version
Origin: https://hackerone.com/reports/390860
Release Date: 2018-12-13
Fix Resolution: 0.5.1
Step up your Open Source Security Game with WhiteSource here
Parse, validate, manipulate, and display dates
Library home page: https://registry.npmjs.org/moment/-/moment-2.15.1.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/moment/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Regular expression denial of service vulnerability in the moment package, by using a specific 40 characters long string in the "format" method.
Publish Date: 2016-10-24
URL: WS-2016-0075
Base Score Metrics:
Type: Upgrade version
Origin: moment/moment#3525
Release Date: 2016-10-24
Fix Resolution: 2.15.2
Step up your Open Source Security Game with WhiteSource here
Kerberos library for Node.js
Library home page: https://registry.npmjs.org/kerberos/-/kerberos-0.0.24.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/kerberos/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
The kerberos package before 1.0.0 for Node.js allows arbitrary code execution and privilege escalation via injection of malicious DLLs through use of the kerberos_sspi LoadLibrary() method, because of a DLL path search.
Publish Date: 2020-05-16
URL: CVE-2020-13110
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1514
Release Date: 2020-05-16
Fix Resolution: kerberos - 1.0.0
Step up your Open Source Security Game with WhiteSource here
Simple express file upload middleware that wraps around connect-busboy
Library home page: https://registry.npmjs.org/express-fileupload/-/express-fileupload-0.0.5.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/express-fileupload/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
In "richardgirges/express-fileupload", versions prior to v1.1.6-alpha.6 are vulnerable to DOS, as a result of an unparsed file name.
Publish Date: 2019-10-18
URL: WS-2019-0314
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1216
Release Date: 2019-12-01
Fix Resolution: express-fileupload - 1.1.6-alpha.6
Step up your Open Source Security Game with WhiteSource here
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/handlebars/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
In handlebars, versions prior to v4.5.3 are vulnerable to prototype pollution. Using a malicious template it's possbile to add or modify properties to the Object prototype. This can also lead to DOS and RCE in certain conditions.
Publish Date: 2019-11-18
URL: WS-2019-0333
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1325
Release Date: 2019-12-05
Fix Resolution: handlebars - 4.5.3
Step up your Open Source Security Game with WhiteSource here
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/handlebars/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Arbitrary Code Execution vulnerability found in handlebars before 4.5.3. Lookup helper fails to validate templates. Attack may submit templates that execute arbitrary JavaScript in the system.It is due to an incomplete fix for a WS-2019-0331.
Publish Date: 2019-11-17
URL: WS-2019-0332
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1324
Release Date: 2019-12-05
Fix Resolution: handlebars - 4.5.3
Step up your Open Source Security Game with WhiteSource here
ECMAScript parser
Library home page: https://registry.npmjs.org/acorn/-/acorn-6.1.1.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/acorn-node/node_modules/acorn/package.json
Dependency Hierarchy:
ECMAScript parser
Library home page: https://registry.npmjs.org/acorn/-/acorn-5.7.1.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/acorn/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
acorn is vulnerable to REGEX DoS. A regex of the form /[x-\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser.
Publish Date: 2020-03-01
URL: WS-2020-0042
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1488
Release Date: 2020-03-08
Fix Resolution: 7.1.1
Step up your Open Source Security Game with WhiteSource here
Simple express file upload middleware that wraps around connect-busboy
Library home page: https://registry.npmjs.org/express-fileupload/-/express-fileupload-0.0.5.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/express-fileupload/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
Publish Date: 2020-07-30
URL: CVE-2020-7699
Base Score Metrics:
Type: Upgrade version
Origin: richardgirges/express-fileupload#236
Release Date: 2020-07-21
Fix Resolution: 1.1.8
Step up your Open Source Security Game with WhiteSource here
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/handlebars/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
In "showdownjs/showdown", versions prior to v4.4.5 are vulnerable against Regular expression Denial of Service (ReDOS) once receiving specially-crafted templates.
Publish Date: 2019-10-20
URL: WS-2019-0318
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1300
Release Date: 2019-12-01
Fix Resolution: handlebars - 4.4.5
Step up your Open Source Security Game with WhiteSource here
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/handlebars/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).
Publish Date: 2020-09-30
URL: CVE-2019-20920
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1324
Release Date: 2020-10-15
Fix Resolution: handlebars - 4.5.3
Step up your Open Source Security Game with WhiteSource here
small debugging utility
Library home page: https://registry.npmjs.org/debug/-/debug-2.2.0.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/finalhandler/node_modules/debug/package.json,goof/node_modules/mquery/node_modules/debug/package.json,goof/node_modules/send/node_modules/debug/package.json,goof/node_modules/express/node_modules/debug/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.
Publish Date: 2018-06-07
URL: CVE-2017-16137
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137
Release Date: 2018-06-07
Fix Resolution: 2.6.9
Step up your Open Source Security Game with WhiteSource here
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.5.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/marked/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
The marked module is vulnerable to a regular expression denial of service. Based on the information published in the public issue, 1k characters can block for around 6 seconds.
Publish Date: 2018-06-07
URL: CVE-2017-16114
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/531/versions
Release Date: 2018-06-07
Fix Resolution: 0.3.9
Step up your Open Source Security Game with WhiteSource here
A bson parser for node.js and the browser
Library home page: https://registry.npmjs.org/bson/-/bson-0.4.23.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/bson/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object's _bsotype, leading to cases where an object is serialized as a document rather than the intended BSON type.
