forked from cristianstaicu/SecBench.js
-
Notifications
You must be signed in to change notification settings - Fork 0
/
synk.csv
We can't make this file beautiful and searchable because it's too large.
3358 lines (3358 loc) · 569 KB
/
synk.csv
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Vulnerability,Package Name,Details Page,CVE,POC Available,Affected Version,Github Link
Remote Code Execution (RCE),ckeditor4,https://security.snyk.io/vuln/SNYK-JS-CKEDITOR4-2308230,CVE-2020-27193,False,<4.15.1 ,n/a
Arbitrary File Upload,plupload,https://security.snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909,CVE-2021-23562,False,<2.3.9 ,https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb
Remote Code Execution (RCE),@backstage/plugin-scaffolder-backend,https://security.snyk.io/vuln/SNYK-JS-BACKSTAGEPLUGINSCAFFOLDERBACKEND-2308016,,False,<0.15.14 ,https://github.com/backstage/backstage/commit/a096e4c4d78bab2d392af5b768eb4f87b9f4401c
Out-of-bounds Write,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1932551,CVE-2021-37981,False,>=12.0.0 <12.2.3 >=13.0.0 <13.6.1 >=14.0.0 <14.2.1 >=15.0.0 <15.3.1 ,https://github.com/electron/electron/commit/7313f7ebeb007c51c3de58ebf6f6726ae91fd7e3
Out-of-bounds Write,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1932549,CVE-2021-37984,False,>=12.0.0 <12.2.3 >=13.0.0 <13.6.1 >=14.0.0 <14.2.1 ,https://github.com/electron/electron/commit/841673791712dab54ee4b1106760734cf896c522
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1932547,CVE-2021-37987,False,>=12.0.0 <12.2.3 >=13.0.0 <13.6.1 >=14.0.0 <14.2.1 >=15.0.0 <15.3.1 ,https://github.com/electron/electron/commit/6cc7de5c13120b24f1f89c624189327b90009003
Improper Input Validation,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1932542,CVE-2021-37996,False,>=12.0.0 <12.2.3 >=13.0.0 <13.6.1 >=14.0.0 <14.2.1 >=15.0.0 <15.3.1 ,https://github.com/electron/electron/commit/e61cbbd13eac82e62443315fce7f57277b0e4779
Out-of-bound Write,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1932540,CVE-2021-38003,False,>=12.0.0 <12.2.3 >=13.0.0 <13.6.2 >=14.0.0 <14.2.1 ,https://github.com/electron/electron/commit/a3be71d6e7eca82558cf4a331aac476c1b2a4dff
Out-of-bounds Read,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1932545,CVE-2021-37992,False,>=12.0.0 <12.2.3 >=13.0.0 <13.6.1 >=14.0.0 <14.2.1 >=15.0.0 <15.3.1 ,https://github.com/electron/electron/commit/a83d1fe68a11b4236c1421221579739da33dc327
Cross-site Scripting (XSS),hexo,https://security.snyk.io/vuln/SNYK-JS-HEXO-1932976,CVE-2021-25987,False,<6.0.0 ,https://github.com/hexojs/hexo/pull/4743/commits/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200
Malicious Package,richdocuments,https://security.snyk.io/vuln/SNYK-JS-RICHDOCUMENTS-1932565,,False,* ,n/a
Directory Traversal,@backstage/plugin-scaffolder-backend,https://security.snyk.io/vuln/SNYK-JS-BACKSTAGEPLUGINSCAFFOLDERBACKEND-1932570,CVE-2021-43783,False,<0.15.14 ,https://github.com/backstage/backstage/commit/f9352ab606367cd9efc6ff048915c70ed3013b7f
Prototype Pollution,nodebb,https://security.snyk.io/vuln/SNYK-JS-NODEBB-1932612,CVE-2021-43787,False,* ,https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c
Improper Authentication,nodebb,https://security.snyk.io/vuln/SNYK-JS-NODEBB-1932613,CVE-2021-43786,False,* ,https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500
Remote Code Execution (RCE),@vue/cli,https://security.snyk.io/vuln/SNYK-JS-VUECLI-1731684,,False,<4.5.14 >=5.0.0-alpha.0 <5.0.0-beta.6 ,https://github.com/vuejs/vue-cli/commit/0266bbbfecbdb2f1709948057ffcf818de085fa3
XML External Entity (XXE) Injection,@theia/core,https://security.snyk.io/vuln/SNYK-JS-THEIACORE-1932561,CVE-2021-34436,False,>=0.1.1 <0.2.1 ,n/a
Out-of-bounds Write,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1932538,CVE-2021-37979,False,>=12.0.0 <12.2.3 >=13.0.0 <13.5.2 >=14.0.0 <14.2.0 ,https://github.com/electron/electron/commit/4b969e90bf46a32cdf131cd69aa731eb1c47ed19
Cross-site Scripting (XSS),@backstage/plugin-auth-backend,https://security.snyk.io/vuln/SNYK-JS-BACKSTAGEPLUGINAUTHBACKEND-1932526,CVE-2021-43776,False,<0.4.9 ,n/a
Cross-site Scripting (XSS),@joeattardi/emoji-button,https://security.snyk.io/vuln/SNYK-JS-JOEATTARDIEMOJIBUTTON-1932527,CVE-2021-43785,False,<4.6.2 ,https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1912075,CVE-2021-38002,False,>=14.0.0 <14.2.1 <13.6.2 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1912074,CVE-2021-37998,False,>=14.0.0 <14.2.1 >=13.0.0 <13.6.2 <12.2.3 ,n/a
Type Confusion,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1911949,CVE-2021-38001,True,>=14.0.0 <14.2.1 >=13.0.0 <13.6.2 <12.2.3 ,n/a
Heap-based Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1912084,CVE-2021-37979,False,>=14.0.0 <14.2.0 >=13.0.0 <13.5.2 <12.2.3 ,n/a
Cross-site Scripting (XSS),ag-grid-community,https://security.snyk.io/vuln/SNYK-JS-AGGRIDCOMMUNITY-1932011,,True,<25.2.0 ,n/a
Cross-site Scripting (XSS),@claviska/jquery-minicolors,https://security.snyk.io/vuln/SNYK-JS-CLAVISKAJQUERYMINICOLORS-1930824,,False,<2.3.6 ,https://github.com/claviska/jquery-minicolors/commit/ef134824a7f4110ada53ea6c173111a4fa2f48f3
Prototype Pollution,utils-copy,https://security.snyk.io/vuln/SNYK-JS-UTILSCOPY-1766956,,True,* ,n/a
Improper Certificate Validation,aws-crt,https://security.snyk.io/vuln/SNYK-JS-AWSCRT-1924900,CVE-2021-40829,False,<1.8.2 ,https://github.com/awslabs/aws-crt-java/commit/790e657e3724e1487a75cd2dfb46797e7671b43f
Improper Certificate Validation,aws-crt,https://security.snyk.io/vuln/SNYK-JS-AWSCRT-1924913,CVE-2021-40831,False,<1.9.0 ,https://github.com/awslabs/aws-crt-java/commit/790e657e3724e1487a75cd2dfb46797e7671b43f
Improper Certificate Validation,aws-crt,https://security.snyk.io/vuln/SNYK-JS-AWSCRT-1924945,CVE-2021-40828,False,<1.7.1 ,https://github.com/awslabs/aws-crt-java/commit/b6f353d8a63c5e42e24153fe45b139400c788b58
Improper Certificate Validation,aws-crt,https://security.snyk.io/vuln/SNYK-JS-AWSCRT-1924999,CVE-2021-40830,False,<1.8.2 ,https://github.com/awslabs/aws-crt-java/commit/790e657e3724e1487a75cd2dfb46797e7671b43f
Prototype Pollution,algoliasearch-helper,https://security.snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421,CVE-2021-23433,True,<3.6.2 ,https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd
Cross-site Scripting (XSS),ckeditor4,https://security.snyk.io/vuln/SNYK-JS-CKEDITOR4-1922735,CVE-2021-41164,False,<4.17.0 ,n/a
Cross-site Scripting (XSS),ckeditor4,https://security.snyk.io/vuln/SNYK-JS-CKEDITOR4-1922733,CVE-2021-41165,False,<4.17.0 ,n/a
Server-side Request Forgery (SSRF),ssrf-agent,https://security.snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362,CVE-2021-23718,True,<1.0.5 ,n/a
Cross-site Scripting (XSS),@factor/plugin-forum,https://security.snyk.io/vuln/SNYK-JS-FACTORPLUGINFORUM-1921263,CVE-2021-25984,False,>=1.3.3 ,n/a
Authentication Bypass,@factor/cli,https://security.snyk.io/vuln/SNYK-JS-FACTORCLI-1921262,CVE-2021-25985,False,>=1.1.0 <3.0.1 ,n/a
Improper Verification of Source of a Communication Channel,@theia/plugin-ext,https://security.snyk.io/vuln/SNYK-JS-THEIAPLUGINEXT-1921089,CVE-2021-41038,False,<1.18.0 ,https://github.com/eclipse-theia/theia/commit/4ba87c8a4e7949e6b053e381372f8c0f6d7ef195
Regular Expression Denial of Service (ReDoS),terminal-kit,https://security.snyk.io/vuln/SNYK-JS-TERMINALKIT-1734787,,True,<2.1.8 ,https://github.com/cronvel/terminal-kit/commit/a2e446cc3927b559d0281683feb9b821e83b758c
Numeric Errors,@openzeppelin/contracts-upgradeable,https://security.snyk.io/vuln/SNYK-JS-OPENZEPPELINCONTRACTSUPGRADEABLE-1921094,,False,>=4.2.0 <4.3.3 ,https://github.com/OpenZeppelin/openzeppelin-contracts/commit/70138680cf24b5af1cc345e55ea36dbaf26042a3
Numeric Errors,@openzeppelin/contracts,https://security.snyk.io/vuln/SNYK-JS-OPENZEPPELINCONTRACTS-1921095,,False,>=4.2.0 <4.3.3 ,https://github.com/OpenZeppelin/openzeppelin-contracts/commit/70138680cf24b5af1cc345e55ea36dbaf26042a3
Cross-site Scripting (XSS),@factor/plugin-forum,https://security.snyk.io/vuln/SNYK-JS-FACTORPLUGINFORUM-1921260,CVE-2021-25983,False,>=1.3.8 ,n/a
Cross-site Scripting (XSS),@factor/plugin-forum,https://security.snyk.io/vuln/SNYK-JS-FACTORPLUGINFORUM-1921261,CVE-2021-25982,False,>=1.3.5 ,n/a
Improper Initialization,@openzeppelin/contracts,https://security.snyk.io/vuln/SNYK-JS-OPENZEPPELINCONTRACTS-1920946,CVE-2021-41264,False,>=4.1.0 <4.3.2 ,https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592
Improper Initialization,@openzeppelin/contracts-upgradeable,https://security.snyk.io/vuln/SNYK-JS-OPENZEPPELINCONTRACTSUPGRADEABLE-1920947,CVE-2021-41264,False,>=4.1.0 <4.3.2 ,https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592
Prototype Pollution,json-schema,https://security.snyk.io/vuln/SNYK-JS-JSONSCHEMA-1920922,CVE-2021-3918,False,<0.4.0 ,https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741
Malicious Package,@xvideos/alerts,https://security.snyk.io/vuln/SNYK-JS-XVIDEOSALERTS-1920929,,False,* ,n/a
Malicious Package,@pornhub/alerts,https://security.snyk.io/vuln/SNYK-JS-PORNHUBALERTS-1920927,,False,* ,n/a
Insufficient Session Expiration,@cyyynthia/tokenize,https://security.snyk.io/vuln/SNYK-JS-CYYYNTHIATOKENIZE-1915381,,False,<1.1.3 ,https://github.com/cyyynthia/tokenize/pull/1/commits/3862864a5cf4cae2eda9de0a5a5e5688170be9ca
Regular Expression Denial of Service (ReDoS),natural,https://security.snyk.io/vuln/SNYK-JS-NATURAL-1915418,,False,<5.1.11 ,https://github.com/NaturalNode/natural/commit/90e85afb20e76560bc555d83abad3bc919388381
Cross-site Scripting (XSS),uswds,https://security.snyk.io/vuln/SNYK-JS-USWDS-1656800,,False,<2.12.2 ,https://github.com/uswds/uswds/commit/b79048c772638600957f93105c9651a8f57a70d3
Regular Expression Denial of Service (ReDoS),uglify-js,https://security.snyk.io/vuln/SNYK-JS-UGLIFYJS-1727251,,False,<3.14.3 ,https://github.com/mishoo/UglifyJS/commit/157521066fc43cff2feab7ffc1ecea603617606b
Improper Verification of Cryptographic Signature,starkbank-ecdsa,https://security.snyk.io/vuln/SNYK-JS-STARKBANKECDSA-1913038,,False,<1.1.3 ,https://github.com/starkbank/ecdsa-dotnet/commit/d78a6c0d80dbf55229f768faa967f14519b9dddd
Cross-site Scripting (XSS),apollo-server,https://security.snyk.io/vuln/SNYK-JS-APOLLOSERVER-1912891,CVE-2021-41249,False,<2.25.3 >=3.0.0 <3.4.1 ,n/a
Cross-site Scripting (XSS),graphql-playground-react,https://security.snyk.io/vuln/SNYK-JS-GRAPHQLPLAYGROUNDREACT-1913042,CVE-2021-41249,False,<1.7.28 ,n/a
Cross-site Scripting (XSS),apostrophe,https://security.snyk.io/vuln/SNYK-JS-APOSTROPHE-1912880,CVE-2021-25978,False,>=2.63.0 <3.4.0 ,https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59
Cross-site Scripting (XSS),gethue,https://security.snyk.io/vuln/SNYK-JS-GETHUE-1912878,CVE-2021-32481,False,<4.10.1 ,https://github.com/cloudera/hue/commit/87defd31d7ec5c7552e414649aa442f75b5a1230
Insufficient Session Expiration,apostrophe,https://security.snyk.io/vuln/SNYK-JS-APOSTROPHE-1912882,CVE-2021-25979,False,>=2.63.0 <3.4.0 ,https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c
Information Exposure,@sap-cloud-sdk/core,https://security.snyk.io/vuln/SNYK-JS-SAPCLOUDSDKCORE-1912613,CVE-2021-41251,False,<1.52.0 ,n/a
Directory Traversal,nodebb,https://security.snyk.io/vuln/SNYK-JS-NODEBB-1912652,CVE-2021-43788,False,* ,https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f
Cross-site Scripting (XSS),graphiql,https://security.snyk.io/vuln/SNYK-JS-GRAPHIQL-1912088,CVE-2021-41248,False,>=0.5.0 <1.4.7 ,https://github.com/graphql/graphiql/commit/cb237eeeaf7333c4954c752122261db7520f7bf4
Information Exposure,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1912085,CVE-2021-37976,False,>=14.0.0 <14.2.0 >=13.0.0 <13.5.2 <12.2.2 ,n/a
Heap-based Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1912082,CVE-2021-37978,False,>=14.0.0 <14.2.0 <13.5.2 ,n/a
Arbitrary Code Execution,obsidian-dataview,https://security.snyk.io/vuln/SNYK-JS-OBSIDIANDATAVIEW-1912069,CVE-2021-42057,True,* ,n/a
Malicious Package,coa,https://security.snyk.io/vuln/SNYK-JS-COA-1911118,,False,>2.0.2 ,n/a
Malicious Package,rc,https://security.snyk.io/vuln/SNYK-JS-RC-1911120,,False,>1.2.8 ,n/a
Cross-site Scripting (XSS),@grafana/data,https://security.snyk.io/vuln/SNYK-JS-GRAFANADATA-1910932,CVE-2021-41174,False,<8.2.3 ,https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912
Cross-site Scripting (XSS),nbdime-jupyterlab,https://security.snyk.io/vuln/SNYK-JS-NBDIMEJUPYTERLAB-1910929,CVE-2021-41134,False,<1.0.1 >=2.0.0 <2.1.1 ,https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea
Cross-site Scripting (XSS),nbdime,https://security.snyk.io/vuln/SNYK-JS-NBDIME-1910928,CVE-2021-41134,False,<5.0.2 >=6.0.0 <6.1.2 ,https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1910985,CVE-2021-37975,False,>=14.0.0 <14.1.1 >=13.0.0 <13.5.2 <12.2.2 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1910987,CVE-2021-37970,False,>=14.0.0 <14.1.1 >=13.0.0 <13.5.2 <12.2.2 ,n/a
Exposure of Resource to Wrong Sphere,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1910988,CVE-2021-37968,False,>=14.0.0 <14.1.1 >=13.0.0 <13.5.2 <12.2.2 ,n/a
Improper Access Control,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1910991,CVE-2021-37967,False,>=14.0.0 <14.1.1 >=13.0.0 <13.5.2 <12.2.2 ,n/a
Cross-site Scripting (XSS),tinymce,https://security.snyk.io/vuln/SNYK-JS-TINYMCE-1910225,,False,<5.10.0 ,https://github.com/tinymce/tinymce/commit/4b3b0ddfe915a266432acfe23c3653c98b60edfb#diff-5b33cb2dbd28b63194e7b666bbcf9b6367a177fe3b88898d746bacbb5049bfe7
