dmyers87 / boomstrap-react Goto Github PK
View Code? Open in Web Editor NEWReact Components and Mixins for Boomstrap
Home Page: http://boomtownroi.github.io/boomstrap-react
License: Apache License 2.0
React Components and Mixins for Boomstrap
Home Page: http://boomtownroi.github.io/boomstrap-react
License: Apache License 2.0
Parse, validate, manipulate, and display dates
Library home page: https://registry.npmjs.org/moment/-/moment-2.29.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/moment/package.json
Dependency Hierarchy:
Parse, validate, manipulate, and display dates
Library home page: https://registry.npmjs.org/moment/-/moment-2.20.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/changelog/node_modules/moment/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.
Publish Date: 2022-07-06
URL: CVE-2022-31129
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-wc69-rhjr-hc9g
Release Date: 2022-07-06
Fix Resolution: 2.29.4
String manipulation extensions for Underscore.js javascript library.
Library home page: https://registry.npmjs.org/underscore.string/-/underscore.string-2.0.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/underscore.string/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
The string module is a module that provides extra string operations. The string module is vulnerable to regular expression denial of service when specifically crafted untrusted user input is passed into the underscore or unescapeHTML methods.
Publish Date: 2018-06-07
URL: CVE-2017-16116
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-16116
Release Date: 2018-06-07
Fix Resolution (underscore.string): 3.3.5
Direct dependency fix Resolution (jest-cli): 13.0.0
small debugging utility
Library home page: https://registry.npmjs.org/debug/-/debug-2.2.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/express-session/node_modules/debug/package.json,/node_modules/connect/node_modules/debug/package.json,/node_modules/connect-timeout/node_modules/debug/package.json,/node_modules/send/node_modules/debug/package.json,/node_modules/finalhandler/node_modules/debug/package.json,/node_modules/body-parser/node_modules/debug/package.json,/node_modules/serve-index/node_modules/debug/package.json,/node_modules/tiny-lr/node_modules/debug/package.json,/node_modules/compression/node_modules/debug/package.json,/node_modules/morgan/node_modules/debug/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.
Publish Date: 2018-06-07
URL: CVE-2017-16137
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137
Release Date: 2018-06-07
Fix Resolution: 2.6.9
Tool for transforming CSS with JS plugins
Library home page: https://registry.npmjs.org/postcss/-/postcss-4.1.16.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/autoprefixer-core/node_modules/postcss/package.json
Dependency Hierarchy:
Tool for transforming styles with JS plugins
Library home page: https://registry.npmjs.org/postcss/-/postcss-5.2.18.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/postcss/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern /*\s* sourceMappingURL=(.*).
Publish Date: 2021-04-26
URL: CVE-2021-23382
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382
Release Date: 2021-04-26
Fix Resolution: postcss - 8.2.13
Small footprint URL parser that works seamlessly across Node.js and browser environments
Library home page: https://registry.npmjs.org/url-parse/-/url-parse-1.5.4.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/url-parse/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.
Publish Date: 2022-02-20
URL: CVE-2022-0686
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0686
Release Date: 2022-02-20
Fix Resolution: url-parse - 1.5.8
open a file or url in the user's preferred application
Library home page: https://registry.npmjs.org/open/-/open-0.0.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/open/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
All versions of open are vulnerable to command injection when unsanitized user input is passed in.
Publish Date: 2018-05-16
URL: WS-2018-0107
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/WS-2018-0107
Release Date: 2018-01-27
Fix Resolution: open - 6.0.0
A utility library delivering consistency, customization, performance, & extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash/package.json
Dependency Hierarchy:
A utility library delivering consistency, customization, performance, and extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/globule/node_modules/lodash/package.json
Dependency Hierarchy:
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/babel-core/node_modules/lodash/package.json,/node_modules/babel/node_modules/lodash/package.json,/node_modules/babel-plugin-proto-to-assign/node_modules/lodash/package.json,/node_modules/babel-jest/node_modules/lodash/package.json,/node_modules/inquirer/node_modules/lodash/package.json
Dependency Hierarchy:
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/changelog/node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
Publish Date: 2019-02-01
URL: CVE-2018-16487
Base Score Metrics:
Type: Upgrade version
Origin: https://hackerone.com/reports/380873
Release Date: 2019-02-01
Fix Resolution: 4.17.11
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.19.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
marked versions >0.3.14 and < 0.6.2 has Regular Expression Denial of Service vulnerability Email addresses may be evaluated in quadratic time, allowing attackers to potentially crash the node process due to resource exhaustion.
