Latest CVE Feed
-
9.8
CRITICALCVE-2021-23397
All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (merge) function. Maintainer suggests using @generates/merger instead.... Read more
Affected Products : merge- Published: Jul. 25, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23396
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.... Read more
Affected Products : lutils- Published: Jun. 17, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-23395
This affects all versions of package nedb. The library could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor.prototype payload.... Read more
Affected Products : nedb- Published: Jun. 15, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23394
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.... Read more
Affected Products : elfinder- Published: Jun. 13, 2021
- Modified: Nov. 21, 2024
-
5.8
MEDIUMCVE-2021-23393
This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vu... Read more
Affected Products : flask_unchained- Published: Jun. 11, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-23392
The package locutus before 2.0.15 are vulnerable to Regular Expression Denial of Service (ReDoS) via the gopher_parsedir function.... Read more
Affected Products : locutus- Published: Jun. 08, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-23391
This affects all versions of package calipso. It is possible for a malicious module to overwrite files on an arbitrary file system through the module install functionality.... Read more
Affected Products : calipso- Published: Jun. 07, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23390
The package total4 before 0.0.43 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.... Read more
Affected Products : total4- Published: Jul. 12, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23389
The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.... Read more
Affected Products : total.js- Published: Jul. 12, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-23388
The package forms before 1.2.1, from 1.3.0 and before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation.... Read more
Affected Products : forms- Published: Jun. 01, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-23387
The package trailing-slash before 2.0.1 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::createTr... Read more
Affected Products : trailing-slash- Published: May. 24, 2021
- Modified: Nov. 21, 2024
-
7.7
HIGHCVE-2021-23386
This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain n... Read more
Affected Products : dns-packet- Published: May. 20, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-23385
This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as ... Read more
Affected Products : flask-security- Published: Aug. 02, 2022
- Modified: Nov. 21, 2024
-
5.8
MEDIUMCVE-2021-23384
The package koa-remove-trailing-slashes before 2.0.2 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index... Read more
Affected Products : koa-remove-trailing-slashes- Published: May. 17, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23383
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.... Read more
- Published: May. 04, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-23382
The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).... Read more
Affected Products : postcss- Published: Apr. 26, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23381
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more
Affected Products : killing- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-23380
This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child... Read more
Affected Products : roar-pidusage- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23379
This affects all versions of package portkiller. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more
Affected Products : portkiller- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-23378
This affects all versions of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.... Read more
Affected Products : picotts- Published: Apr. 18, 2021
- Modified: Nov. 21, 2024