Cross-site Scripting (XSS),tempura,https://security.snyk.io/vuln/SNYK-JS-TEMPURA-1569633,CVE-2021-23784,True,<0.4.0 ,https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b
Prototype Pollution,jsonpointer,https://security.snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288,CVE-2021-23807,True,<5.0.0 ,https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4
Prototype Pollution,json-ptr,https://security.snyk.io/vuln/SNYK-JS-JSONPTR-1577291,CVE-2021-23509,True,<3.0.0 ,https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca
Prototype Pollution,json-pointer,https://security.snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287,CVE-2021-23820,True,* ,n/a
Prototype Pollution,dotty,https://security.snyk.io/vuln/SNYK-JS-DOTTY-1577292,CVE-2021-23624,True,<0.1.2 ,https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7
Cross-site Scripting (XSS),bootstrap-table,https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597,CVE-2021-23472,True,<1.19.1 ,https://github.com/wenzhixin/bootstrap-table/commit/8a46a228b3ffb0b5f4123d46830bd216b9c51bf1
Prototype Pollution,@brikcss/merge,https://security.snyk.io/vuln/SNYK-JS-BRIKCSSMERGE-1727594,,True,* ,n/a
Sandbox Bypass,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1731315,CVE-2021-37980,True,<12.2.2 >=13.0.0 <13.5.2 >=14.0.0 <14.2.0 ,n/a
Arbitrary Code Execution,docker-cli-js,https://security.snyk.io/vuln/SNYK-JS-DOCKERCLIJS-1568516,CVE-2021-23732,True,* ,n/a
Remote Code Execution (RCE),aaptjs,https://security.snyk.io/vuln/SNYK-JS-AAPTJS-1769273,CVE-2020-36381,False,* ,n/a
Access Control Bypass,portainer,https://security.snyk.io/vuln/SNYK-JS-PORTAINER-1769215,CVE-2021-41874,False,* ,n/a
Cross-site Scripting (XSS),froala-editor,https://security.snyk.io/vuln/SNYK-JS-FROALAEDITOR-1768466,CVE-2020-22864,False,* ,n/a
Regular Expression Denial of Service (ReDoS),ramda,https://security.snyk.io/vuln/SNYK-JS-RAMDA-1582370,,False,<0.27.2 ,https://github.com/ramda/ramda/commit/37af6ae2ca8b94656996dd27fb0a1f208d69134e
Malicious Package,noblox.js-proxy,https://security.snyk.io/vuln/SNYK-JS-NOBLOXJSPROXY-1767970,,False,* ,n/a
Malicious Package,noblox.js-proxies,https://security.snyk.io/vuln/SNYK-JS-NOBLOXJSPROXIES-1767971,,False,* ,n/a
Cross-site Scripting (XSS),jquery-ui,https://security.snyk.io/vuln/SNYK-JS-JQUERYUI-1767175,CVE-2021-41184,False,<1.13.0 ,https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280
Cross-site Scripting (XSS),jquery-ui,https://security.snyk.io/vuln/SNYK-JS-JQUERYUI-1767167,CVE-2021-41182,False,<1.13.0 ,https://github.com/jquery/jquery-ui/commit/32850869d308d5e7c9bf3e3b4d483ea886d373ce
Cross-site Scripting (XSS),jquery-ui,https://security.snyk.io/vuln/SNYK-JS-JQUERYUI-1767767,CVE-2021-41183,False,<1.13.0 ,n/a
Cross-site Scripting (XSS),tinymce,https://security.snyk.io/vuln/SNYK-JS-TINYMCE-1766967,,False,<5.9.0 ,https://github.com/tinymce/tinymce/commit/6cb9c736550cf973d1b8f81cf509c7961167c229
Regular Expression Denial of Service (ReDoS),conventional-commits-parser,https://security.snyk.io/vuln/SNYK-JS-CONVENTIONALCOMMITSPARSER-1766960,,False,<3.2.3 ,https://github.com/conventional-changelog/conventional-changelog/commit/c696fa35f93e0ee13728d6cf1221587ac6386311
Cross-site Scripting (XSS),pekeupload,https://security.snyk.io/vuln/SNYK-JS-PEKEUPLOAD-1584360,CVE-2021-23673,True,* ,n/a
Embedded Malicious Code,ua-parser-js,https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-1766952,,False,>=1.0.0 <1.0.1 >=0.8.0 <0.8.1 >=0.7.29 <0.7.30 ,n/a
Remote Code Execution (RCE),shell-quote,https://security.snyk.io/vuln/SNYK-JS-SHELLQUOTE-1766506,CVE-2021-42740,False,<1.7.3 ,https://github.com/substack/node-shell-quote/commit/5799416ed454aa4ec9afafc895b4e31760ea1abe
Uncontrolled Resource Consumption,modern-async,https://security.snyk.io/vuln/SNYK-JS-MODERNASYNC-1765269,CVE-2021-41167,False,<1.0.4 ,https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436
Malicious Package,klow,https://security.snyk.io/vuln/SNYK-JS-KLOW-1765659,,False,* ,n/a
Malicious Package,klown,https://security.snyk.io/vuln/SNYK-JS-KLOWN-1765660,,False,* ,n/a
Malicious Package,okhsa,https://security.snyk.io/vuln/SNYK-JS-OKHSA-1765658,,False,* ,n/a
Cross-site Request Forgery (CSRF),kindeditor,https://security.snyk.io/vuln/SNYK-JS-KINDEDITOR-1759449,CVE-2021-42228,False,* ,n/a
Regular Expression Denial of Service (ReDoS),xss,https://security.snyk.io/vuln/SNYK-JS-XSS-1584355,,False,<1.0.10 ,https://github.com/leizongmin/js-xss/commit/699acdea7d6b2910bab6f9e95992dd9e99bef1de
Insecure Randomness,otp-generator,https://security.snyk.io/vuln/SNYK-JS-OTPGENERATOR-1655480,CVE-2021-23451,False,<3.0.0 ,https://github.com/Maheshkumar-Kakade/otp-generator/commit/b27de1ce439ae7f533cec26677e9698671275b70
Remote Code Execution (RCE),git,https://security.snyk.io/vuln/SNYK-JS-GIT-1568518,CVE-2021-23632,True,* ,n/a
Prototype Pollution,x-assign,https://security.snyk.io/vuln/SNYK-JS-XASSIGN-1759314,CVE-2021-23452,True,* ,n/a
Directory Traversal,@backstage/plugin-scaffolder-backend,https://security.snyk.io/vuln/SNYK-JS-BACKSTAGEPLUGINSCAFFOLDERBACKEND-1759309,CVE-2021-41151,False,>=0.9.4 <0.15.9 ,https://github.com/backstage/backstage/commit/5ea950075d6bce2b44fa18948b5b2113a1a4298c
Cross-site Scripting (XSS),kindeditor,https://security.snyk.io/vuln/SNYK-JS-KINDEDITOR-1734691,CVE-2021-42227,False,* ,n/a
Sandbox Bypass,vm2,https://security.snyk.io/vuln/SNYK-JS-VM2-1585918,CVE-2021-23449,True,<3.9.4 ,https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886
Denial of Service (DoS),uppy,https://security.snyk.io/vuln/SNYK-JS-UPPY-1734764,,False,<1.26.1 ,https://github.com/transloadit/uppy/commit/65297810bb5a9ac76172eddfedf89c93b586907c
Improper Input Validation,class-validator,https://security.snyk.io/vuln/SNYK-JS-CLASSVALIDATOR-1730566,CVE-2019-18413,True,* ,n/a
Open Redirect,fastify-static,https://security.snyk.io/vuln/SNYK-JS-FASTIFYSTATIC-1730571,CVE-2021-22964,False,>=4.2.4 <4.4.1 ,https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4
Information Exposure,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1730574,CVE-2021-39184,False,>=10.1.0 <11.5.0 >=12.0.0-beta.1 <12.1.0 >=13.0.0-beta.2 <13.3.0 >=14.0.0-beta.1 <14.0.0 >=15.0.0-alpha.1 <15.0.0-alpha.10 ,https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f
Directory Traversal,@redocly/openapi-cli,https://security.snyk.io/vuln/SNYK-JS-REDOCLYOPENAPICLI-1730576,,False,<1.0.0-beta.59 ,https://github.com/Redocly/openapi-cli/commit/69a1580bc732128a20c62d6150801f4cc1f8c755
HTTP Request Smuggling,llhttp,https://security.snyk.io/vuln/SNYK-JS-LLHTTP-1734682,CVE-2021-22960,False,* ,https://github.com/nodejs/node/commit/21a2e554e3eaa325abbdb28f366928d0ccc0a0f0
HTTP Request Smuggling,llhttp,https://security.snyk.io/vuln/SNYK-JS-LLHTTP-1734686,CVE-2021-22959,False,* ,https://github.com/nodejs/node/commit/21a2e554e3eaa325abbdb28f366928d0ccc0a0f0
Inadequate Encryption Strength,keypair,https://security.snyk.io/vuln/SNYK-JS-KEYPAIR-1730326,CVE-2021-41117,False,<1.0.4 ,https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18
Regular Expression Denial of Service (ReDoS),prompts,https://security.snyk.io/vuln/SNYK-JS-PROMPTS-1729737,CVE-2021-3868,True,<2.4.2 ,n/a
Prototype Pollution,config-handler,https://security.snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947,CVE-2021-23448,False,* ,n/a
Cross-site Scripting (XSS),teddy,https://security.snyk.io/vuln/SNYK-JS-TEDDY-1579557,CVE-2021-23447,True,<0.5.9 ,n/a
Open Redirect,fastify-static,https://security.snyk.io/vuln/SNYK-JS-FASTIFYSTATIC-1728398,CVE-2021-22963,False,<4.2.4 ,https://github.com/fastify/fastify-static/commit/861e0e9b77cf83d0bd76c6cddac0149d0a769bdb
Improper Authentication,parse-server,https://security.snyk.io/vuln/SNYK-JS-PARSESERVER-1727337,CVE-2021-41109,False,<4.10.4 ,https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559
Improper Input Validation,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1727344,CVE-2021-37973,False,>=13.0.0 <13.5.1 <12.2.1 ,n/a
Improper Input Validation,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1727342,CVE-2021-37960,False,>=14.0.0 <14.1.0 >=13.0.0 <13.5.1 <12.2.1 ,n/a
Out-of-Bounds,hermes-engine,https://security.snyk.io/vuln/SNYK-JS-HERMESENGINE-1727253,CVE-2020-1915,False,<0.8.0 ,n/a
Cross-site Scripting (XSS),kindeditor,https://security.snyk.io/vuln/SNYK-JS-KINDEDITOR-1726913,CVE-2021-30086,False,* ,n/a
Cross-site Scripting (XSS),kindeditor,https://security.snyk.io/vuln/SNYK-JS-KINDEDITOR-1726916,CVE-2021-37267,False,* ,n/a
Regular Expression Denial of Service (ReDoS),handsontable,https://security.snyk.io/vuln/SNYK-JS-HANDSONTABLE-1726770,CVE-2021-23446,False,<10.0.0 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1656743,CVE-2021-30633,False,>=13.0.0 <13.5.0 <12.2.0 ,n/a
Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1656742,CVE-2021-30628,False,>=13.0.0 <13.5.0 <12.2.0 ,n/a
Out-of-Bounds,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1656745,CVE-2021-30626,False,>=13.0.0 <13.5.0 <12.2.0 ,n/a
Access Restriction Bypass,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1656746,CVE-2021-30630,False,>=13.0.0 <13.5.0 <12.2.0 ,n/a
Type Confusion,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1656752,CVE-2021-30631,False,>=13.0.0 <13.5.0 <12.2.0 ,n/a
Type Confusion,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1586050,CVE-2021-30627,False,>=13.0.0 <13.5.0 <12.2.0 ,n/a
Out-of-Bounds,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1585619,CVE-2021-30632,True,>=13.0.0 <13.5.0 <12.1.2 ,n/a
Regular Expression Denial of Service (ReDoS),jsoneditor,https://security.snyk.io/vuln/SNYK-JS-JSONEDITOR-1726760,CVE-2021-3822,False,<9.5.6 ,https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e
Regular Expression Denial of Service (ReDoS),i,https://security.snyk.io/vuln/SNYK-JS-I-1726768,CVE-2021-3820,False,<0.3.7 ,https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b
Cross-site Scripting (XSS),datatables.net,https://security.snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544,CVE-2021-23445,True,<1.11.3 ,https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b
Access Restriction Bypass,ghost,https://security.snyk.io/vuln/SNYK-JS-GHOST-1658293,,False,>=4.0.0 <4.15.1 >=3.18.0 <3.42.6 ,https://github.com/TryGhost/Ghost/commit/b6be89a44f19ab96be9768da9c2dec57deb6596b
Code Injection,@asyncapi/modelina,https://security.snyk.io/vuln/SNYK-JS-ASYNCAPIMODELINA-1657554,,True,* ,n/a
Command Injection,ssh2,https://security.snyk.io/vuln/SNYK-JS-SSH2-1656673,CVE-2020-26301,False,<1.0.0 ,https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21
Command Injection,ghost,https://security.snyk.io/vuln/SNYK-JS-GHOST-1656670,,False,<4.15.0 ,https://github.com/TryGhost/Ghost/commit/93e4b2eafd18bc8e4c17924e0824e73617e7940c
Buffer Overflow,bento4,https://security.snyk.io/vuln/SNYK-JS-BENTO4-1656628,CVE-2021-32265,False,* ,n/a
Prototype Pollution,jointjs,https://security.snyk.io/vuln/SNYK-JS-JOINTJS-1579578,CVE-2021-23444,True,<3.4.2 ,https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8
Cross-site Scripting (XSS),edge.js,https://security.snyk.io/vuln/SNYK-JS-EDGEJS-1579556,CVE-2021-23443,True,<5.3.2 ,https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21
Prototype Pollution,zrender,https://security.snyk.io/vuln/SNYK-JS-ZRENDER-1586253,CVE-2021-39227,False,<5.2.1 ,n/a
Cross-site Scripting (XSS),materialize-css,https://security.snyk.io/vuln/SNYK-JS-MATERIALIZECSS-1586258,CVE-2019-11004,True,* ,n/a
Regular Expression Denial of Service (ReDoS),ethers,https://security.snyk.io/vuln/SNYK-JS-ETHERS-1586048,,True,>=5.2.0 <5.4.7 ,https://github.com/ethers-io/ethers.js/commit/32a6b2a362815eb85ce3f3abad5adf92f2b80e10
Regular Expression Denial of Service (ReDoS),code-server,https://security.snyk.io/vuln/SNYK-JS-CODESERVER-1586034,CVE-2021-3810,False,<3.12.0 ,https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5
Regular Expression Denial of Service (ReDoS),nth-check,https://security.snyk.io/vuln/SNYK-JS-NTHCHECK-1586032,CVE-2021-3803,False,<2.0.1 ,https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726
Man-in-the-Middle (MitM),matrix-js-sdk,https://security.snyk.io/vuln/SNYK-JS-MATRIXJSSDK-1586045,CVE-2021-40823,False,<12.4.1 ,https://github.com/matrix-org/matrix-js-sdk/commit/894c24880da0e1cc81818f51c0db80e3c9fb2be9
Regular Expression Denial of Service (ReDoS),stylelint,https://security.snyk.io/vuln/SNYK-JS-STYLELINT-1585622,,False,<14.0.0 ,https://github.com/stylelint/stylelint/commit/92e506820d13ad48b78d742eeb7328b3c33b2e4f
Regular Expression Denial of Service (ReDoS),semver-regex,https://security.snyk.io/vuln/SNYK-JS-SEMVERREGEX-1585624,CVE-2021-3795,True,<3.1.3 ,https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7
Improper Input Validation,@openzeppelin/contracts-upgradeable,https://security.snyk.io/vuln/SNYK-JS-OPENZEPPELINCONTRACTSUPGRADEABLE-1585626,,False,>=4.1.0 <4.3.2 ,n/a
Improper Input Validation,@openzeppelin/contracts,https://security.snyk.io/vuln/SNYK-JS-OPENZEPPELINCONTRACTS-1585627,,False,>=4.1.0 <4.3.2 ,n/a
Regular Expression Denial of Service (ReDoS),taro,https://security.snyk.io/vuln/SNYK-JS-TARO-1585633,CVE-2021-3804,True,* ,https://github.com/NervJS/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5
Prototype Pollution,@cookiex/deep,https://security.snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793,CVE-2021-23442,True,* ,https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88