Publish Date: 2019-04-03
URL: WS-2019-0169
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/812
Release Date: 2019-04-03
Fix Resolution: 0.6.2
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/changelog/node_modules/lodash/package.json
Dependency Hierarchy:
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/babel-core/node_modules/lodash/package.json,/node_modules/babel/node_modules/lodash/package.json,/node_modules/babel-plugin-proto-to-assign/node_modules/lodash/package.json,/node_modules/babel-jest/node_modules/lodash/package.json,/node_modules/inquirer/node_modules/lodash/package.json
Dependency Hierarchy:
A utility library delivering consistency, customization, performance, & extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash/package.json
Dependency Hierarchy:
A utility library delivering consistency, customization, performance, and extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/globule/node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11.
Publish Date: 2019-07-17
URL: CVE-2019-1010266
Base Score Metrics:
W3C compliant EventSource client for Node.js and browser (polyfill)
Library home page: https://registry.npmjs.org/eventsource/-/eventsource-1.1.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/eventsource/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository eventsource/eventsource prior to v2.0.2.
Publish Date: 2022-05-12
URL: CVE-2022-1650
Base Score Metrics:
Serves a webpack app. Updates the browser on changes.
Library home page: https://registry.npmjs.org/webpack-dev-server/-/webpack-dev-server-1.16.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/webpack-dev-server/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
An issue was discovered in lib/Server.js in webpack-dev-server before 3.1.6. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:8080/ connection from any origin.
Publish Date: 2018-09-21
URL: CVE-2018-14732
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-14732
Release Date: 2018-09-21
Fix Resolution: 3.1.6
Small footprint URL parser that works seamlessly across Node.js and browser environments
Library home page: https://registry.npmjs.org/url-parse/-/url-parse-1.5.4.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/url-parse/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.
Publish Date: 2022-02-17
URL: CVE-2022-0639
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0639
Release Date: 2022-02-17
Fix Resolution: url-parse - 1.5.7
A querystring parser that supports nesting and arrays, with a depth limit
Library home page: https://registry.npmjs.org/qs/-/qs-2.4.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/react-router/node_modules/qs/package.json
Dependency Hierarchy:
A querystring parser that supports nesting and arrays, with a depth limit
Library home page: https://registry.npmjs.org/qs/-/qs-4.0.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/qs/package.json
Dependency Hierarchy:
A querystring parser that supports nesting and arrays, with a depth limit
Library home page: https://registry.npmjs.org/qs/-/qs-5.2.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/tiny-lr/node_modules/body-parser/node_modules/qs/package.json
Dependency Hierarchy:
A querystring parser that supports nesting and arrays, with a depth limit
Library home page: https://registry.npmjs.org/qs/-/qs-5.1.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/tiny-lr/node_modules/qs/package.json
Dependency Hierarchy:
A querystring parser that supports nesting and arrays, with a depth limit
Library home page: https://registry.npmjs.org/qs/-/qs-2.3.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/superagent/node_modules/qs/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
the web framework using ljharb's qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash.
Publish Date: 2017-07-17
URL: CVE-2017-1000048
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048
Release Date: 2017-07-13
Fix Resolution (qs): 6.0.4
Direct dependency fix Resolution (react-router): 1.0.0
Fix Resolution (qs): 6.0.4
Direct dependency fix Resolution (gulp-connect): 5.6.1
Fix Resolution (qs): 6.0.4
Direct dependency fix Resolution (gulp-connect): 5.6.1
Fix Resolution (qs): 6.0.4
Direct dependency fix Resolution (gulp-connect): 5.6.1
Fix Resolution (qs): 6.0.4
Direct dependency fix Resolution (superagent): 2.0.0
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.19.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression block.def
may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
Publish Date: 2022-01-14
URL: CVE-2022-21680
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-rrrm-qjm4-v8hf
Release Date: 2022-01-14
Fix Resolution: 4.0.10
Base64 encode, decode, escape and unescape for URL applications
Library home page: https://registry.npmjs.org/base64-url/-/base64-url-1.2.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/base64-url/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Versions of base64-url before 2.0.0 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input.