Publish Date: 2020-03-30
URL: CVE-2020-7610
Base Score Metrics:
Type: Upgrade version
Origin: https://github.com/mongodb/js-bson/releases/tag/v1.1.4
Release Date: 2020-03-30
Fix Resolution: bson - 1.1.4
Step up your Open Source Security Game with WhiteSource here
Asynchronous templates for the browser and node.js ( LinkedIn fork )
Library home page: https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.5.0.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/dustjs-linkedin/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Code injection vulnerability in Dustjs-linkedin through 2.5.1 allows array variables to be applied without escaping dangerous characters.
Publish Date: 2014-04-01
URL: WS-2016-0058
Base Score Metrics:
Type: Upgrade version
Origin: linkedin/dustjs#449
Release Date: 2014-04-01
Fix Resolution: 2.6.0
Step up your Open Source Security Game with WhiteSource here
Memoize functions - An optimization used to speed up consecutive function calls by caching the result of calls with identical input
Library home page: https://registry.npmjs.org/mem/-/mem-1.1.0.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/mem/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
In 'mem' before v4.0.0 there is a Denial of Service (DoS) vulnerability as a result of a failure in removal old values from the cache.
Publish Date: 2018-08-27
URL: WS-2019-0307
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1084
Release Date: 2019-12-01
Fix Resolution: mem - 4.0.0
Step up your Open Source Security Game with WhiteSource here
JavaScript library for DOM operations
Library home page: https://registry.npmjs.org/jquery/-/jquery-2.2.4.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/jquery/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable proto property, it could extend the native Object.prototype.
Publish Date: 2019-04-20
URL: CVE-2019-11358
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358
Release Date: 2019-04-20
Fix Resolution: 3.4.0
Step up your Open Source Security Game with WhiteSource here
Tiny ms conversion utility
Library home page: https://registry.npmjs.org/ms/-/ms-0.6.2.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/humanize-ms/node_modules/ms/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
The ms package before 0.7.1 for Node.js allows attackers to cause a denial of service (CPU consumption) via a long version string, aka a "regular expression denial of service (ReDoS)."
Publish Date: 2017-01-23
URL: CVE-2015-8315
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-8315
Release Date: 2017-01-23
Fix Resolution: 0.7.1
Step up your Open Source Security Game with WhiteSource here
Parse, validate, manipulate, and display dates
Library home page: https://registry.npmjs.org/moment/-/moment-2.15.1.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/moment/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
The moment module before 2.19.3 for Node.js is prone to a regular expression denial of service via a crafted date string, a different vulnerability than CVE-2016-4055.
Publish Date: 2018-03-04
URL: CVE-2017-18214
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18214
Release Date: 2018-03-04
Fix Resolution: 2.19.3
Step up your Open Source Security Game with WhiteSource here
A module for serving static files. Does etags, caching, etc.
Library home page: https://registry.npmjs.org/st/-/st-0.2.4.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/st/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Directory traversal vulnerability in the st module before 0.2.5 for Node.js allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in an unspecified path.
Publish Date: 2017-10-23
URL: CVE-2014-3744
Base Score Metrics:
Type: Upgrade version
Origin: https://nodesecurity.io/advisories/36
Release Date: 2014-02-06
Fix Resolution: Upgrade to version 0.2.5 or greater.
Step up your Open Source Security Game with WhiteSource here
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/nyc/node_modules/handlebars/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
Publish Date: 2020-09-30
URL: CVE-2019-20922
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1300
Release Date: 2020-10-07
Fix Resolution: handlebars - 4.4.5
Step up your Open Source Security Game with WhiteSource here
Data-Mapper ORM for TypeScript, ES7, ES6, ES5. Supports MySQL, PostgreSQL, MariaDB, SQLite, MS SQL Server, Oracle, MongoDB databases.
Library home page: https://registry.npmjs.org/typeorm/-/typeorm-0.2.24.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/typeorm/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
Prototype pollution vulnerability in the TypeORM package < 0.2.25 may allow attackers to add or modify Object properties leading to further denial of service or SQL injection attacks.
Publish Date: 2020-09-18
URL: CVE-2020-8158
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8158
Release Date: 2020-07-21
Fix Resolution: 0.2.25
Step up your Open Source Security Game with WhiteSource here
EC cryptography
Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.4.1.tgz
Path to dependency file: goof/package.json
Path to vulnerable library: goof/node_modules/elliptic/package.json
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
Publish Date: 2020-06-04
URL: CVE-2020-13822
Base Score Metrics:
Type: Upgrade version
Origin: https://github.com/indutny/elliptic/tree/v6.5.3
Release Date: 2020-06-04
Fix Resolution: v6.5.3
Step up your Open Source Security Game with WhiteSource here
JavaScript library for DOM operations
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js
Path to dependency file: goof/node_modules/vm-browserify/example/run/index.html
Path to vulnerable library: goof/node_modules/vm-browserify/example/run/index.html
Dependency Hierarchy:
Found in HEAD commit: a61545bea0660d41ba585c928718727990b65b7a
Found in base branch: master
jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
Publish Date: 2020-05-19
URL: CVE-2020-7656
Base Score Metrics:
Type: Upgrade version
Origin: rails/jquery-rails@8f601cb
Release Date: 2020-05-19
Fix Resolution: jquery-rails - 2.2.0
Step up your Open Source Security Game with WhiteSource here
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.