Prototype Pollution,object-path,https://security.snyk.io/vuln/SNYK-JS-OBJECTPATH-1585658,CVE-2021-3805,False,>=0.11.0 <0.11.8 ,https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884
Regular Expression Denial of Service (ReDoS),@vuelidate/validators,https://security.snyk.io/vuln/SNYK-JS-VUELIDATEVALIDATORS-1585154,CVE-2021-3794,True,<2.0.0-alpha.22 ,https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d
Regular Expression Denial of Service (ReDoS),tmpl,https://security.snyk.io/vuln/SNYK-JS-TMPL-1583443,CVE-2021-3777,True,<1.0.5 ,https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6
Regular Expression Denial of Service (ReDoS),prismjs,https://security.snyk.io/vuln/SNYK-JS-PRISMJS-1585202,CVE-2021-3801,True,<1.25.0 ,https://github.com/PrismJS/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9
Malicious Package,code-oss-dev,https://security.snyk.io/vuln/SNYK-JS-CODEOSSDEV-1585137,,False,* ,n/a
Malicious Package,accessibility-insights-web,https://security.snyk.io/vuln/SNYK-JS-ACCESSIBILITYINSIGHTSWEB-1585215,,False,* ,n/a
Information Exposure,matrix-js-sdk,https://security.snyk.io/vuln/SNYK-JS-MATRIXJSSDK-1584628,CVE-2021-40823,False,<12.4.1 ,https://github.com/matrix-org/matrix-js-sdk/commit/894c24880da0e1cc81818f51c0db80e3c9fb2be9
Regular Expression Denial of Service (ReDoS),semver-regex,https://security.snyk.io/vuln/SNYK-JS-SEMVERREGEX-1584358,,False,>=4.0.0 <4.0.1 <3.1.3 ,https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7
Regular Expression Denial of Service (ReDoS),colors-cli,https://security.snyk.io/vuln/SNYK-JS-COLORSCLI-1584218,,True,<1.0.28 ,https://github.com/jaywcjlove/colors-cli/commit/78ee15ba9111ddee1cc0640ccd79369525bd57b8
Regular Expression Denial of Service (ReDoS),ansi-regex,https://security.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908,CVE-2021-3807,True,>=6.0.0 <6.0.1 >2.1.1 <5.0.1 ,https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
Prototype Pollution,body-parser-xml,https://security.snyk.io/vuln/SNYK-JS-BODYPARSERXML-1584211,CVE-2021-3666,True,<2.0.3 ,n/a
Prototype Pollution,set-value,https://security.snyk.io/vuln/SNYK-JS-SETVALUE-1540541,CVE-2021-23440,True,>=3.0.0 <4.0.1 <2.0.1 ,https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452
Prototype Pollution,@viking04/merge,https://security.snyk.io/vuln/SNYK-JS-VIKING04MERGE-1584118,CVE-2021-3645,False,<1.0.2 ,https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6
Unsafe Dependency Resolution,parse-server,https://security.snyk.io/vuln/SNYK-JS-PARSESERVER-1583451,,False,>=4.6.0 <4.10.0 >=4.0.3 <4.1.0 >=4.0.0-beta1 <4.0.2 ,n/a
Cross-site Scripting (XSS),remark-html,https://security.snyk.io/vuln/SNYK-JS-REMARKHTML-1583433,CVE-2021-39199,False,>=14.0.0 <14.0.1 <13.0.2 ,https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1
Command Injection,rebber,https://security.snyk.io/vuln/SNYK-JS-REBBER-1583439,,True,<5.2.1 ,https://github.com/zestedesavoir/zmarkdown/commit/db3fd70576028364e7168b3aec8600cf80b7a111
Directory Traversal,gun,https://security.snyk.io/vuln/SNYK-JS-GUN-1583448,,True,<0.2019.416 ,n/a
Prototype Pollution,objection,https://security.snyk.io/vuln/SNYK-JS-OBJECTION-1582910,CVE-2021-3766,True,<3.0.0-alpha.5 ,https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6
Cross-site Scripting (XSS),file-upload-with-preview,https://security.snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492,CVE-2021-23439,False,<4.2.0 ,https://github.com/johndatserakis/file-upload-with-preview/pull/40/files?file-filters%5B%5D=.js&hide-deleted-files=true#diff-fe47b243de17419c0daa22cd785cd754baed60cf3679d3da1d6fe006f9f4a7f0R174
Arbitrary Code Execution,@theia/mini-browser,https://security.snyk.io/vuln/SNYK-JS-THEIAMINIBROWSER-1582379,CVE-2021-34435,False,>=0.3.9 <1.9.0 ,https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5
Denial of Service (DoS),parse-server,https://security.snyk.io/vuln/SNYK-JS-PARSESERVER-1582380,CVE-2021-39187,False,<4.10.3 ,https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec
Directory Traversal,atlasboard,https://security.snyk.io/vuln/SNYK-JS-ATLASBOARD-1582381,CVE-2021-39109,False,<1.1.9 ,n/a
Prototype Pollution,mpath,https://security.snyk.io/vuln/SNYK-JS-MPATH-1577289,CVE-2021-23438,True,<0.8.4 ,https://github.com/aheckmann/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc
Improper Control of Resources,detect-character-encoding,https://security.snyk.io/vuln/SNYK-JS-DETECTCHARACTERENCODING-1579267,CVE-2021-39176,True,<0.3.1 ,https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588
Regular Expression Denial of Service (ReDoS),axios,https://security.snyk.io/vuln/SNYK-JS-AXIOS-1579269,CVE-2021-3749,True,<0.21.3 ,https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929
Prototype Pollution,immer,https://security.snyk.io/vuln/SNYK-JS-IMMER-1540542,CVE-2021-23436,True,<9.0.6 ,https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237
Arbitrary File Write,tar,https://security.snyk.io/vuln/SNYK-JS-TAR-1579147,CVE-2021-37701,False,>=6.0.0 <6.1.7 >=5.0.0 <5.0.8 <4.4.16 ,https://github.com/npm/node-tar/commit/53602669f58ddbeb3294d7196b3320aaaed22728
Arbitrary File Write,tar,https://security.snyk.io/vuln/SNYK-JS-TAR-1579152,CVE-2021-37712,False,>=6.0.0 <6.1.9 >=5.0.0 <5.0.10 <4.4.18 ,https://github.com/npm/node-tar/commit/b6162c7fafe797f856564ef37f4b82747f051455
Arbitrary File Write,tar,https://security.snyk.io/vuln/SNYK-JS-TAR-1579155,CVE-2021-37713,False,>=6.0.0 <6.1.9 >=5.0.0 <5.0.10 <4.4.18 ,https://github.com/npm/node-tar/commit/875a37e3ec031186fc6599f6807341f56c584598
Arbitrary File Write,@npmcli/arborist,https://security.snyk.io/vuln/SNYK-JS-NPMCLIARBORIST-1579165,CVE-2021-39134,False,<2.8.2 ,https://github.com/npm/arborist/commit/041a3c710c2a6fbf644fc2c1119f7f0f440ffadd
Arbitrary File Write,@npmcli/arborist,https://security.snyk.io/vuln/SNYK-JS-NPMCLIARBORIST-1579181,CVE-2021-39135,False,<2.8.2 ,https://github.com/npm/arborist/commit/f2b0ceebfe94123f162c3652af46f9c4c473cc36
Cross-site Scripting (XSS),next,https://security.snyk.io/vuln/SNYK-JS-NEXT-1577139,CVE-2021-39178,False,>=10.0.0 <11.1.1 ,https://github.com/vercel/next.js/commit/7afc97c5744b38bdf36aa7f87625f438224688aa
Denial of Service (DoS),passport-saml,https://security.snyk.io/vuln/SNYK-JS-PASSPORTSAML-1570714,CVE-2021-39171,False,<3.1.0 ,n/a
Prototype Pollution,object-path,https://security.snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453,CVE-2021-23434,True,<0.11.6 ,https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb
Privilege Escalation,@openzeppelin/contracts,https://security.snyk.io/vuln/SNYK-JS-OPENZEPPELINCONTRACTS-1570170,CVE-2021-39167,False,>=4.0.0-beta.0 <4.3.1 <3.4.2 ,https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5
Privilege Escalation,@openzeppelin/contracts-upgradeable,https://security.snyk.io/vuln/SNYK-JS-OPENZEPPELINCONTRACTSUPGRADEABLE-1570169,CVE-2021-39168,False,>=4.0.0-beta.0 <4.3.1 <3.4.2 ,https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5
Denial of Service (DoS),detect-character-encoding,https://security.snyk.io/vuln/SNYK-JS-DETECTCHARACTERENCODING-1569483,CVE-2021-39157,False,<0.7.0 ,https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a
Denial of Service (DoS),ced,https://security.snyk.io/vuln/SNYK-JS-CED-1569192,CVE-2021-39131,True,<1.0.0 ,https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3
Directory Traversal,startserver,https://security.snyk.io/vuln/SNYK-JS-STARTSERVER-1296388,CVE-2021-23430,True,* ,n/a
Cross-site Request Forgery (CSRF),joplin,https://security.snyk.io/vuln/SNYK-JS-JOPLIN-1325537,CVE-2021-23431,False,<2.3.2 ,https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e
Denial of Service (DoS),transpile,https://security.snyk.io/vuln/SNYK-JS-TRANSPILE-1290774,CVE-2021-23429,True,* ,n/a
Prototype Pollution,mootools,https://security.snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536,CVE-2021-23432,True,* ,n/a
Remote Code Execution (RCE),pac-resolver,https://security.snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857,CVE-2021-23406,True,<5.0.0 ,https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5
Information Exposure,parse-server,https://security.snyk.io/vuln/SNYK-JS-PARSESERVER-1567777,CVE-2021-39138,False,<4.5.1 ,https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db
Prototype Pollution,proto,https://security.snyk.io/vuln/SNYK-JS-PROTO-1316301,CVE-2021-23426,True,* ,n/a
Command Injection,@diez/generation,https://security.snyk.io/vuln/SNYK-JS-DIEZGENERATION-1566823,CVE-2021-32830,True,* ,n/a
Regular Expression Denial of Service (ReDoS),string-kit,https://security.snyk.io/vuln/SNYK-JS-STRINGKIT-1567201,,False,<0.12.8 ,https://github.com/cronvel/string-kit/commit/9cac4c298ee92c1695b0695951f1488884a7ca73
Prototype Pollution,ioredis,https://security.snyk.io/vuln/SNYK-JS-IOREDIS-1567196,,True,<4.27.8 ,https://github.com/luin/ioredis/commit/7d73b9d07b52ec077f235292aa15c7aca203bba9
Regular Expression Denial of Service (ReDoS),ansi-html,https://security.snyk.io/vuln/SNYK-JS-ANSIHTML-1296849,CVE-2021-23424,True,* ,n/a
Regular Expression Denial of Service (ReDoS),trim-off-newlines,https://security.snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850,CVE-2021-23425,True,<1.0.3 ,https://github.com/stevemao/trim-off-newlines/commit/6226c958cbbac284a840010eb1f6617fb99a5645
Information Exposure,hbs,https://security.snyk.io/vuln/SNYK-JS-HBS-1566555,CVE-2021-32822,True,* ,n/a
Cross-site Scripting (XSS),ckeditor4,https://security.snyk.io/vuln/SNYK-JS-CKEDITOR4-1540867,CVE-2021-32809,False,<4.16.2 ,https://github.com/ckeditor/ckeditor4/commit/f6856decd5992b2b07945292416bb113d5f7ff82
Cross-site Scripting (XSS),ckeditor4,https://security.snyk.io/vuln/SNYK-JS-CKEDITOR4-1540865,CVE-2021-37695,False,<4.16.2 ,https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58
Cross-site Scripting (XSS),ckeditor4,https://security.snyk.io/vuln/SNYK-JS-CKEDITOR4-1540869,CVE-2021-32808,False,<4.16.2 ,https://github.com/ckeditor/ckeditor4/commit/0cb59313c834c94cec4c4d4c114b6ecb0270e21a
Cross-site Scripting (XSS),@github/paste-markdown,https://security.snyk.io/vuln/SNYK-JS-GITHUBPASTEMARKDOWN-1540863,CVE-2021-37700,False,<0.3.4 ,https://github.com/github/paste-markdown/commit/4bb7b1a9c8bbd4bef26953e7e9088b5917b0c0c6
Cross-site Request Forgery (CSRF),express-cart,https://security.snyk.io/vuln/SNYK-JS-EXPRESSCART-1540669,CVE-2020-22403,False,<1.1.11 ,https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb
Open Redirect,next,https://security.snyk.io/vuln/SNYK-JS-NEXT-1540422,CVE-2021-37699,False,<11.1.0 ,n/a
Arbitrary Code Injection,@asyncapi/java-spring-cloud-stream-template,https://security.snyk.io/vuln/SNYK-JS-ASYNCAPIJAVASPRINGCLOUDSTREAMTEMPLATE-1540471,CVE-2021-37694,False,<0.7.0 ,n/a
Prototype Pollution,merge-change,https://security.snyk.io/vuln/SNYK-JS-MERGECHANGE-1310985,CVE-2021-23421,False,* ,n/a
Access Restriction Bypass,serverless-offline,https://security.snyk.io/vuln/SNYK-JS-SERVERLESSOFFLINE-1540299,CVE-2021-38384,False,* ,n/a
Improper Input Validation,@liquity/contracts,https://security.snyk.io/vuln/SNYK-JS-LIQUITYCONTRACTS-1536792,,False,* ,n/a
Command Injection,@npmcli/git,https://security.snyk.io/vuln/SNYK-JS-NPMCLIGIT-1536784,,False,<2.0.8 ,n/a
Server-Side Request Forgery (SSRF),terriajs-server,https://security.snyk.io/vuln/SNYK-JS-TERRIAJSSERVER-1536742,,False,<2.7.4 ,https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0
Regular Expression Denial of Service (ReDoS),tar,https://security.snyk.io/vuln/SNYK-JS-TAR-1536758,,False,>=6.0.0 <6.1.4 >=5.0.0 <5.0.8 <4.4.16 ,https://github.com/npm/node-tar/commit/06cbde5935aa7643f578f874de84a7da2a74fe3a
Prototype Pollution,open-graph,https://security.snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747,CVE-2021-23419,True,<0.2.6 ,https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348
Prototype Pollution,think-config,https://security.snyk.io/vuln/SNYK-JS-THINKCONFIG-1536566,,False,<1.1.3 ,https://github.com/thinkjs/think-config/commit/31b82468d72f2e1456a27a4827cea378196db6db
Heap-based Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1534884,CVE-2021-30568,False,>=13.0.0 <13.1.8 >=12.0.0 <12.0.16 <11.4.11 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1534881,CVE-2021-30562,False,>=12.0.0 <12.0.16 <11.4.11 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1536587,CVE-2021-30572,False,>=12.0.0 <12.0.16 <11.4.11 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1536581,CVE-2021-30573,False,>=13.0.0 <13.1.8 >=12.0.0 <12.0.16 <11.4.11 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1533614,CVE-2021-30560,False,>=12.0.0 <12.0.16 <11.4.11 ,https://github.com/electron/electron/commit/99413641d19df793efc94e61e6c821aee5b194b4
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1534882,CVE-2021-30541,False,>=12.0.0 <12.0.16 <11.4.11 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1536579,CVE-2021-30569,False,>=13.0.0 <13.1.8 >=12.0.0 <12.0.16 <11.4.11 ,n/a
Type Confusion,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1534883,CVE-2021-30563,True,>=12.0.0 <12.0.16 <11.4.11 ,n/a
Arbitrary File Overwrite,tar,https://security.snyk.io/vuln/SNYK-JS-TAR-1536531,CVE-2021-32804,False,<3.2.2 >=4.0.0 <4.4.14 >=5.0.0 <5.0.6 >=6.0.0 <6.1.1 ,https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4
Arbitrary File Overwrite,tar,https://security.snyk.io/vuln/SNYK-JS-TAR-1536528,CVE-2021-32803,False,<3.2.3 >=4.0.0 <4.4.15 >=5.0.0 <5.0.7 >=6.0.0 <6.1.2 ,https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