Publish Date: 2018-05-16
URL: WS-2018-0111
Base Score Metrics:
Type: Upgrade version
Origin: https://nodesecurity.io/advisories/660
Release Date: 2018-01-27
Fix Resolution: 2.0.0
A utility library delivering consistency, customization, performance, and extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/globule/node_modules/lodash/package.json
Dependency Hierarchy:
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/babel-core/node_modules/lodash/package.json,/node_modules/babel/node_modules/lodash/package.json,/node_modules/babel-plugin-proto-to-assign/node_modules/lodash/package.json,/node_modules/babel-jest/node_modules/lodash/package.json,/node_modules/inquirer/node_modules/lodash/package.json
Dependency Hierarchy:
A utility library delivering consistency, customization, performance, & extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash/package.json
Dependency Hierarchy:
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/changelog/node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
Mend Note: After conducting further research, Mend has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash.
Publish Date: 2021-02-15
URL: CVE-2020-28500
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500
Release Date: 2021-02-15
Fix Resolution: 4.17.21
Port of jQuery.extend for node.js and the browser
Library home page: https://registry.npmjs.org/extend/-/extend-3.0.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/superagent/node_modules/extend/package.json
Dependency Hierarchy:
Port of jQuery.extend for node.js and the browser
Library home page: https://registry.npmjs.org/extend/-/extend-1.3.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/uglifyify/node_modules/extend/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
A prototype pollution vulnerability was found in module extend <2.0.2, ~<3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype.
Publish Date: 2019-02-01
URL: CVE-2018-16492
Base Score Metrics:
Type: Upgrade version
Origin: https://hackerone.com/reports/381185
Release Date: 2019-02-01
Fix Resolution: extend - v3.0.2,v2.0.2
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/optimist/node_modules/minimist/package.json
Dependency Hierarchy:
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/minimist/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: 2022-03-17
URL: CVE-2021-44906
Base Score Metrics:
YAML 1.2 parser and serializer
Library home page: https://registry.npmjs.org/js-yaml/-/js-yaml-3.4.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/js-yaml/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
Publish Date: 2019-04-05
URL: WS-2019-0063
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/813
Release Date: 2019-04-05
Fix Resolution: js-yaml - 3.13.1
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/optimist/node_modules/minimist/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "proto" payload.
Publish Date: 2020-03-11
URL: CVE-2020-7598
Base Score Metrics:
General purpose crypto utilities
Library home page: https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/less/node_modules/cryptiles/package.json
Dependency Hierarchy:
General purpose crypto utilities
Library home page: https://registry.npmjs.org/cryptiles/-/cryptiles-3.1.4.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/cryptiles/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.
Publish Date: 2018-07-09
URL: CVE-2018-1000620
Base Score Metrics:
Type: Upgrade version
Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620
Release Date: 2018-07-09
Fix Resolution: v4.1.2
a glob matcher in javascript
Library home page: https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/minimatch/package.json
Dependency Hierarchy:
a glob matcher in javascript
Library home page: https://registry.npmjs.org/minimatch/-/minimatch-0.2.14.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/globule/node_modules/minimatch/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript RegExp
objects. The primary function, minimatch(path, pattern)
in Minimatch 3.0.1 and earlier is vulnerable to ReDoS in the pattern
parameter.
Publish Date: 2018-05-31
URL: CVE-2016-10540
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-10540
Release Date: 2018-04-26
Fix Resolution (minimatch): 3.0.2
Direct dependency fix Resolution (babel-core): 6.10.4
Fix Resolution (minimatch): 3.0.2
Direct dependency fix Resolution (gulp): 4.0.0
⛑️ Automatic Remediation will be attempted for this issue.
