Latest CVE Feed
-
5.3
MEDIUMCVE-2021-23368
The package postcss from 7.0.0 and before 8.2.10 are vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.... Read more
Affected Products : postcss- EPSS Score: %0.29
- Published: Apr. 12, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-23365
The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-t... Read more
Affected Products : tyk-identity-broker- EPSS Score: %0.37
- Published: Apr. 26, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-23364
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.... Read more
Affected Products : browserslist- EPSS Score: %0.38
- Published: Apr. 28, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-23363
This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input ... Read more
Affected Products : kill-by-port- EPSS Score: %1.00
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-23362
The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexit... Read more
- EPSS Score: %0.29
- Published: Mar. 23, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-23360
This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC ... Read more
Affected Products : killport- EPSS Score: %0.76
- Published: Mar. 21, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-23359
This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this Po... Read more
Affected Products : port-killer- EPSS Score: %0.38
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2021-23358
The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.... Read more
- EPSS Score: %1.06
- Published: Mar. 29, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-23357
All versions of package github.com/tyktechnologies/tyk/gateway are vulnerable to Directory Traversal via the handleAddOrUpdateApi function. This function is able to delete arbitrary JSON files on the disk where Tyk is running via the management API. The A... Read more
Affected Products : tyk- EPSS Score: %0.05
- Published: Mar. 15, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23356
This affects all versions of package kill-process-by-name. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the ... Read more
Affected Products : kill-process-by-name- EPSS Score: %1.43
- Published: Mar. 15, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23355
This affects all versions of package ps-kill. If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization... Read more
Affected Products : ps-kill- EPSS Score: %1.43
- Published: Mar. 15, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-23354
The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular... Read more
Affected Products : printf- EPSS Score: %0.40
- Published: Mar. 12, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-23353
This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function.... Read more
Affected Products : jspdf- EPSS Score: %1.35
- Published: Mar. 09, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23352
This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function.... Read more
Affected Products : madge- EPSS Score: %0.62
- Published: Mar. 09, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-23351
The package github.com/pires/go-proxyproto before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function. The reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a... Read more
- EPSS Score: %1.34
- Published: Mar. 08, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-23348
This affects the package portprocesses before 1.0.5. If (attacker-controlled) user input is given to the killProcess function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without inpu... Read more
Affected Products : portprocesses- EPSS Score: %1.08
- Published: Mar. 31, 2021
- Modified: Nov. 21, 2024
-
4.8
MEDIUMCVE-2021-23347
The package github.com/argoproj/argo-cd/cmd before 1.7.13, from 1.8.0 and before 1.8.6 are vulnerable to Cross-site Scripting (XSS) the SSO provider connected to Argo CD would have to send back a malicious error message containing JavaScript to the user.... Read more
- EPSS Score: %0.32
- Published: Mar. 03, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-23346
This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process.... Read more
Affected Products : html-parse-stringify- EPSS Score: %0.22
- Published: Mar. 04, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-23345
All versions of package github.com/thecodingmachine/gotenberg are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when the src attribute of an HTML element refers to an internal system file, such as <iframe src='file:///etc... Read more
Affected Products : gotenberg- EPSS Score: %0.21
- Published: Feb. 26, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23344
The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.... Read more
Affected Products : total.js- EPSS Score: %6.65
- Published: Mar. 04, 2021
- Modified: Nov. 21, 2024