Cross-site Scripting (XSS),joplin,https://security.snyk.io/vuln/SNYK-JS-JOPLIN-1535807,CVE-2021-37916,False,<2.1.1 ,https://github.com/laurent22/joplin/commit/feaecf765368f2c273bea3a9fa641ff0da7e6b26
Cross-site Scripting (XSS),grapesjs,https://security.snyk.io/vuln/SNYK-JS-GRAPESJS-1316252,,False,<0.17.22 ,https://github.com/artf/grapesjs/commit/25e9a0b3316b20bb11806330ae0a789c9c752b16
Directory Traversal,isomorphic-git,https://security.snyk.io/vuln/SNYK-JS-ISOMORPHICGIT-1535213,CVE-2021-30483,False,<1.8.2 ,https://github.com/isomorphic-git/isomorphic-git/commit/1316820b5665346414f9bd1287d4701f9cf77727
Malicious Package,acookie,https://security.snyk.io/vuln/SNYK-JS-ACOOKIE-1534840,,False,* ,n/a
Malicious Package,vscode-npm-script,https://security.snyk.io/vuln/SNYK-JS-VSCODENPMSCRIPT-1534839,,False,* ,n/a
Malicious Package,firebase-extensions,https://security.snyk.io/vuln/SNYK-JS-FIREBASEEXTENSIONS-1534838,,False,* ,n/a
Improper Input Validation,xmldom,https://security.snyk.io/vuln/SNYK-JS-XMLDOM-1534562,CVE-2021-32796,False,* ,https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b
Cross-site Scripting (XSS),curly-bracket-parser,https://security.snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106,CVE-2021-23416,True,* ,n/a
Prototype Pollution,deepmergefn,https://security.snyk.io/vuln/SNYK-JS-DEEPMERGEFN-1310984,CVE-2021-23417,True,* ,n/a
Open Redirect,url-parse,https://security.snyk.io/vuln/SNYK-JS-URLPARSE-1533425,CVE-2021-3664,False,<1.5.2 ,https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0
Cross-site Scripting (XSS),video.js,https://security.snyk.io/vuln/SNYK-JS-VIDEOJS-1533429,CVE-2021-23414,True,<7.14.3 ,https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2
Denial of Service (DoS),jszip,https://security.snyk.io/vuln/SNYK-JS-JSZIP-1251497,CVE-2021-23413,True,<3.7.0 ,https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36
Command Injection,gitlogplus,https://security.snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832,CVE-2021-23412,True,* ,n/a
Access Restriction Bypass,ghost,https://security.snyk.io/vuln/SNYK-JS-GHOST-1325348,CVE-2021-39192,False,>=4.0.0 <4.10.0 ,n/a
Cross-site Scripting (XSS),anchorme,https://security.snyk.io/vuln/SNYK-JS-ANCHORME-1311008,CVE-2021-23411,True,* ,n/a
Regular Expression Denial of Service (ReDoS),glob-parent,https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294,CVE-2021-35065,True,>=6.0.0 <6.0.1 ,https://github.com/gulpjs/glob-parent/commit/3e9f04a3b4349db7e1962d87c9a7398cda51f339
Cross-site Scripting (XSS),froala-editor,https://security.snyk.io/vuln/SNYK-JS-FROALAEDITOR-1320082,CVE-2021-28114,False,<3.2.7 ,n/a
Cross-site Scripting (XSS),@toast-ui/editor,https://security.snyk.io/vuln/SNYK-JS-TOASTUIEDITOR-1536769,,False,<3.0.2 ,https://github.com/nhn/tui.editor/commit/48a01f5add76cb6eedb29cceb95f765164d69649
Cross-site Scripting (XSS),tui-editor,https://security.snyk.io/vuln/SNYK-JS-TUIEDITOR-1316284,,False,* ,https://github.com/nhn/tui.editor/commit/48a01f5add76cb6eedb29cceb95f765164d69649
Malicious 󠅮󠅰󠅭Package,hey-sven,https://security.snyk.io/vuln/SNYK-JS-HEYSVEN-1320013,,False,* ,n/a
Cross-site Scripting (XSS),nightscout,https://security.snyk.io/vuln/SNYK-JS-NIGHTSCOUT-1319667,CVE-2021-36755,False,* ,https://github.com/nightscout/cgm-remote-monitor/commit/68f3f90e30cc1da57f7e5069f9c4e1467973521f
Access Restriction Bypass,gatsby-source-wordpress,https://security.snyk.io/vuln/SNYK-JS-GATSBYSOURCEWORDPRESS-1319669,CVE-2021-32770,False,<4.0.8 >=5.0.0 <5.9.2 ,n/a
Open Redirect,urijs,https://security.snyk.io/vuln/SNYK-JS-URIJS-1319803,CVE-2021-3647,True,<1.19.7 ,https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481
Prototype Pollution,urijs,https://security.snyk.io/vuln/SNYK-JS-URIJS-1319806,,False,<1.19.7 ,https://github.com/medialize/URI.js/commit/8e51b00911ba0f6e90949e2c4516b945c35021f7
Cross-site Scripting (XSS),umeditor,https://security.snyk.io/vuln/SNYK-JS-UMEDITOR-1317128,CVE-2020-18145,False,* ,n/a
Improper Access Control,xo-web,https://security.snyk.io/vuln/SNYK-JS-XOWEB-1316691,CVE-2021-36383,False,* ,n/a
Improper Access Control,xo-server,https://security.snyk.io/vuln/SNYK-JS-XOSERVER-1316690,CVE-2021-36383,False,* ,n/a
Malicious Package,wp-calypso,https://security.snyk.io/vuln/SNYK-JS-WPCALYPSO-1317068,,False,* ,n/a
Prototype Pollution,putil-merge,https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077,CVE-2021-25953,True,<3.7.0 ,https://github.com/panates/putil-merge/commit/a8f5087faaa034cc2dc2e8070c13014ad6a34043
Prototype Pollution,just-safe-set,https://security.snyk.io/vuln/SNYK-JS-JUSTSAFESET-1316267,CVE-2021-25952,True,>=1.0.0 <2.2.2 ,https://github.com/angus-c/just/commit/dd57a476f4bb9d78c6f60741898dc04c71d2eb53
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1314896,CVE-2021-30523,False,>=12.0.0-beta.1 <12.0.14 <11.4.10 ,https://github.com/electron/electron/commit/b16d4539fa6cccf4d1e492de255bc3bec1e05770
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1315151,CVE-2021-30522,False,>=12.0.0 <12.0.14 <11.4.10 ,https://github.com/electron/electron/commit/a42ddbc98d19b2e69c2b9a1f3d9667ce3743d387
Arbitrary Code Execution,total4,https://security.snyk.io/vuln/SNYK-JS-TOTAL4-1130527,CVE-2021-23390,True,<0.0.43 ,https://github.com/totaljs/framework4/commit/8a72d8c20f38bbcac031a76a51238aa528f68821
Arbitrary Code Execution,total.js,https://security.snyk.io/vuln/SNYK-JS-TOTALJS-1088607,CVE-2021-32831,True,<3.4.9 ,https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3
Regular Expression Denial of Service (ReDoS),d3-color,https://security.snyk.io/vuln/SNYK-JS-D3COLOR-1076592,,True,* ,https://github.com/d3/d3-color/commit/4c2be7e59a317d0af7c3d66e44fa888f02163a59
Improper Authentication,stellar-sdk,https://security.snyk.io/vuln/SNYK-JS-STELLARSDK-1316188,CVE-2021-32738,False,<8.2.3 ,https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3
Server-side Request Forgery (SSRF),jsoneditor,https://security.snyk.io/vuln/SNYK-JS-JSONEDITOR-1315828,,False,<2.2.2 ,https://github.com/josdejong/jsoneditor/commit/01f611226164f4a5ab33da24396c755c60bf785b
Prototype Pollution,record-like-deep-assign,https://security.snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024,CVE-2021-23402,True,* ,n/a
Prototype Pollution,ts-nodash,https://security.snyk.io/vuln/SNYK-JS-TSNODASH-1311009,CVE-2021-23403,True,<1.2.7 ,n/a
Out-of-bounds Write,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1315668,CVE-2021-30547,False,>=12.0.0 <12.0.13 <11.4.10 ,n/a
Prototype Pollution,think-helper,https://security.snyk.io/vuln/SNYK-JS-THINKHELPER-1315383,CVE-2021-32736,False,<1.1.3 ,n/a
Access of Resource Using Incompatible Type ('Type Confusion'),electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1312314,CVE-2021-30551,False,>=12.0.0-beta.1 <12.0.12 <11.4.9 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1312315,CVE-2021-30544,False,>=12.0.0-beta.1 <12.0.13 <11.4.9 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1312313,CVE-2021-30548,False,>=12.0.0-beta.1 <12.0.12 <11.4.9 ,n/a
Cross-site Scripting (XSS),@toast-ui/editor,https://security.snyk.io/vuln/SNYK-JS-TOASTUIEDITOR-1086605,,False,<3.0.2 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1313767,CVE-2021-30553,False,>=12.0.0 <12.0.13 <11.4.10 ,n/a
Regular Expression Denial of Service (ReDoS),prismjs,https://security.snyk.io/vuln/SNYK-JS-PRISMJS-1314893,CVE-2021-32723,False,<1.24.0 ,https://github.com/PrismJS/prism/commit/d85e30da6755fdbe7f8559f8e75d122297167018
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1313765,CVE-2021-30554,False,>=12.0.0 <12.0.13 <11.4.10 ,n/a
Prototype Pollution,noble,https://security.snyk.io/vuln/SNYK-JS-NOBLE-1314742,,True,* ,n/a
Cross-site Scripting (XSS),mermaid,https://security.snyk.io/vuln/SNYK-JS-MERMAID-1314738,CVE-2021-35513,False,<8.11.0 ,n/a
HTTP Header Injection,nodemailer,https://security.snyk.io/vuln/SNYK-JS-NODEMAILER-1296415,CVE-2021-23400,True,<6.6.1 ,https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f
Arbitrary Command Injection,wincred,https://security.snyk.io/vuln/SNYK-JS-WINCRED-1078538,CVE-2021-23399,True,* ,n/a
Cross-site Scripting (XSS),@auth0/nextjs-auth0,https://security.snyk.io/vuln/SNYK-JS-AUTH0NEXTJSAUTH0-1314618,CVE-2021-32702,False,<1.4.1 ,https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf
Regular Expression Denial of Service (ReDoS),is-email,https://security.snyk.io/vuln/SNYK-JS-ISEMAIL-1279002,CVE-2021-36716,True,<1.0.1 ,n/a
Directory Traversal,@backstage/techdocs-common,https://security.snyk.io/vuln/SNYK-JS-BACKSTAGETECHDOCSCOMMON-1314354,,False,<0.6.5 ,https://github.com/backstage/backstage/commit/c17c0fcf9e64a48bf8b0a1f2f4cf6ccc6f85fe70
Prototype Pollution,aurelia-path,https://security.snyk.io/vuln/SNYK-JS-AURELIAPATH-1292346,CVE-2021-41097,False,<1.1.7 ,n/a
Command Injection,find-process,https://security.snyk.io/vuln/SNYK-JS-FINDPROCESS-1090284,,False,<1.4.5 ,n/a
Cross-site Scripting (XSS),react-bootstrap-table,https://security.snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285,CVE-2021-23398,True,* ,n/a
Cross-site Scripting (XSS),mongo-express,https://security.snyk.io/vuln/SNYK-JS-MONGOEXPRESS-1312921,CVE-2021-21422,False,<1.0.0-alpha.4 ,https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b
Cross-site Scripting (XSS),striptags,https://security.snyk.io/vuln/SNYK-JS-STRIPTAGS-1312310,CVE-2021-32696,False,<3.2.0 ,https://github.com/ericnorris/striptags/commit/27195157aa2a6b1fabfb882c36a8a6eb9201f029
Information Exposure,@apollo/client,https://security.snyk.io/vuln/SNYK-JS-APOLLOCLIENT-1085706,,False,<3.4.0-rc.2 ,n/a
Prototype Pollution,@ianwalter/merge,https://security.snyk.io/vuln/SNYK-JS-IANWALTERMERGE-1311022,CVE-2021-23397,True,* ,n/a
Denial of Service (DoS),xlsx,https://security.snyk.io/vuln/SNYK-JS-XLSX-1311137,CVE-2021-32013,False,<0.17.0 ,https://github.com/SheetJS/sheetjs/commit/3542d62fffc155dd505a23230ba182c4402a0e2c
Denial of Service (DoS),xlsx,https://security.snyk.io/vuln/SNYK-JS-XLSX-1311141,CVE-2021-32012,False,<0.17.0 ,https://github.com/SheetJS/sheetjs/commit/3542d62fffc155dd505a23230ba182c4402a0e2c
Prototype Pollution,lutils,https://security.snyk.io/vuln/SNYK-JS-LUTILS-1311023,CVE-2021-23396,True,* ,n/a
Denial of Service (DoS),xlsx,https://security.snyk.io/vuln/SNYK-JS-XLSX-1311139,CVE-2021-32014,False,<0.17.0 ,https://github.com/SheetJS/sheetjs/commit/3542d62fffc155dd505a23230ba182c4402a0e2c
Access Restriction Bypass,@apollosproject/data-connector-rock,https://security.snyk.io/vuln/SNYK-JS-APOLLOSPROJECTDATACONNECTORROCK-1311006,CVE-2021-32691,False,<2.20.0 ,https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2
Insecure Permissions,matrix-appservice-bridge,https://security.snyk.io/vuln/SNYK-JS-MATRIXAPPSERVICEBRIDGE-1311005,CVE-2021-32659,False,<2.6.1 ,n/a
Denial of Service (DoS),valine,https://security.snyk.io/vuln/SNYK-JS-VALINE-1311003,CVE-2021-34801,False,* ,n/a
Use After Free,hermes-engine,https://security.snyk.io/vuln/SNYK-JS-HERMESENGINE-1309667,CVE-2021-24037,False,<0.7.0 ,https://github.com/facebook/hermes/commit/d86e185e485b6330216dee8e854455c694e3a36e
Improper Verification of Cryptographic Signature,tenvoy,https://security.snyk.io/vuln/SNYK-JS-TENVOY-1305803,CVE-2021-32685,False,<7.0.3 ,https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b
Denial of Service (DoS),@scandipwa/magento-scripts,https://security.snyk.io/vuln/SNYK-JS-SCANDIPWAMAGENTOSCRIPTS-1305278,CVE-2021-32684,False,>=1.5.1 <1.5.3 ,https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071
Prototype Pollution,nedb,https://security.snyk.io/vuln/SNYK-JS-NEDB-1305279,CVE-2021-23395,True,* ,n/a
Cross-site Scripting (XSS),total.js,https://security.snyk.io/vuln/SNYK-JS-TOTALJS-1304916,CVE-2019-10260,False,<3.3.0-13 ,https://github.com/totaljs/cms/commit/75205f93009db3cf8c0b0f4f1fc8ab82d70da8ad
Cross-site Scripting (XSS),ckeditor4,https://security.snyk.io/vuln/SNYK-JS-CKEDITOR4-1303090,CVE-2021-33829,False,>=4.14.0 <4.16.1 ,n/a
Prototype Pollution,expand-hash,https://security.snyk.io/vuln/SNYK-JS-EXPANDHASH-1303101,CVE-2021-25948,False,* ,n/a
Prototype Pollution,set-getter,https://security.snyk.io/vuln/SNYK-JS-SETGETTER-1303099,CVE-2021-25949,False,* ,n/a
Remote Code Execution (RCE),reg-keygen-git-hash-plugin,https://security.snyk.io/vuln/SNYK-JS-REGKEYGENGITHASHPLUGIN-1300843,CVE-2021-32673,False,<0.10.16 ,https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87
Cross-site Scripting (XSS),apexcharts,https://security.snyk.io/vuln/SNYK-JS-APEXCHARTS-1300579,CVE-2021-23327,False,<3.27.0 ,https://github.com/apexcharts/apexcharts.js/commit/67be39cf878198b6c2f4056a3285aaf686102019
Prototype Pollution,nestie,https://security.snyk.io/vuln/SNYK-JS-NESTIE-1300518,,True,<1.0.2 ,https://github.com/lukeed/nestie/commit/c571c77928ecd7f256a935c7c3860f33dac4653f
Arbitrary File Write via Archive Extraction (Zip Slip),calipso,https://security.snyk.io/vuln/SNYK-JS-CALIPSO-1300555,CVE-2021-23391,True,* ,n/a
Regular Expression Denial of Service (ReDoS),polished,https://security.snyk.io/vuln/SNYK-JS-POLISHED-1298071,,False,<3.7.2 >=4.0.0-beta.1 <4.1.3 ,https://github.com/styled-components/polished/commit/6afe3ed74aac71696b7b2c823a5c62bd5b916d66
Cross-site Scripting (XSS),auth0-lock,https://security.snyk.io/vuln/SNYK-JS-AUTH0LOCK-1300548,CVE-2021-32641,False,<11.30.1 ,https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed
Regular Expression Denial of Service (ReDoS),locutus,https://security.snyk.io/vuln/SNYK-JS-LOCUTUS-1090597,CVE-2021-23392,True,<2.0.15 ,https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e