Higher-order functions and common patterns for asynchronous code
Library home page: https://registry.npmjs.org/async/-/async-0.9.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/watchpack/node_modules/async/package.json,/node_modules/react-docgen/node_modules/async/package.json
Dependency Hierarchy:
Higher-order functions and common patterns for asynchronous code
Library home page: https://registry.npmjs.org/async/-/async-1.5.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/webpack/node_modules/async/package.json,/node_modules/superagent/node_modules/async/package.json
Dependency Hierarchy:
Higher-order functions and common patterns for asynchronous code
Library home page: https://registry.npmjs.org/async/-/async-0.2.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/webpack/node_modules/uglify-js/node_modules/async/package.json
Dependency Hierarchy:
Higher-order functions and common patterns for asynchronous code
Library home page: https://registry.npmjs.org/async/-/async-0.2.6.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/async/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
Publish Date: 2022-04-06
URL: CVE-2021-43138
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-43138
Release Date: 2022-04-06
Fix Resolution (async): 2.6.4
Direct dependency fix Resolution (webpack): 4.0.0
Fix Resolution (async): 2.6.4
Direct dependency fix Resolution (superagent): 3.0.0
Fix Resolution (async): 2.6.4
Direct dependency fix Resolution (webpack): 4.0.0
Fix Resolution (async): 2.6.4
Direct dependency fix Resolution (jest-cli): 24.3.0
A well-tested CSS minifier
Library home page: https://registry.npmjs.org/clean-css/-/clean-css-3.4.28.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/clean-css/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Version of clean-css prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
Publish Date: 2018-03-06
URL: WS-2019-0017
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-wxhq-pm8v-cw75
Release Date: 2018-03-06
Fix Resolution: clean-css - 4.1.11
Portable Unix shell commands for Node.js
Library home page: https://registry.npmjs.org/shelljs/-/shelljs-0.5.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/shelljs/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
shelljs is vulnerable to Improper Privilege Management
Publish Date: 2022-01-11
URL: CVE-2022-0144
Base Score Metrics:
elegant & feature rich browser / node HTTP with a fluent API
Library home page: https://registry.npmjs.org/superagent/-/superagent-1.8.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/superagent/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.
Publish Date: 2018-06-07
URL: CVE-2017-16129
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/479/versions
Release Date: 2018-04-26
Fix Resolution: 3.7.0
General purpose node utilities
Library home page: https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/less/node_modules/hoek/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via proto, causing the addition or modification of an existing property that will exist on all objects.
Publish Date: 2018-03-30
URL: CVE-2018-3728
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082
Release Date: 2018-03-30
Fix Resolution: 4.2.0,5.0.3
A javascript text diff implementation.
Library home page: https://registry.npmjs.org/diff/-/diff-1.0.8.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/diff/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
Publish Date: 2018-03-05
URL: WS-2018-0590
Base Score Metrics:
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.19.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
marked before 1.1.1 is vulnerable to Regular Expression Denial of Service (REDoS). rules.js have multiple unused capture groups which can lead to a Denial of Service.
Publish Date: 2020-07-02
URL: WS-2020-0163
Base Score Metrics:
HTTP Hawk Authentication Scheme
Library home page: https://registry.npmjs.org/hawk/-/hawk-3.1.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/less/node_modules/hawk/package.json
Dependency Hierarchy:
HTTP Hawk Authentication Scheme
Library home page: https://registry.npmjs.org/hawk/-/hawk-6.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/hawk/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse Host
HTTP header (Hawk.utils.parseHost()
), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. parseHost()
was patched in 9.0.1
to use built-in URL
class to parse hostname instead. Hawk.authenticate()
accepts options
argument. If that contains host
and port
, those would be used instead of a call to utils.parseHost()
.
Publish Date: 2022-05-05
URL: CVE-2022-29167
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-44pw-h2cw-w3vq
Release Date: 2022-05-05
Fix Resolution: hawk - 9.0.1
A utility library delivering consistency, customization, performance, and extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/globule/node_modules/lodash/package.json
Dependency Hierarchy:
A utility library delivering consistency, customization, performance, & extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash/package.json
Dependency Hierarchy:
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/babel-core/node_modules/lodash/package.json,/node_modules/babel/node_modules/lodash/package.json,/node_modules/babel-plugin-proto-to-assign/node_modules/lodash/package.json,/node_modules/babel-jest/node_modules/lodash/package.json,/node_modules/inquirer/node_modules/lodash/package.json
Dependency Hierarchy:
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/changelog/node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
Publish Date: 2020-07-15
URL: CVE-2020-8203
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1523
Release Date: 2020-07-15
Fix Resolution: 4.17.9
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.19.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
marked before 0.4.0 is vulnerable to Regular Expression Denial of Service (REDoS) through heading in marked.js.
Publish Date: 2018-04-16
URL: WS-2018-0628
Base Score Metrics:
The modern build of lodash’s `_.template` as a module.
