Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2021-23382

    The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).... Read more

    Affected Products : postcss
    • EPSS Score: %0.07
    • Published: Apr. 26, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-23381

    This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more

    Affected Products : killing
    • EPSS Score: %0.81
    • Published: Apr. 18, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-23380

    This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child... Read more

    Affected Products : roar-pidusage
    • EPSS Score: %0.50
    • Published: Apr. 18, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-23379

    This affects all versions of package portkiller. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more

    Affected Products : portkiller
    • EPSS Score: %0.81
    • Published: Apr. 18, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-23378

    This affects all versions of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more

    Affected Products : picotts
    • EPSS Score: %0.61
    • Published: Apr. 18, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-23377

    This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input saniti... Read more

    Affected Products : onion-oled-js
    • EPSS Score: %0.61
    • Published: Apr. 18, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-23376

    This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanit... Read more

    Affected Products : ffmpegdotjs
    • EPSS Score: %0.61
    • Published: Apr. 18, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-23375

    This affects all versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more

    Affected Products : psnode
    • EPSS Score: %0.81
    • Published: Apr. 18, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-23374

    This affects all versions of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitizatio... Read more

    Affected Products : ps-visitor
    • EPSS Score: %0.81
    • Published: Apr. 18, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-23373

    All versions of package set-deep-prop are vulnerable to Prototype Pollution via the main functionality.... Read more

    Affected Products : set-deep-prop
    • EPSS Score: %0.39
    • Published: Jul. 25, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-23372

    All versions of package mongo-express are vulnerable to Denial of Service (DoS) when exporting an empty collection as CSV, due to an unhandled exception, leading to a crash.... Read more

    Affected Products : mongo-express
    • EPSS Score: %0.31
    • Published: Apr. 13, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-23371

    This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces.... Read more

    Affected Products : chrono-node
    • EPSS Score: %0.41
    • Published: Apr. 12, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-23370

    This affects the package swiper before 6.5.1.... Read more

    Affected Products : swiper
    • EPSS Score: %1.54
    • Published: Apr. 12, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-23369

    The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.... Read more

    Affected Products : handlebars
    • EPSS Score: %4.04
    • Published: Apr. 12, 2021
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-23368

    The package postcss from 7.0.0 and before 8.2.10 are vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.... Read more

    Affected Products : postcss
    • EPSS Score: %0.30
    • Published: Apr. 12, 2021
    • Modified: Nov. 21, 2024
  • 9.1

    CRITICAL
    CVE-2021-23365

    The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-t... Read more

    Affected Products : tyk-identity-broker
    • EPSS Score: %0.37
    • Published: Apr. 26, 2021
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-23364

    The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.... Read more

    Affected Products : browserslist
    • EPSS Score: %0.38
    • Published: Apr. 28, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-23363

    This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input ... Read more

    Affected Products : kill-by-port
    • EPSS Score: %1.00
    • Published: Mar. 30, 2021
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-23362

    The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexit... Read more

    • EPSS Score: %0.55
    • Published: Mar. 23, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-23360

    This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC ... Read more

    Affected Products : killport
    • EPSS Score: %0.76
    • Published: Mar. 21, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 290918 Results