Prototype Pollution,nestie,https://security.snyk.io/vuln/SNYK-JS-NESTIE-1300046,CVE-2021-25947,False,<1.0.1 ,https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2
Directory Traversal,@backstage/techdocs-common,https://security.snyk.io/vuln/SNYK-JS-BACKSTAGETECHDOCSCOMMON-1300041,CVE-2021-32662,False,<0.6.3 ,https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208
Cross-site Scripting (XSS),@backstage/plugin-techdocs,https://security.snyk.io/vuln/SNYK-JS-BACKSTAGEPLUGINTECHDOCS-1300047,CVE-2021-32661,False,<0.9.5 ,https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c
Cross-site Scripting (XSS),@backstage/techdocs-common,https://security.snyk.io/vuln/SNYK-JS-BACKSTAGETECHDOCSCOMMON-1300048,CVE-2021-32660,False,<0.6.4 ,https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c
Heap-based Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1296565,CVE-2021-30508,False,>=12.0.0-beta.1 <12.0.10 >=11.0.0-beta.1 <11.4.8 <10.4.7 ,https://github.com/electron/electron/commit/354dab3bac306358c89decdccc993c04bd610389
Race Condition,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1296563,CVE-2021-30510,False,>=12.0.0-beta.1 <12.0.10 >=11.0.0-beta.1 <11.4.8 <10.4.7 ,https://github.com/electron/electron/commit/354dab3bac306358c89decdccc993c04bd610389
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1296561,CVE-2021-30512,False,>=12.0.0-beta.1 <12.0.10 >=11.0.0-beta.1 <11.4.8 <10.4.7 ,https://github.com/electron/electron/commit/354dab3bac306358c89decdccc993c04bd610389
Type Confusion,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1296559,CVE-2021-30513,False,>=12.0.0-beta.1 <12.0.10 >=11.0.0-beta.1 <11.4.8 <10.4.7 ,https://github.com/electron/electron/commit/354dab3bac306358c89decdccc993c04bd610389
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1296557,CVE-2021-30515,False,>=12.0.0-beta.1 <12.0.10 >=11.0.0-beta.1 <11.4.8 <10.4.7 ,https://github.com/electron/electron/commit/354dab3bac306358c89decdccc993c04bd610389
Heap-based Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1296555,CVE-2021-30516,False,>=12.0.0-beta.1 <12.0.10 >=11.0.0-beta.1 <11.4.8 <10.4.7 ,https://github.com/electron/electron/commit/354dab3bac306358c89decdccc993c04bd610389
Heap-based Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1296553,CVE-2021-30518,False,>=12.0.0-beta.1 <12.0.10 >=11.0.0-beta.1 <11.4.8 <10.4.7 ,https://github.com/electron/electron/commit/354dab3bac306358c89decdccc993c04bd610389
Improper Verification of Cryptographic Signature,@aws-crypto/decrypt-node,https://security.snyk.io/vuln/SNYK-JS-AWSCRYPTODECRYPTNODE-1298664,,False,>=2.0.0 <2.2.0 <1.9.0 ,n/a
Improper Verification of Cryptographic Signature,@aws-crypto/decrypt-browser,https://security.snyk.io/vuln/SNYK-JS-AWSCRYPTODECRYPTBROWSER-1298663,,False,>=2.0.0 <2.2.0 <1.9.0 ,n/a
Regular Expression Denial of Service (ReDoS),react-native,https://security.snyk.io/vuln/SNYK-JS-REACTNATIVE-1298632,CVE-2020-1920,False,>=0.63.0-rc.0 <0.64.1 >=0.59.0-rc.0 <0.62.3 ,https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7
Cross-site Scripting (XSS),layui,https://security.snyk.io/vuln/SNYK-JS-LAYUI-1298350,,False,<2.6.8 ,https://github.com/sentsin/layui/commit/7376bbe00df6323588b408d5bf38b151aab4c449#diff-13952582bff0a1aa2ddde6f94079a336fc5ff89fbb220988854ebf97ca7f6b20
Cross-site Scripting (XSS),layui-src,https://security.snyk.io/vuln/SNYK-JS-LAYUISRC-1298179,,False,<2.6.8 ,https://github.com/sentsin/layui/commit/7376bbe00df6323588b408d5bf38b151aab4c449#diff-13952582bff0a1aa2ddde6f94079a336fc5ff89fbb220988854ebf97ca7f6b20
Regular Expression Denial of Service (ReDoS),forms,https://security.snyk.io/vuln/SNYK-JS-FORMS-1296389,CVE-2021-23388,False,<1.2.1 >=1.3.0 <1.3.2 ,https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0
Denial of Service (DoS),trim-newlines,https://security.snyk.io/vuln/SNYK-JS-TRIMNEWLINES-1298042,CVE-2021-33623,False,<3.0.1 >=4.0.0 <4.0.1 ,https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91
Cross-site Scripting (XSS),tinymce,https://security.snyk.io/vuln/SNYK-JS-TINYMCE-1298037,,False,<5.7.1 ,https://github.com/tinymce/tinymce/commit/09bfb1dcb176611d22a477666d8cea72cd14c3fe
Regular Expression Denial of Service (ReDoS),css-what,https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-1298035,CVE-2021-33587,False,<5.0.1 ,https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655
Command Injection,@floffah/build,https://security.snyk.io/vuln/SNYK-JS-FLOFFAHBUILD-1298045,,False,<1.0.0 ,n/a
Denial of Service (DoS),node-static,https://security.snyk.io/vuln/SNYK-JS-NODESTATIC-1297183,,False,* ,https://github.com/cloudhead/node-static/commit/78879dc665f0f7137063794b6e0b6203a81c7f67
Open Redirect,node-static,https://security.snyk.io/vuln/SNYK-JS-NODESTATIC-1297184,,False,* ,https://github.com/cloudhead/node-static/commit/95487174caa8362f0e80acf85f8a9d158e941b90
Arbitrary Code Execution,json-ptr,https://security.snyk.io/vuln/SNYK-JS-JSONPTR-1297099,,False,<2.1.0 ,n/a
Prototype Pollution,js-extend,https://security.snyk.io/vuln/SNYK-JS-JSEXTEND-1297101,CVE-2021-25945,True,* ,n/a
Prototype Pollution,nconf-toml,https://security.snyk.io/vuln/SNYK-JS-NCONFTOML-1296831,CVE-2021-25946,True,* ,n/a
Regular Expression Denial of Service (ReDoS),ws,https://security.snyk.io/vuln/SNYK-JS-WS-1296835,CVE-2021-32640,True,>=7.0.0 <7.4.6 >=6.0.0 <6.2.2 <5.2.3 ,https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff
Information Exposure,@keystonejs/keystone,https://security.snyk.io/vuln/SNYK-JS-KEYSTONEJSKEYSTONE-1296546,CVE-2021-32624,False,* ,n/a
Arbitrary Command Injection,@ronomon/opened,https://security.snyk.io/vuln/SNYK-JS-RONOMONOPENED-1296551,CVE-2021-29300,False,<1.5.2 ,https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec
Regular Expression Denial of Service (ReDoS),normalize-url,https://security.snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539,CVE-2021-33502,False,>=6.0.0 <6.0.1 >=5.0.0 <5.3.1 >=4.4.0 <4.5.1 ,https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
Remote Memory Exposure,dns-packet,https://security.snyk.io/vuln/SNYK-JS-DNSPACKET-1293563,CVE-2021-23386,False,<1.3.4 >=2.0.0 <5.2.4 ,https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56
Cross-site Scripting (XSS),matrix-react-sdk,https://security.snyk.io/vuln/SNYK-JS-MATRIXREACTSDK-1293237,CVE-2021-32622,False,<3.21.0 ,n/a
Cross-site Scripting (XSS),vmd,https://security.snyk.io/vuln/SNYK-JS-VMD-1293236,CVE-2021-33041,False,* ,n/a
Cross-site Scripting (XSS),@shopify/koa-shopify-auth,https://security.snyk.io/vuln/SNYK-JS-SHOPIFYKOASHOPIFYAUTH-1293238,CVE-2020-8176,False,>=3.1.61 <3.1.63 ,n/a
Information Exposure,express-hbs,https://security.snyk.io/vuln/SNYK-JS-EXPRESSHBS-1293211,CVE-2021-32817,False,* ,https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e
Cross-site Scripting (XSS),haml-coffee,https://security.snyk.io/vuln/SNYK-JS-HAMLCOFFEE-1293210,CVE-2021-32818,False,* ,n/a
Arbitrary Code Execution,squirrelly,https://security.snyk.io/vuln/SNYK-JS-SQUIRRELLY-1293209,CVE-2021-32819,False,* ,n/a
Open Redirect,koa-remove-trailing-slashes,https://security.snyk.io/vuln/SNYK-JS-KOAREMOVETRAILINGSLASHES-1085708,CVE-2021-23384,True,<2.0.2 ,n/a
Open Redirect,trailing-slash,https://security.snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707,CVE-2021-23387,True,<2.0.1 ,https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048
Cross-site Scripting (XSS),aurelia-templating-resources,https://security.snyk.io/vuln/SNYK-JS-AURELIATEMPLATINGRESOURCES-1292342,CVE-2019-10062,False,* ,n/a
Cross-site Request Forgery (CSRF),fastify-csrf,https://security.snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1293032,CVE-2021-29624,False,<3.1.0 ,n/a
Prototype Pollution,101,https://security.snyk.io/vuln/SNYK-JS-101-1292345,CVE-2021-25943,False,* ,n/a
Prototype Pollution,deep-override,https://security.snyk.io/vuln/SNYK-JS-DEEPOVERRIDE-1292344,CVE-2021-25941,False,<1.0.2 ,https://github.com/ASaiAnudeep/deep-override/commit/2aced17651fb684959a6e04b1465a8329b3d5268
Cross-site Scripting (XSS),vconsole,https://security.snyk.io/vuln/SNYK-JS-VCONSOLE-1292147,,False,<3.5.2 ,https://github.com/Tencent/vConsole/commit/365380a1d1700643ac81782b2262a1edb02ff033
Improper Authentication,strapi,https://security.snyk.io/vuln/SNYK-JS-STRAPI-1290552,CVE-2021-28128,False,* ,n/a
Denial of Service (DoS),fastify-multipart,https://security.snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-1290382,CVE-2020-8136,False,<1.0.5 ,n/a
Command Injection,git-parse,https://security.snyk.io/vuln/SNYK-JS-GITPARSE-1290380,CVE-2021-26543,False,<1.0.5 ,n/a
Prototype Pollution,backbone-query-parameters,https://security.snyk.io/vuln/SNYK-JS-BACKBONEQUERYPARAMETERS-1290381,CVE-2021-20085,True,* ,n/a
Cross-site Scripting (XSS),frappe-charts,https://security.snyk.io/vuln/SNYK-JS-FRAPPECHARTS-1290373,,False,* ,https://github.com/frappe/charts/commit/61717aee95097023fb63f4a199309c69274e036e
Cross-site Scripting (XSS),highcharts,https://security.snyk.io/vuln/SNYK-JS-HIGHCHARTS-1290057,CVE-2021-29489,False,<9.0.0 ,n/a
Regular Expression Denial of Service (ReDoS),is-svg,https://security.snyk.io/vuln/SNYK-JS-ISSVG-1243891,CVE-2021-29059,True,>=2.1.0 <4.3.0 ,https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02
Arbitrary Code Execution,exiftool-vendored.exe,https://security.snyk.io/vuln/SNYK-JS-EXIFTOOLVENDOREDEXE-1279040,CVE-2021-22204,True,<12.25.0 ,https://github.com/photostructure/exiftool-vendored.exe/commit/66be0b2c50cbba945a3566b131e26effc6fc960c
Arbitrary Code Execution,exiftool-vendored.pl,https://security.snyk.io/vuln/SNYK-JS-EXIFTOOLVENDOREDPL-1279041,CVE-2021-22204,True,<12.25.0 ,https://github.com/photostructure/exiftool-vendored.exe/commit/66be0b2c50cbba945a3566b131e26effc6fc960c
Prototype Pollution,handlebars,https://security.snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029,CVE-2021-23383,False,<4.7.7 ,https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427
Regular Expression Denial of Service (ReDoS),path-parse,https://security.snyk.io/vuln/SNYK-JS-PATHPARSE-1077067,CVE-2021-23343,True,<1.0.7 ,n/a
Cross-site Scripting (XSS),ngx-markdown-editor,https://security.snyk.io/vuln/SNYK-JS-NGXMARKDOWNEDITOR-1245072,,False,<3.3.3 ,https://github.com/lon-yang/ngx-markdown-editor/commit/5b6bc97b41116bb65899b5bd20b5aa3032793999
Prototype Pollution,mixme,https://security.snyk.io/vuln/SNYK-JS-MIXME-1278998,CVE-2021-29491,False,<0.5.2 ,https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028
Arbitrary Code Execution,@rkesters/gnuplot,https://security.snyk.io/vuln/SNYK-JS-RKESTERSGNUPLOT-1279001,CVE-2021-29369,False,<0.1.0 ,https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de
Denial of Service (DoS),cumulative-distribution-function,https://security.snyk.io/vuln/SNYK-JS-CUMULATIVEDISTRIBUTIONFUNCTION-1278985,CVE-2021-29486,False,<2.0.0 ,n/a
Out Of Bounds Read,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1278596,CVE-2021-21233,False,<10.4.4 >=11.0.0 <11.4.4 >=12.0.0 <12.0.6 ,n/a
Improper Input Validation,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1277526,CVE-2021-21231,False,<10.4.4 >=12.0.0 <12.0.6 ,n/a
Integer Overflow or Wraparound,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1260586,CVE-2021-21223,False,<10.4.4 >=12.0.0 <12.0.6 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1258207,CVE-2021-21226,False,<10.4.4 >=11.0.0 <11.4.4 >=12.0.0 <12.0.6 ,n/a
Cross-site Scripting (XSS),ghost,https://security.snyk.io/vuln/SNYK-JS-GHOST-1278126,CVE-2021-29484,False,>=4.0.0 <4.3.3 ,n/a
Insecure Configuration,cypress,https://security.snyk.io/vuln/SNYK-JS-CYPRESS-1255446,,True,<7.2.0 ,n/a
Prototype Pollution,confidence,https://security.snyk.io/vuln/SNYK-JS-CONFIDENCE-1088570,,False,>=4.0.0 <5.0.1 ,https://github.com/hapipal/confidence/commit/74350657d552131fade93ecf72ae3b6226f89ed8
Integer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1277205,CVE-2021-21223,False,<10.4.4 ,n/a
Prototype Pollution,domify,https://security.snyk.io/vuln/SNYK-JS-DOMIFY-1277201,,False,<1.4.1 ,https://github.com/component/domify/commit/43221c5e255e876ba9a9a7912c67d63c87a1805e
Heap-based Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1277203,CVE-2021-21222,False,<10.4.4 >=11.0.0 <11.4.4 >=12.0.0 <12.0.6 ,n/a
Out-of-bounds Read,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1261111,CVE-2021-21198,False,>=11.0.0 <11.4.4 <10.4.4 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1259349,CVE-2021-21202,False,>=11.0.0 <11.4.4 <10.4.4 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1252279,CVE-2021-21206,False,>=11.0.0 <11.4.4 <10.4.4 ,n/a
Out-of-bounds,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1257943,CVE-2021-21225,True,>=11.0.0 <11.4.4 <10.4.4 >=12.0.0 <12.0.6 ,n/a
Regular Expression Denial of Service (ReDoS),browserslist,https://security.snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194,CVE-2021-23364,True,>=4.0.0 <4.16.5 ,https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98
Prototype Pollution,safe-flat,https://security.snyk.io/vuln/SNYK-JS-SAFEFLAT-1277112,CVE-2021-25927,False,>=2.0.0 <2.0.2 ,https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3
Prototype Pollution,safe-obj,https://security.snyk.io/vuln/SNYK-JS-SAFEOBJ-1277111,CVE-2021-25928,False,* ,n/a
Cross-site Scripting (XSS),vconsole,https://security.snyk.io/vuln/SNYK-JS-VCONSOLE-1244101,,False,<3.4.1 ,https://github.com/Tencent/vConsole/commit/232ff55b74e4f424cf64a6d26fb610fb87550cb8
Cross-site Scripting (XSS),react-draft-wysiwyg,https://security.snyk.io/vuln/SNYK-JS-REACTDRAFTWYSIWYG-1251504,CVE-2021-31712,False,<1.14.6 ,https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380