Library home page: https://registry.npmjs.org/lodash.template/-/lodash.template-3.6.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash.template/package.json
Dependency Hierarchy:
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/babel-core/node_modules/lodash/package.json,/node_modules/babel/node_modules/lodash/package.json,/node_modules/babel-plugin-proto-to-assign/node_modules/lodash/package.json,/node_modules/babel-jest/node_modules/lodash/package.json,/node_modules/inquirer/node_modules/lodash/package.json
Dependency Hierarchy:
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/changelog/node_modules/lodash/package.json
Dependency Hierarchy:
The modern build of lodash’s `_.merge` as a module.
Library home page: https://registry.npmjs.org/lodash.merge/-/lodash.merge-3.3.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash.merge/package.json
Dependency Hierarchy:
A utility library delivering consistency, customization, performance, & extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash/package.json
Dependency Hierarchy:
A utility library delivering consistency, customization, performance, and extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/globule/node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
Publish Date: 2019-07-26
URL: CVE-2019-10744
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-jf85-cpcp-j695
Release Date: 2019-07-26
Fix Resolution: 4.17.12
An AST-based pattern checker for JavaScript.
Library home page: https://registry.npmjs.org/eslint/-/eslint-1.10.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/eslint/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
A vulnerability was descovered in eslint before 4.18.2. One of the regexes in eslint is vulnerable to catastrophic backtracking.
Publish Date: 2018-02-27
URL: WS-2018-0347
Base Score Metrics:
⛑️ Automatic Remediation will be attempted for this issue.
Parse, validate, manipulate, and display dates
Library home page: https://registry.npmjs.org/moment/-/moment-2.20.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/changelog/node_modules/moment/package.json
Dependency Hierarchy:
Parse, validate, manipulate, and display dates
Library home page: https://registry.npmjs.org/moment/-/moment-2.29.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/moment/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
Publish Date: 2022-04-04
URL: CVE-2022-24785
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-8hfj-j24r-96c4
Release Date: 2022-04-04
Fix Resolution: 2.29.2
HTTP content negotiation
Library home page: https://registry.npmjs.org/negotiator/-/negotiator-0.5.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/negotiator/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
negotiator is an HTTP content negotiator for Node.js and is used by many modules and frameworks including Express and Koa. The header for "Accept-Language", when parsed by negotiator 0.6.0 and earlier is vulnerable to Regular Expression Denial of Service via a specially crafted string.
Publish Date: 2018-05-31
URL: CVE-2016-10539
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/106
Release Date: 2018-05-31
Fix Resolution: 0.6.1
YAML 1.2 parser and serializer
Library home page: https://registry.npmjs.org/js-yaml/-/js-yaml-3.4.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/js-yaml/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
Publish Date: 2019-03-20
URL: WS-2019-0032
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/788/versions
Release Date: 2019-03-20
Fix Resolution: js-yaml - 3.13.0
Strips glob magic from a string to provide the parent path
Library home page: https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/glob-parent/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
Publish Date: 2021-06-22
URL: CVE-2021-35065
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-cj88-88mr-972w
Release Date: 2021-06-22
Fix Resolution (glob-parent): 6.0.1
Direct dependency fix Resolution (babel): 6.0.0
A utility library delivering consistency, customization, performance, and extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/globule/node_modules/lodash/package.json
Dependency Hierarchy:
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/babel-core/node_modules/lodash/package.json,/node_modules/babel/node_modules/lodash/package.json,/node_modules/babel-plugin-proto-to-assign/node_modules/lodash/package.json,/node_modules/babel-jest/node_modules/lodash/package.json,/node_modules/inquirer/node_modules/lodash/package.json
Dependency Hierarchy:
The modern build of lodash’s `_.merge` as a module.
Library home page: https://registry.npmjs.org/lodash.merge/-/lodash.merge-3.3.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash.merge/package.json
Dependency Hierarchy:
A utility library delivering consistency, customization, performance, & extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via proto, causing the addition or modification of an existing property that will exist on all objects.
