Latest CVE Feed
-
7.5
HIGHCVE-2021-23382
The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).... Read more
Affected Products : postcss- EPSS Score: %0.07
- Published: Apr. 26, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23381
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more
Affected Products : killing- EPSS Score: %0.81
- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-23380
This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child... Read more
Affected Products : roar-pidusage- EPSS Score: %0.50
- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23379
This affects all versions of package portkiller. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more
Affected Products : portkiller- EPSS Score: %0.81
- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23378
This affects all versions of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more
Affected Products : picotts- EPSS Score: %0.61
- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23377
This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input saniti... Read more
Affected Products : onion-oled-js- EPSS Score: %0.61
- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23376
This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanit... Read more
Affected Products : ffmpegdotjs- EPSS Score: %0.61
- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23375
This affects all versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more
Affected Products : psnode- EPSS Score: %0.81
- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23374
This affects all versions of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitizatio... Read more
Affected Products : ps-visitor- EPSS Score: %0.81
- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23373
All versions of package set-deep-prop are vulnerable to Prototype Pollution via the main functionality.... Read more
Affected Products : set-deep-prop- EPSS Score: %0.39
- Published: Jul. 25, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-23372
All versions of package mongo-express are vulnerable to Denial of Service (DoS) when exporting an empty collection as CSV, due to an unhandled exception, leading to a crash.... Read more
Affected Products : mongo-express- EPSS Score: %0.31
- Published: Apr. 13, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-23371
This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces.... Read more
Affected Products : chrono-node- EPSS Score: %0.41
- Published: Apr. 12, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23370
This affects the package swiper before 6.5.1.... Read more
Affected Products : swiper- EPSS Score: %1.54
- Published: Apr. 12, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23369
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.... Read more
Affected Products : handlebars- EPSS Score: %4.04
- Published: Apr. 12, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-23368
The package postcss from 7.0.0 and before 8.2.10 are vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.... Read more
Affected Products : postcss- EPSS Score: %0.30
- Published: Apr. 12, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-23365
The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-t... Read more
Affected Products : tyk-identity-broker- EPSS Score: %0.37
- Published: Apr. 26, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-23364
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.... Read more
Affected Products : browserslist- EPSS Score: %0.38
- Published: Apr. 28, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-23363
This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input ... Read more
Affected Products : kill-by-port- EPSS Score: %1.00
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-23362
The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexit... Read more
- EPSS Score: %0.55
- Published: Mar. 23, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-23360
This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC ... Read more
Affected Products : killport- EPSS Score: %0.76
- Published: Mar. 21, 2021
- Modified: Nov. 21, 2024