Access Restriction Bypass,oauth2-server,https://security.snyk.io/vuln/SNYK-JS-OAUTH2SERVER-1255585,CVE-2017-18924,False,* ,n/a
Regular Expression Denial of Service (ReDoS),validator,https://security.snyk.io/vuln/SNYK-JS-VALIDATOR-1090599,,True,<13.6.0 ,https://github.com/tux-tn/validator.js/commit/b21879cf45c05ee11b2d79e612b651bf7b2d93b7#diff-f41087599986e29c3c0dc15b62f1bf96d8aba16fe41f3730e315c84c2c4cb311
Regular Expression Denial of Service (ReDoS),validator,https://security.snyk.io/vuln/SNYK-JS-VALIDATOR-1090600,CVE-2021-3765,True,<13.7.0 ,n/a
Regular Expression Denial of Service (ReDoS),validator,https://security.snyk.io/vuln/SNYK-JS-VALIDATOR-1090601,,True,<13.6.0 ,n/a
Prototype Pollution,dustjs-linkedin,https://security.snyk.io/vuln/SNYK-JS-DUSTJSLINKEDIN-1089257,,False,<3.0.0 ,https://github.com/linkedin/dustjs/pull/805/commits/ddb6523832465d38c9d80189e9de60519ac307c3
Regular Expression Denial of Service (ReDoS),validator,https://security.snyk.io/vuln/SNYK-JS-VALIDATOR-1090602,,True,<13.6.0 ,n/a
Prototype Pollution,purl,https://security.snyk.io/vuln/SNYK-JS-PURL-1255642,CVE-2021-20089,False,* ,n/a
Regular Expression Denial of Service (ReDoS),redis,https://security.snyk.io/vuln/SNYK-JS-REDIS-1255645,CVE-2021-29469,False,>=2.6.0 <3.1.1 ,https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e
Access Restriction Bypass,xmlhttprequest-ssl,https://security.snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1255647,CVE-2021-31597,True,<1.6.1 ,https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2
Prototype Pollution,jquery-bbq,https://security.snyk.io/vuln/SNYK-JS-JQUERYBBQ-1255644,CVE-2021-20086,False,* ,n/a
Prototype Pollution,jquery-query-object,https://security.snyk.io/vuln/SNYK-JS-JQUERYQUERYOBJECT-1255650,CVE-2021-20083,False,* ,n/a
Prototype Pollution,jquery-deparam,https://security.snyk.io/vuln/SNYK-JS-JQUERYDEPARAM-1255651,CVE-2021-20087,False,* ,n/a
Prototype Pollution,mootools-more,https://security.snyk.io/vuln/SNYK-JS-MOOTOOLSMORE-1255652,CVE-2021-20088,False,* ,n/a
Regular Expression Denial of Service (ReDoS),postcss,https://security.snyk.io/vuln/SNYK-JS-POSTCSS-1255640,CVE-2021-23382,True,>=8.0.0 <8.2.13 <7.0.36 ,https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1253279,CVE-2021-21194,False,>=12.0.0 <12.0.5 >=11.0.0 <11.4.4 <10.4.4 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1253281,CVE-2021-21199,False,>=12.0.0 <12.0.5 >=11.0.0 <11.4.4 <10.4.4 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1252280,CVE-2021-21195,False,>=12.0.0 <12.0.5 >=11.0.0 <11.4.4 <10.4.4 ,n/a
Timing Attack,jose-node-esm-runtime,https://security.snyk.io/vuln/SNYK-JS-JOSENODEESMRUNTIME-1251483,CVE-2021-29445,False,<3.11.4 ,n/a
Timing Attack,jose-browser-runtime,https://security.snyk.io/vuln/SNYK-JS-JOSEBROWSERRUNTIME-1251484,CVE-2021-29444,False,<3.11.4 ,n/a
Access Restriction Bypass,@curveball/a12n-server,https://security.snyk.io/vuln/SNYK-JS-CURVEBALLA12NSERVER-1251485,CVE-2021-29452,False,>=0.18.0 <0.18.2 ,n/a
Insecure Default,meteor,https://security.snyk.io/vuln/SNYK-JS-METEOR-1065251,,False,<2.2.0 ,https://github.com/meteor/meteor/commit/27f028f588bdc15e0bf7a9fecd63cde2f0b4c9bd
Arbitrary Command Injection,ffmpegdotjs,https://security.snyk.io/vuln/SNYK-JS-FFMPEGDOTJS-1078542,CVE-2021-23376,True,* ,n/a
Arbitrary Command Injection,onion-oled-js,https://security.snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808,CVE-2021-23377,True,* ,n/a
Arbitrary Command Injection,psnode,https://security.snyk.io/vuln/SNYK-JS-PSNODE-1078543,CVE-2021-23375,True,* ,n/a
Arbitrary Command Injection,ps-visitor,https://security.snyk.io/vuln/SNYK-JS-PSVISITOR-1078544,CVE-2021-23374,True,* ,n/a
Arbitrary Command Injection,killing,https://security.snyk.io/vuln/SNYK-JS-KILLING-1078532,CVE-2021-23381,True,* ,n/a
Cross-site Scripting (XSS),editor.md,https://security.snyk.io/vuln/SNYK-JS-EDITORMD-1063036,,True,* ,n/a
Arbitrary Command Injection,roar-pidusage,https://security.snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528,CVE-2021-23380,True,* ,n/a
Arbitrary Command Injection,picotts,https://security.snyk.io/vuln/SNYK-JS-PICOTTS-1078539,CVE-2021-23378,True,* ,n/a
Arbitrary Command Injection,portkiller,https://security.snyk.io/vuln/SNYK-JS-PORTKILLER-1078537,CVE-2021-23379,True,* ,n/a
Timing Attack,jose-node-cjs-runtime,https://security.snyk.io/vuln/SNYK-JS-JOSENODECJSRUNTIME-1251480,CVE-2021-29446,False,<3.11.4 ,n/a
Timing Attack,jose,https://security.snyk.io/vuln/SNYK-JS-JOSE-1251487,CVE-2021-29443,False,<1.28.1 >=2.0.0 <2.0.5 >=3.0.0 <3.11.4 ,n/a
Regular Expression Denial of Service (ReDoS),ssri,https://security.snyk.io/vuln/SNYK-JS-SSRI-1246392,CVE-2021-27290,False,>=5.2.2 <6.0.2 >=7.0.0 <7.1.1 >=8.0.0 <8.0.1 ,https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2
Command Injection,@azure/ms-rest-nodeauth,https://security.snyk.io/vuln/SNYK-JS-AZUREMSRESTNODEAUTH-1245464,CVE-2021-28458,True,<3.0.8 ,n/a
Cross-site Scripting (XSS),@nextcloud/dialogs,https://security.snyk.io/vuln/SNYK-JS-NEXTCLOUDDIALOGS-1245465,CVE-2021-29438,False,<3.1.2 ,https://github.com/nextcloud/nextcloud-dialogs/commit/da9222735510fd5c939a19a74331f102dc9d8f29
Information Exposure,@theia/mini-browser,https://security.snyk.io/vuln/SNYK-JS-THEIAMINIBROWSER-1245507,CVE-2019-17636,False,>=0.3.9 <0.16.0 ,https://github.com/eclipse-theia/theia/commit/b212d07f915df1509180944ee3132714bc2636bf
Arbitrary Code Execution,jsreport,https://security.snyk.io/vuln/SNYK-JS-JSREPORT-1245513,CVE-2020-8128,False,<2.6.0 ,n/a
Prototype Pollution,set-deep-prop,https://security.snyk.io/vuln/SNYK-JS-SETDEEPPROP-1083231,CVE-2021-23373,True,* ,n/a
Malicious Package,web-browserify,https://security.snyk.io/vuln/SNYK-JS-WEBBROWSERIFY-1245516,,False,* ,n/a
Denial of Service (DoS),mongo-express,https://security.snyk.io/vuln/SNYK-JS-MONGOEXPRESS-1085403,CVE-2021-23372,False,* ,n/a
Regular Expression Denial of Service (ReDoS),postcss,https://security.snyk.io/vuln/SNYK-JS-POSTCSS-1090595,CVE-2021-23368,True,>=7.0.0 <7.0.36 >=8.0.0 <8.2.10 ,n/a
Prototype Pollution,shvl,https://security.snyk.io/vuln/SNYK-JS-SHVL-1085284,,False,<2.0.3 ,https://github.com/robinvdvleuten/shvl/commit/4ed0edfa70f7778556f7b7e9ef1ee5d6d002fce2
Regular Expression Denial of Service (ReDoS),chrono-node,https://security.snyk.io/vuln/SNYK-JS-CHRONONODE-1083228,CVE-2021-23371,False,<2.2.4 ,https://github.com/wanasit/chrono/commit/98815b57622443b5c498a427210ebd603d705f4c
Prototype Pollution,swiper,https://security.snyk.io/vuln/SNYK-JS-SWIPER-1088062,CVE-2021-23370,True,<6.5.1 ,https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178
Improper Input Validation,systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1244526,,True,<5.6.11 ,https://github.com/sebhildebrandt/systeminformation/commit/45c08f139eeed339e98bc1deb3a855ccc33b504b
Cryptographic Weakness,jsrsasign,https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-1244072,CVE-2021-30246,False,<10.1.13 ,n/a
Arbitrary Code Execution,projen,https://security.snyk.io/vuln/SNYK-JS-PROJEN-1243686,CVE-2021-21423,False,>=0.6.0 <0.16.41 ,https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643
Privilege Escalation,mongodb-js-metrics,https://security.snyk.io/vuln/SNYK-JS-MONGODBJSMETRICS-1243685,CVE-2021-20334,False,<6.0.0 ,https://github.com/mongodb-js/metrics/commit/8ad75b1820fea866971f18bc540806e6081a78e7
Arbitrary Command Injection,systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1243748,CVE-2021-21388,False,<5.6.4 ,n/a
Arbitrary Code Execution,@prisma/sdk,https://security.snyk.io/vuln/SNYK-JS-PRISMASDK-1243749,CVE-2021-21414,False,<2.20.0 ,n/a
Regular Expression Denial of Service (ReDoS),@ckeditor/ckeditor5-widget,https://security.snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5WIDGET-1243747,CVE-2021-21391,False,<27.0.0 ,https://github.com/ckeditor/ckeditor5/commit/e36175e86b7f5ca597b39df6e47112b91ab4e0a0
Regular Expression Denial of Service (ReDoS),@ckeditor/ckeditor5-paste-from-office,https://security.snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5PASTEFROMOFFICE-1243746,CVE-2021-21391,False,<27.0.0 ,https://github.com/ckeditor/ckeditor5/commit/e36175e86b7f5ca597b39df6e47112b91ab4e0a0
Regular Expression Denial of Service (ReDoS),@ckeditor/ckeditor5-media-embed,https://security.snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5MEDIAEMBED-1243745,CVE-2021-21391,False,<27.0.0 ,https://github.com/ckeditor/ckeditor5/commit/e36175e86b7f5ca597b39df6e47112b91ab4e0a0
Regular Expression Denial of Service (ReDoS),@ckeditor/ckeditor5-markdown-gfm,https://security.snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5MARKDOWNGFM-1243744,CVE-2021-21391,False,<27.0.0 ,https://github.com/ckeditor/ckeditor5/commit/e36175e86b7f5ca597b39df6e47112b91ab4e0a0
Regular Expression Denial of Service (ReDoS),@ckeditor/ckeditor5-list,https://security.snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5LIST-1243743,CVE-2021-21391,False,<27.0.0 ,https://github.com/ckeditor/ckeditor5/commit/e36175e86b7f5ca597b39df6e47112b91ab4e0a0
Regular Expression Denial of Service (ReDoS),@ckeditor/ckeditor5-engine,https://security.snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5ENGINE-1243740,CVE-2021-21391,False,<27.0.0 ,https://github.com/ckeditor/ckeditor5/commit/e36175e86b7f5ca597b39df6e47112b91ab4e0a0
Regular Expression Denial of Service (ReDoS),@ckeditor/ckeditor5-image,https://security.snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5IMAGE-1243742,CVE-2021-21391,False,<27.0.0 ,https://github.com/ckeditor/ckeditor5/commit/e36175e86b7f5ca597b39df6e47112b91ab4e0a0
Regular Expression Denial of Service (ReDoS),@ckeditor/ckeditor5-font,https://security.snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5FONT-1243741,CVE-2021-21391,False,<27.0.0 ,https://github.com/ckeditor/ckeditor5/commit/e36175e86b7f5ca597b39df6e47112b91ab4e0a0
Privilege Escalation,isolated-vm,https://security.snyk.io/vuln/SNYK-JS-ISOLATEDVM-1243750,CVE-2021-21413,False,<4.0.0 ,https://github.com/laverdet/isolated-vm/commit/c95b3da54258ce8993fc7ed475fe18e7f321c72c
Cross-site Scripting (XSS),froala-editor,https://security.snyk.io/vuln/SNYK-JS-FROALAEDITOR-1090603,CVE-2021-30109,False,<3.2.7 ,n/a
Information Exposure,node-etsy-client,https://security.snyk.io/vuln/SNYK-JS-NODEETSYCLIENT-1090579,CVE-2021-21421,False,<0.3.0 ,https://github.com/creharmony/node-etsy-client/commit/b4beb8ef080366c1a87dbf9e163051a446acaa7d
Cross-site Scripting (XSS),docsify,https://security.snyk.io/vuln/SNYK-JS-DOCSIFY-1090577,CVE-2021-30074,False,>=4.12.0 <4.12.2 ,n/a
Arbitrary Command Injection,portprocesses,https://security.snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536,CVE-2021-23348,True,<1.0.5 ,https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1
Arbitrary Code Execution,@thi.ng/egf,https://security.snyk.io/vuln/SNYK-JS-THINGEGF-1089810,CVE-2021-21412,False,<0.4.0 ,https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243
Prototype Pollution,mquery,https://security.snyk.io/vuln/SNYK-JS-MQUERY-1089718,,True,<3.2.5 ,https://github.com/aheckmann/mquery/commit/158f059e058579d2d08c2f1380689f5f69336778
Server-side Request Forgery (SSRF),netmask,https://security.snyk.io/vuln/SNYK-JS-NETMASK-1089716,CVE-2021-29418,True,<2.0.1 ,https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4
Arbitrary Command Injection,kill-by-port,https://security.snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531,CVE-2021-23363,True,<0.0.2 ,https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4
Arbitrary Code Injection,underscore,https://security.snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984,CVE-2021-23358,True,>=1.13.0-0 <1.13.0-2 >=1.3.2 <1.12.1 ,https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66
Insecure Randomness,yapi-vendor,https://security.snyk.io/vuln/SNYK-JS-YAPIVENDOR-1089450,CVE-2021-27884,False,<1.10.1 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1087442,CVE-2021-21179,False,<10.4.2 >=11.0.0 <11.4.1 ,n/a
Improper Input Validation,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1086695,CVE-2021-21175,False,<10.4.2 >=11.0.0 <11.4.1 ,n/a
Out-of-Bounds,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1086693,CVE-2021-21169,False,<10.4.2 >=11.0.0 <11.4.1 ,n/a
Access Restriction Bypass,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1086694,CVE-2021-21174,False,<10.4.3 >=11.0.0-beta.1 <11.4.1 ,n/a
Out-of-bounds Write,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1088600,CVE-2021-21166,False,<10.4.1 >=11.0.0 <11.4.1 ,n/a
Insecure Defaults,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1088602,CVE-2021-21172,False,<10.4.1 >=11.0.0 <11.4.1 ,n/a
Prototype Pollution,mongoose,https://security.snyk.io/vuln/SNYK-JS-MONGOOSE-1086688,,True,<5.12.2 ,https://github.com/Automattic/mongoose/commit/3ed44ffa13737be9fc0d709980da9c3c552d54e7
Regular Expression Denial of Service (ReDoS),hosted-git-info,https://security.snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355,CVE-2021-23362,True,>=3.0.0 <3.0.8 <2.8.9 ,https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3
Prototype Pollution,copy-props,https://security.snyk.io/vuln/SNYK-JS-COPYPROPS-1082870,CVE-2020-28503,False,<2.0.5 ,n/a
Arbitrary Code Injection,json,https://security.snyk.io/vuln/SNYK-JS-JSON-1082930,,True,<11.0.0 ,https://github.com/trentm/json/commit/4114e321b02371c8e972ac42a8d43fa0ff6d3e3a