Publish Date: 2018-06-07
URL: CVE-2018-3721
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1067
Release Date: 2018-04-26
Fix Resolution: 4.17.5
In-browser code editing made bearable
Library home page: https://cdnjs.cloudflare.com/ajax/libs/codemirror/5.0.0/codemirror.min.js
Path to dependency file: /index.html
Path to vulnerable library: /index.html
Dependency Hierarchy:
In-browser code editing made bearable
Library home page: https://cdnjs.cloudflare.com/ajax/libs/codemirror/4.13.0/mode/javascript/javascript.min.js
Path to dependency file: /index.html
Path to vulnerable library: /index.html
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/.?/)
Publish Date: 2020-10-30
URL: CVE-2020-7760
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7760
Release Date: 2020-10-30
Fix Resolution: codemirror - 5.58.2
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.19.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression inline.reflinkSearch
may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
Publish Date: 2022-01-14
URL: CVE-2022-21681
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-5v2h-r2cx-5xgj
Release Date: 2022-01-14
Fix Resolution: 4.0.10
HTTP request logger middleware for node.js
Library home page: https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/morgan/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
Publish Date: 2019-03-21
URL: CVE-2019-5413
Base Score Metrics:
Type: Upgrade version
Origin: https://hackerone.com/reports/390881
Release Date: 2019-03-21
Fix Resolution: 1.9.1
A CSS3-compliant JavaScript selector engine.
Library home page: https://registry.npmjs.org/nwmatcher/-/nwmatcher-1.3.9.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/nwmatcher/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
Publish Date: 2018-03-05
URL: WS-2018-0589
Base Score Metrics:
JavaScript's functional programming helper library.
Library home page: https://registry.npmjs.org/underscore/-/underscore-1.6.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/nomnom/node_modules/underscore/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
Publish Date: 2021-03-29
URL: CVE-2021-23358
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358
Release Date: 2021-03-29
Fix Resolution: underscore - 1.12.1,1.13.0-2
A utility library delivering consistency, customization, performance, and extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/globule/node_modules/lodash/package.json
Dependency Hierarchy:
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/babel-core/node_modules/lodash/package.json,/node_modules/babel/node_modules/lodash/package.json,/node_modules/babel-plugin-proto-to-assign/node_modules/lodash/package.json,/node_modules/babel-jest/node_modules/lodash/package.json,/node_modules/inquirer/node_modules/lodash/package.json
Dependency Hierarchy:
A utility library delivering consistency, customization, performance, & extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash/package.json
Dependency Hierarchy:
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/changelog/node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Publish Date: 2021-02-15
URL: CVE-2021-23337
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-35jh-r3h4-6jhm
Release Date: 2021-02-15
Fix Resolution: 4.17.21
A comprehensive library for mime-type mapping
Library home page: https://registry.npmjs.org/mime/-/mime-1.3.4.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/send/node_modules/mime/package.json,/node_modules/superagent/node_modules/mime/package.json
Dependency Hierarchy:
A comprehensive library for mime-type mapping
Library home page: https://registry.npmjs.org/mime/-/mime-1.3.6.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/url-loader/node_modules/mime/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
Publish Date: 2018-06-07
URL: CVE-2017-16138
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138
Release Date: 2018-06-07
Fix Resolution: 1.4.1,2.0.3
HTTP response freshness testing
Library home page: https://registry.npmjs.org/fresh/-/fresh-0.3.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/fresh/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Fresh is a module used by the Express.js framework for HTTP response freshness testing. It is vulnerable to a regular expression denial of service when it is passed specially crafted input to parse. This causes the event loop to be blocked causing a denial of service condition.
Publish Date: 2018-06-07
URL: CVE-2017-16119
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/526
Release Date: 2018-06-07
Fix Resolution: fresh - 0.5.2
Another JSON Schema Validator
Library home page: https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/less/node_modules/ajv/package.json
Dependency Hierarchy:
Another JSON Schema Validator
Library home page: https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/ajv/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
Publish Date: 2020-07-15
URL: CVE-2020-15366
Base Score Metrics:
Strips glob magic from a string to provide the parent path
Library home page: https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/glob-parent/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
Publish Date: 2021-06-03
URL: CVE-2020-28469
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469
Release Date: 2021-06-03
Fix Resolution (glob-parent): 5.1.2
Direct dependency fix Resolution (babel): 6.0.0
⛑️ Automatic Remediation will be attempted for this issue.
Small footprint URL parser that works seamlessly across Node.js and browser environments
Library home page: https://registry.npmjs.org/url-parse/-/url-parse-1.5.4.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/url-parse/package.json
Dependency Hierarchy:
Found in HEAD commit: 56ff85f974b05cab00c2299011cfbdf611dd773d
Found in base branch: master
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
Publish Date: 2022-02-14
URL: CVE-2022-0512
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0512
Release Date: 2022-02-14
Fix Resolution (url-parse): 1.5.6
Direct dependency fix Resolution (webpack-dev-server): 2.2.0
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.