Arbitrary Command Injection,killport,https://security.snyk.io/vuln/SNYK-JS-KILLPORT-1078535,CVE-2021-23360,True,<1.0.2 ,https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638
Prototype Pollution,convict,https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508,,False,<6.0.1 ,n/a
Regular Expression Denial of Service (ReDoS),es6-crawler-detect,https://security.snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529,CVE-2020-28501,False,<3.1.3 ,n/a
Regular Expression Denial of Service (ReDoS),schema-inspector,https://security.snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-1088010,CVE-2021-21267,False,<2.0.0 ,https://github.com/schema-inspector/schema-inspector/commit/49fa4b7f081880f1d741a164c663caa8e2c6d129
LDAP Injection,redash,https://security.snyk.io/vuln/SNYK-JS-REDASH-1087439,CVE-2020-36144,False,* ,n/a
Command Injection,eslint-fixer,https://security.snyk.io/vuln/SNYK-JS-ESLINTFIXER-1087438,CVE-2021-26275,False,* ,n/a
Arbitrary Code Execution,shescape,https://security.snyk.io/vuln/SNYK-JS-SHESCAPE-1087427,CVE-2021-21384,False,<1.1.3 ,https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b
Directory Traversal,wazuh,https://security.snyk.io/vuln/SNYK-JS-WAZUH-1087421,CVE-2021-26814,True,<4.0.4 ,n/a
Prototype Pollution,patchmerge,https://security.snyk.io/vuln/SNYK-JS-PATCHMERGE-1086585,CVE-2021-25916,True,<1.0.2 ,https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12
Arbitrary Command Injection,port-killer,https://security.snyk.io/vuln/SNYK-JS-PORTKILLER-1078533,CVE-2021-23359,True,* ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1085705,CVE-2021-21193,False,>=11.0.0-beta.1 <11.4.0 <10.4.1 ,n/a
Heap Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1085647,CVE-2021-21160,False,>=11.0.0-beta.1 <11.4.0 <10.4.1 ,n/a
Information Exposure,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1085998,CVE-2021-21181,False,>=11.0.0-beta.1 <11.4.0 <10.4.1 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1085994,CVE-2021-21162,False,>=11.0.0-beta.1 <11.4.0 <10.4.1 ,n/a
Out-of-Bounds,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1085996,CVE-2021-21165,False,>=11.0.0-beta.1 <11.4.0 <10.4.1 ,n/a
Prototype Pollution,node-dig,https://security.snyk.io/vuln/SNYK-JS-NODEDIG-1069825,,True,* ,n/a
Prototype Pollution,@lyngs/digger,https://security.snyk.io/vuln/SNYK-JS-LYNGSDIGGER-1069826,,True,* ,n/a
Prototype Pollution,@lyngs/merge,https://security.snyk.io/vuln/SNYK-JS-LYNGSMERGE-1069823,,True,* ,n/a
Arbitrary Command Injection,kill-process-by-name,https://security.snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534,CVE-2021-23356,True,* ,n/a
Arbitrary Command Injection,ps-kill,https://security.snyk.io/vuln/SNYK-JS-PSKILL-1078529,CVE-2021-23355,True,* ,n/a
Cross-site Scripting (XSS),@wiptheia/core,https://security.snyk.io/vuln/SNYK-JS-WIPTHEIACORE-1085626,CVE-2021-28161,False,* ,n/a
Regular Expression Denial of Service (ReDoS),is-svg,https://security.snyk.io/vuln/SNYK-JS-ISSVG-1085627,CVE-2021-28092,False,>=2.1.0 <4.2.2 ,https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b
Prototype Pollution,plain-object-merge,https://security.snyk.io/vuln/SNYK-JS-PLAINOBJECTMERGE-1085643,,False,<1.0.2 ,https://github.com/fabiospampinato/plain-object-merge/commit/e2b59efa2216957815643c48797e2e2eae8ca2b2
Prototype Pollution,msgpack5,https://security.snyk.io/vuln/SNYK-JS-MSGPACK5-1085640,CVE-2021-21368,False,>=5.0.0 <5.2.1 >=4.0.0 <4.5.1 <3.6.1 ,https://github.com/mcollina/msgpack5/commit/2f3ade7a0bbb315d467141409bc956fa8742ab3f
Authentication Bypass,@solid/identity-token-verifier,https://security.snyk.io/vuln/SNYK-JS-SOLIDIDENTITYTOKENVERIFIER-1085639,,False,<0.5.2 ,https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c
Remote Code Execution (RCE),nobelprizeparser,https://security.snyk.io/vuln/SNYK-JS-NOBELPRIZEPARSER-1085638,,False,* ,https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286
Information Exposure,highcharts-export-server,https://security.snyk.io/vuln/SNYK-JS-HIGHCHARTSEXPORTSERVER-1085635,,False,<2.1.0 ,https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6
Cross-site Scripting (XSS),@wiptheia/core,https://security.snyk.io/vuln/SNYK-JS-WIPTHEIACORE-1085632,CVE-2021-28162,False,* ,n/a
Cross-site Scripting (XSS),mongo-express,https://security.snyk.io/vuln/SNYK-JS-MONGOEXPRESS-1085402,,False,<1.0.0-alpha.2 ,https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b
Regular Expression Denial of Service (ReDoS),printf,https://security.snyk.io/vuln/SNYK-JS-PRINTF-1072096,CVE-2021-23354,False,<0.6.1 ,n/a
Regular Expression Denial of Service (ReDoS),color-string,https://security.snyk.io/vuln/SNYK-JS-COLORSTRING-1082939,CVE-2021-29060,True,<1.5.5 ,n/a
Prototype Pollution,style-dictionary,https://security.snyk.io/vuln/SNYK-JS-STYLEDICTIONARY-1080632,,True,<2.10.3 ,n/a
Prototype Pollution,changeset,https://security.snyk.io/vuln/SNYK-JS-CHANGESET-1083989,CVE-2021-25915,False,>=0.1.0 <0.2.6 ,https://github.com/eugeneware/changeset/commit/9e588844edbb9993b32e7366cc799262b4447f99
XML External Entity (XXE) Injection,xmldom,https://security.snyk.io/vuln/SNYK-JS-XMLDOM-1084960,CVE-2021-21366,False,<0.5.0 ,https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135
Command Injection,react-dev-utils,https://security.snyk.io/vuln/SNYK-JS-REACTDEVUTILS-1083268,CVE-2021-24033,False,<11.0.4 ,n/a
Regular Expression Denial of Service (ReDoS),jspdf,https://security.snyk.io/vuln/SNYK-JS-JSPDF-1073626,CVE-2021-23353,False,<2.3.1 ,https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e
Cross-site Scripting (XSS),shiba,https://security.snyk.io/vuln/SNYK-JS-SHIBA-1083282,,True,<1.1.1 ,n/a
Improper Authentication,botframework-connector,https://security.snyk.io/vuln/SNYK-JS-BOTFRAMEWORKCONNECTOR-1083277,CVE-2021-1725,False,>=4.10.0 <4.10.3 >=4.9.0 <4.9.4 >=4.8.0 <4.8.1 >=4.7.0 <4.7.3 ,n/a
Cross-site Scripting (XSS),moemark,https://security.snyk.io/vuln/SNYK-JS-MOEMARK-1083284,,True,* ,n/a
Command Injection,madge,https://security.snyk.io/vuln/SNYK-JS-MADGE-1082875,CVE-2021-23352,True,<4.0.1 ,https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332
Open Redirect,ghost,https://security.snyk.io/vuln/SNYK-JS-GHOST-1065888,,False,<3.41.1 ,https://github.com/TryGhost/Ghost/commit/cd27cba93d80c493b0630ecf7034884195da3f35
Malicious Package,paychex-framework-core-ui,https://security.snyk.io/vuln/SNYK-JS-PAYCHEXFRAMEWORKCOREUI-1083214,,False,* ,n/a
Malicious Package,paychex-common-npm,https://security.snyk.io/vuln/SNYK-JS-PAYCHEXCOMMONNPM-1083213,,False,* ,n/a
Malicious Package,paychex-app-common-html,https://security.snyk.io/vuln/SNYK-JS-PAYCHEXAPPCOMMONHTML-1083210,,False,* ,n/a
Malicious Package,paychex-framework-forms,https://security.snyk.io/vuln/SNYK-JS-PAYCHEXFRAMEWORKFORMS-1083215,,False,* ,n/a
Malicious Package,paychex-framework,https://security.snyk.io/vuln/SNYK-JS-PAYCHEXFRAMEWORK-1083211,,False,* ,n/a
Malicious Package,paychex-framework-approvals,https://security.snyk.io/vuln/SNYK-JS-PAYCHEXFRAMEWORKAPPROVALS-1083212,,False,* ,n/a
Cross-site Scripting (XSS),ansi_up,https://security.snyk.io/vuln/SNYK-JS-ANSIUP-1083203,CVE-2021-3377,False,>=4.0.3 <5.0.0 ,https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27
Malicious Package,rcenodejs,https://security.snyk.io/vuln/SNYK-JS-RCENODEJS-1083216,,False,* ,n/a
Arbitrary Code Injection,xmlhttprequest-ssl,https://security.snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936,CVE-2020-28502,False,<1.6.2 ,https://github.com/driverdan/node-XMLHttpRequest/commit/983cfc244c7567ad6a59e366e55a8037e0497fe6
Arbitrary Code Injection,xmlhttprequest,https://security.snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935,CVE-2020-28502,False,<1.7.0 ,https://github.com/driverdan/node-XMLHttpRequest/commit/983cfc244c7567ad6a59e366e55a8037e0497fe6
Arbitrary Code Injection,alasql,https://security.snyk.io/vuln/SNYK-JS-ALASQL-1082932,,False,<0.7.0 ,https://github.com/agershun/alasql/commit/602f9a29b9b4c38a1fe80bb511402c5d92e0d569
Prototype Pollution,msgpack5,https://security.snyk.io/vuln/SNYK-JS-MSGPACK5-1082876,,False,>=5.0.0 <5.2.1 >=4.0.0 <4.5.1 <3.6.1 ,n/a
Malicious Package,radar-cms,https://security.snyk.io/vuln/SNYK-JS-RADARCMS-1082856,,True,* ,n/a
Remote Code Execution (RCE),total.js,https://security.snyk.io/vuln/SNYK-JS-TOTALJS-1077069,CVE-2021-23344,True,<3.4.8 ,https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04
Server-side Request Forgery (SSRF),systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1078290,,True,<5.3.4 ,https://github.com/sebhildebrandt/systeminformation/commit/881dde4734988e16c57c1d571651b7461fb0d88e
Malicious Package,amzn,https://security.snyk.io/vuln/SNYK-JS-AMZN-1080917,,False,* ,n/a
Malicious Package,lyft-dataset-sdk,https://security.snyk.io/vuln/SNYK-JS-LYFTDATASETSDK-1080919,,False,* ,n/a
Malicious Package,zg-rentals,https://security.snyk.io/vuln/SNYK-JS-ZGRENTALS-1080918,,False,* ,n/a
Malicious Package,serverless-slack-app,https://security.snyk.io/vuln/SNYK-JS-SERVERLESSSLACKAPP-1080920,,False,* ,n/a
Improper Input Validation,fastify-reply-from,https://security.snyk.io/vuln/SNYK-JS-FASTIFYREPLYFROM-1080744,CVE-2021-21321,False,<4.0.2 ,https://github.com/fastify/fastify-reply-from/commit/641be7591f5138bb74c19c08128b234de8b3854a
Improper Input Validation,fastify-http-proxy,https://security.snyk.io/vuln/SNYK-JS-FASTIFYHTTPPROXY-1080743,CVE-2021-21322,False,<4.3.1 ,https://github.com/fastify/fastify-http-proxy/commit/02d9b43c770aa16bc44470edecfaeb7c17985016
Sandbox Bypass,matrix-react-sdk,https://security.snyk.io/vuln/SNYK-JS-MATRIXREACTSDK-1080741,CVE-2021-21320,False,<3.15.0 ,https://github.com/matrix-org/matrix-react-sdk/commit/b386f0c73b95ecbb6ea7f8f79c6ff5171a8dedd1
Prototype Pollution,object-collider,https://security.snyk.io/vuln/SNYK-JS-OBJECTCOLLIDER-1080739,CVE-2021-25914,False,>=1.0.0 <1.0.4 ,https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5
Regular Expression Denial of Service (ReDoS),html-parse-stringify,https://security.snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306,CVE-2021-23346,False,<2.0.1 ,https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12
Regular Expression Denial of Service (ReDoS),html-parse-stringify2,https://security.snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307,CVE-2021-23346,False,* ,https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12
Prototype Pollution,prototyped.js,https://security.snyk.io/vuln/SNYK-JS-PROTOTYPEDJS-1069824,,True,<2.0.1 ,https://github.com/ardalanamini/prototyped.js/commit/3ab56e78250d3d5b44ac03938d3d04591b206730
Remote Code Execution (RCE),pug,https://security.snyk.io/vuln/SNYK-JS-PUG-1071616,CVE-2021-21353,False,<3.0.1 ,https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0
Remote Code Execution (RCE),pug-code-gen,https://security.snyk.io/vuln/SNYK-JS-PUGCODEGEN-1082232,CVE-2021-21353,False,<2.0.3 >=3.0.0 <3.0.2 ,https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0
Prototype Pollution,@node-red/runtime,https://security.snyk.io/vuln/SNYK-JS-NODEREDRUNTIME-1080614,CVE-2021-21297,False,<1.2.8 ,n/a
Prototype Pollution,@node-red/editor-api,https://security.snyk.io/vuln/SNYK-JS-NODEREDEDITORAPI-1080621,CVE-2021-21297,False,<1.2.8 ,n/a
Directory Traversal,@node-red/runtime,https://security.snyk.io/vuln/SNYK-JS-NODEREDRUNTIME-1080615,CVE-2021-21298,False,<1.2.8 ,https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456
Prototype Pollution,rfc6902,https://security.snyk.io/vuln/SNYK-JS-RFC6902-1053318,,True,<5.0.0 ,n/a
Man-in-the-Middle (MitM),mongodb-client-encryption,https://security.snyk.io/vuln/SNYK-JS-MONGODBCLIENTENCRYPTION-1079243,CVE-2021-20327,False,<1.2.1 ,https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b
Denial of Service (DoS),restify-paginate,https://security.snyk.io/vuln/SNYK-JS-RESTIFYPAGINATE-1079238,CVE-2020-27543,False,* ,n/a
Prototype Pollution,nunjucks,https://security.snyk.io/vuln/SNYK-JS-NUNJUCKS-1079083,,False,<3.2.3 ,n/a
Cross-site Scripting (XSS),@theia/preview,https://security.snyk.io/vuln/SNYK-JS-THEIAPREVIEW-1079037,CVE-2020-27224,False,<1.3.0 ,https://github.com/eclipse-theia/theia/commit/309b21892eedfadf0cd559afff64a26750933c4f
Command Injection,theme-core,https://security.snyk.io/vuln/SNYK-JS-THEMECORE-1050425,CVE-2020-28432,True,* ,n/a
Command Injection,wc-cmd,https://security.snyk.io/vuln/SNYK-JS-WCCMD-1050423,CVE-2020-28431,True,* ,n/a
Command Injection,geojson2kml,https://security.snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412,CVE-2020-28429,True,* ,n/a
Prototype Pollution,merge,https://security.snyk.io/vuln/SNYK-JS-MERGE-1042987,CVE-2020-28499,True,<2.1.1 ,https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4
Server-side Request Forgery (SSRF),rendertron,https://security.snyk.io/vuln/SNYK-JS-RENDERTRON-1078501,CVE-2020-8902,False,<3.0.0 ,https://github.com/GoogleChrome/rendertron/commit/8aeeda7765101b705d5c8c2801ec81c1d43df40e
Improper Input Validation,urijs,https://security.snyk.io/vuln/SNYK-JS-URIJS-1078286,CVE-2021-27516,False,<1.19.6 ,https://github.com/medialize/URI.js/commit/a1ad8bcbc39a4d136d7e252e76e957f3ece70839
Improper Input Validation,url-parse,https://security.snyk.io/vuln/SNYK-JS-URLPARSE-1078283,CVE-2021-27515,False,<1.5.0 ,https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0
Cross-site Scripting (XSS),@stoplight/markdown,https://security.snyk.io/vuln/SNYK-JS-STOPLIGHTMARKDOWN-1078260,,True,<2.11.0 ,n/a
Buffer Overflow,png-img,https://security.snyk.io/vuln/SNYK-JS-PNGIMG-1078233,CVE-2020-28248,False,<3.1.0 ,https://github.com/gemini-testing/png-img/commit/14ac462a32ca4b3b78f56502ac976d5b0222ce3d
Prototype Pollution,tree-kit,https://security.snyk.io/vuln/SNYK-JS-TREEKIT-1077068,,True,<0.7.0 ,n/a
Regular Expression Denial of Service (ReDoS),@progfay/scrapbox-parser,https://security.snyk.io/vuln/SNYK-JS-PROGFAYSCRAPBOXPARSER-1076803,CVE-2021-27405,False,<6.0.3 ,n/a
Cross-site Scripting (XSS),docsify,https://security.snyk.io/vuln/SNYK-JS-DOCSIFY-1066017,CVE-2021-23342,True,<4.12.1 ,https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe
Regular Expression Denial of Service (ReDoS),prismjs,https://security.snyk.io/vuln/SNYK-JS-PRISMJS-1076581,CVE-2021-23341,False,<1.23.0 ,https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609
Arbitrary Code Execution,label-studio,https://security.snyk.io/vuln/SNYK-JS-LABELSTUDIO-1075517,,False,<0.9.1 ,n/a
Cross-site Scripting (XSS),admin-lte,https://security.snyk.io/vuln/SNYK-JS-ADMINLTE-1047343,,False,<3.1.0 ,n/a
Prototype Pollution,i18next,https://security.snyk.io/vuln/SNYK-JS-I18NEXT-1065979,,False,<19.8.5 ,https://github.com/i18next/i18next/commit/932f5f662893376254d826e9b01dc4e4c0cd91c0
Directory Traversal,adm-zip,https://security.snyk.io/vuln/SNYK-JS-ADMZIP-1065796,,False,<0.5.2 ,https://github.com/cthackers/adm-zip/commit/119dcad6599adccc77982feb14a0c7440fa63013
Remote Code Execution (RCE),handlebars,https://security.snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767,CVE-2021-23369,False,<4.7.7 ,https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8
Command Injection,lodash,https://security.snyk.io/vuln/SNYK-JS-LODASH-1040724,CVE-2021-23337,True,<4.17.21 ,https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c
Command Injection,lodash.template,https://security.snyk.io/vuln/SNYK-JS-LODASHTEMPLATE-1088054,CVE-2021-23337,True,* ,https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c
Regular Expression Denial of Service (ReDoS),lodash,https://security.snyk.io/vuln/SNYK-JS-LODASH-1018905,CVE-2020-28500,False,<4.17.21 ,https://github.com/lodash/lodash/commit/c4847ebe7d14540bb28a8b932a9ce1b9ecbfee1a
Command Injection,systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1074913,CVE-2021-21315,True,<4.34.11 >=5.0.0 <5.3.1 ,n/a
Denial of Service (DoS),systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1073627,,False,<4.34.10 ,https://github.com/sebhildebrandt/systeminformation/commit/a23b8f0a0ad83b1adf1bb13263a610f853949aa8
Denial of Service (DoS),get-ip-range,https://security.snyk.io/vuln/SNYK-JS-GETIPRANGE-1073612,CVE-2021-27191,False,<4.0.0 ,https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6
Regular Expression Denial of Service (ReDoS),ua-parser-js,https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-1072471,CVE-2021-27292,False,<0.7.24 ,https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566
Improper Access Control,next-auth,https://security.snyk.io/vuln/SNYK-JS-NEXTAUTH-1072465,CVE-2021-21310,False,<3.3.0 ,n/a
Directory Traversal,ftp-srv,https://security.snyk.io/vuln/SNYK-JS-FTPSRV-1071861,CVE-2020-26299,False,<4.4.0 ,https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3
Command Injection,samba-client,https://security.snyk.io/vuln/SNYK-JS-SAMBACLIENT-1071899,CVE-2021-27185,False,<4.0.0 ,https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235
LDAP Injection,is-user-valid,https://security.snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766,CVE-2021-23335,False,* ,n/a
Cross-site Scripting (XSS),@angular/core,https://security.snyk.io/vuln/SNYK-JS-ANGULARCORE-1070902,,False,<11.0.5 >=11.1.0-next.0 <11.1.0-next.3 ,https://github.com/angular/angular/commit/0fc8466f1be392917e0c7e3448b2144d52286b56
Command Injection,spritesheet-js,https://security.snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333,CVE-2020-7782,True,* ,n/a
Command Injection,macfromip,https://security.snyk.io/vuln/SNYK-JS-MACFROMIP-1048336,CVE-2020-7786,True,* ,https://github.com/bcamarneiro/macfromip/commit/1bbed8cd6f8299ad2e9d028e0ed0771340ab8391
Cross-site Scripting (XSS),apexcharts,https://security.snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708,CVE-2021-23327,False,<3.24.0 ,https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19
Command Injection,node-ps,https://security.snyk.io/vuln/SNYK-JS-NODEPS-1048335,CVE-2020-7785,True,* ,n/a
Access Restriction Bypass,sanitize-html,https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-1070786,CVE-2021-26539,False,<2.3.1 ,n/a
Prototype Pollution,set-or-get,https://security.snyk.io/vuln/SNYK-JS-SETORGET-1070806,CVE-2021-25913,False,>=1.0.0 <1.2.11 ,https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936
Command Injection,gitlog,https://security.snyk.io/vuln/SNYK-JS-GITLOG-1070779,CVE-2021-26541,True,>=3.3.0 <4.0.4 ,n/a
Regular Expression Denial of Service (ReDoS),marked,https://security.snyk.io/vuln/SNYK-JS-MARKED-1070800,CVE-2021-21306,False,>=1.1.2 <2.0.0 ,https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd
Prototype Pollution,dynamoose,https://security.snyk.io/vuln/SNYK-JS-DYNAMOOSE-1070792,CVE-2021-21304,False,>=2.0.0 <2.7.0 ,https://github.com/dynamoose/dynamoose/commit/324c62b4709204955931a187362f8999805b1d8e
Validation Bypass,sanitize-html,https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-1070780,CVE-2021-26540,False,<2.3.2 ,https://github.com/apostrophecms/sanitize-html/commit/6012524e7824a2c8f6782b2bc5f93b1261723403
Open Redirect,slashify,https://security.snyk.io/vuln/SNYK-JS-SLASHIFY-1070404,CVE-2021-3189,False,* ,n/a
Prototype Pollution,highcharts,https://security.snyk.io/vuln/SNYK-JS-HIGHCHARTS-1018906,,True,<9.0.0 ,https://github.com/highcharts/highcharts/commit/fead359b37079482994ee86c2e2e60fbb02ffcb8
Prototype Pollution,merge-deep,https://security.snyk.io/vuln/SNYK-JS-MERGEDEEP-1070277,CVE-2021-26707,True,<3.0.3 ,https://github.com/jonschlinkert/merge-deep/commit/e370968581413a2e5ffdbbf7c2f5094e0e0b3861
Prototype Pollution,decal,https://security.snyk.io/vuln/SNYK-JS-DECAL-1051028,CVE-2020-28450,True,* ,n/a
Prototype Pollution,decal,https://security.snyk.io/vuln/SNYK-JS-DECAL-1051007,CVE-2020-28449,True,* ,n/a
Malicious Package,jquerry,https://security.snyk.io/vuln/SNYK-JS-JQUERRY-1070024,,False,* ,n/a
Malicious Package,http-proxy-middelware,https://security.snyk.io/vuln/SNYK-JS-HTTPPROXYMIDDELWARE-1070025,,False,* ,n/a
Cross-site Scripting (XSS),ngx-markdown-editor,https://security.snyk.io/vuln/SNYK-JS-NGXMARKDOWNEDITOR-1070023,,False,<3.3.0 ,https://github.com/lon-yang/ngx-markdown-editor/commit/151151420d562d4203208f0b64a4ffa445188403
Insufficient Validation,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1070014,CVE-2021-21118,False,<9.4.2 >=10.0.0 <10.3.1 >=11.0.0 <11.2.2 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1070013,CVE-2020-16044,False,<9.4.2 >=10.0.0 <10.3.1 <11.2.2 ,n/a
Prototype Pollution,dotty,https://security.snyk.io/vuln/SNYK-JS-DOTTY-1069933,CVE-2021-25912,False,<0.1.1 ,https://github.com/deoxxa/dotty/commit/cd997d37917186c131be71501a698803f2b7ebdb
Regular Expression Denial of Service (ReDoS),uap-core,https://security.snyk.io/vuln/SNYK-JS-UAPCORE-1069889,CVE-2021-21317,False,<0.11.0 ,https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1070015,CVE-2021-21122,False,<9.4.2 >=10.0.0 <10.3.1 >=11.0.0 <11.2.2 ,n/a
Cross-site Scripting (XSS),tui-editor,https://security.snyk.io/vuln/SNYK-JS-TUIEDITOR-1069818,,False,* ,n/a
Cryptographic Issues,elliptic,https://security.snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899,CVE-2020-28498,False,<6.5.4 ,https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f
Command Injection,freediskspace,https://security.snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716,CVE-2020-7775,False,* ,n/a
SQL Injection,thinkjs,https://security.snyk.io/vuln/SNYK-JS-THINKJS-1066412,CVE-2020-21176,False,* ,n/a
Remote Code Execution (RCE),angular-expressions,https://security.snyk.io/vuln/SNYK-JS-ANGULAREXPRESSIONS-1066409,CVE-2021-21277,False,<1.1.2 ,https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1
Cross-site Scripting (XSS),vue-devtools,https://security.snyk.io/vuln/SNYK-JS-VUEDEVTOOLS-1066258,,False,* ,https://github.com/vuejs/vue-devtools/commit/fa17699aba2bd9c76dd86d63143b9a28d1d3b05f
Command Injection,launchpad,https://security.snyk.io/vuln/SNYK-JS-LAUNCHPAD-1044065,CVE-2021-23330,False,* ,n/a
Command Injection,kill-process-on-port,https://security.snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458,CVE-2020-28426,True,* ,n/a
Regular Expression Denial of Service (ReDoS),@ckeditor/ckeditor5-markdown-gfm,https://security.snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5MARKDOWNGFM-1066168,CVE-2021-21254,False,<25.0.0 ,https://github.com/ckeditor/ckeditor5/commit/5ba3bf5f418e846b74f67e6c29b4aebdbd7ceaab#diff-ac03a6e19230dc6b9b2963e66deca333b4d4cceb93bafbeeaa74514363cb4afb
Prototype Pollution,nested-object-assign,https://security.snyk.io/vuln/SNYK-JS-NESTEDOBJECTASSIGN-1065977,CVE-2021-23329,True,<1.0.4 ,n/a
Arbitrary Code Execution,less-openui5,https://security.snyk.io/vuln/SNYK-JS-LESSOPENUI5-1066165,CVE-2021-21316,False,<0.10.0 ,https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8
Prototype Pollution,iniparserjs,https://security.snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989,CVE-2021-23328,True,* ,n/a
Information Exposure,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1065981,CVE-2020-26272,False,<9.4.0 >=10.0.0 <10.2.0 >=11.0.0 <11.1.0 >=12.0.0-beta.1 <12.0.0-beta.9 ,https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c
Regular Expression Denial of Service (ReDoS),three,https://security.snyk.io/vuln/SNYK-JS-THREE-1064931,CVE-2020-28496,True,<0.125.0 ,https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e
Open Redirect,ghost,https://security.snyk.io/vuln/SNYK-JS-GHOST-1065967,,False,<2.38.3 ,https://github.com/TryGhost/Ghost/commit/cd27cba93d80c493b0630ecf7034884195da3f35
Prototype Pollution,total.js,https://security.snyk.io/vuln/SNYK-JS-TOTALJS-1046671,CVE-2020-28495,True,<3.4.7 ,https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff
Command Injection,total.js,https://security.snyk.io/vuln/SNYK-JS-TOTALJS-1046672,CVE-2020-28494,True,<3.4.7 ,https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5
Remote Code Execution (RCE),config-shield,https://security.snyk.io/vuln/SNYK-JS-CONFIGSHIELD-1065803,CVE-2021-26276,False,<0.2.3 ,https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6
Improper Synchronization,@openzeppelin/contracts,https://security.snyk.io/vuln/SNYK-JS-OPENZEPPELINCONTRACTS-1065254,,False,<3.4.0-rc.0 ,https://github.com/OpenZeppelin/openzeppelin-contracts/commit/3b4c951838ddf82f4d2b44ae7c967f0573039f28
Directory Traversal,node-red-contrib-huemagic,https://security.snyk.io/vuln/SNYK-JS-NODEREDCONTRIBHUEMAGIC-1065271,CVE-2021-25864,False,<4.0.0 ,n/a
Directory Traversal,node-red-dashboard,https://security.snyk.io/vuln/SNYK-JS-NODEREDDASHBOARD-1065260,CVE-2021-3223,False,<2.26.2 ,https://github.com/node-red/node-red-dashboard/commit/5b0e45a5646a011251691d063f1c01b6dd3a8079
Regular Expression Denial of Service (ReDoS),ckeditor4-dev,https://security.snyk.io/vuln/SNYK-JS-CKEDITOR4DEV-1065331,CVE-2021-26272,False,<4.16.0 ,https://github.com/ckeditor/ckeditor4/commit/51ea7dadff20737a6a3fb86ec64a5d2f6bcebedf
Command Injection,rsshub,https://security.snyk.io/vuln/SNYK-JS-RSSHUB-1065277,CVE-2021-21278,False,<1.0.0-master.4db1c91 ,https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d
Command Injection,heroku-env,https://security.snyk.io/vuln/SNYK-JS-HEROKUENV-1050432,CVE-2020-28437,True,* ,n/a
Command Injection,ffmpeg-sdk,https://security.snyk.io/vuln/SNYK-JS-FFMPEGSDK-1050429,CVE-2020-28435,True,* ,n/a
Command Injection,gitblame,https://security.snyk.io/vuln/SNYK-JS-GITBLAME-1050430,CVE-2020-28434,True,* ,n/a
Command Injection,npm-help,https://security.snyk.io/vuln/SNYK-JS-NPMHELP-1050983,CVE-2020-28445,True,* ,n/a
Command Injection,xopen,https://security.snyk.io/vuln/SNYK-JS-XOPEN-1050981,CVE-2020-28447,True,* ,n/a
Command Injection,sonar-wrapper,https://security.snyk.io/vuln/SNYK-JS-SONARWRAPPER-1050980,CVE-2020-28443,True,* ,n/a
Command Injection,async-git,https://security.snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877,CVE-2020-28490,False,<1.13.2 ,https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d
Command Injection,ntesseract,https://security.snyk.io/vuln/SNYK-JS-NTESSERACT-1050982,CVE-2020-28446,True,<0.2.9 ,https://github.com/taoyuan/ntesseract/commit/fcbc36f381798b4362179c0cdf9961b437c7b619
Command Injection,deferred-exec,https://security.snyk.io/vuln/SNYK-JS-DEFERREDEXEC-1050433,CVE-2020-28438,True,* ,n/a
Command Injection,npos-tesseract,https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031,CVE-2020-28453,True,* ,n/a
Improper Input Validation,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1064555,CVE-2021-21141,True,>=10.0.0-beta.1 <11.2.1 <9.4.4 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1064561,CVE-2021-21120,False,>=10.0.0-beta.1 <11.2.1 <9.4.4 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1064558,CVE-2021-21119,False,>=10.0.0-beta.1 <11.2.1 <9.4.4 ,n/a
Cross-site Scripting (XSS),vis-timeline,https://security.snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500,CVE-2020-28487,True,<7.4.4 ,n/a
Command Injection,async-git,https://security.snyk.io/vuln/SNYK-JS-ASYNCGIT-1063505,CVE-2021-3190,False,<1.13.1 ,n/a
Command Injection,node-latex-pdf,https://security.snyk.io/vuln/SNYK-JS-NODELATEXPDF-1050426,CVE-2020-28433,True,* ,n/a
Command Injection,lycwed-spritesheetjs,https://security.snyk.io/vuln/SNYK-JS-LYCWEDSPRITESHEETJS-1050428,,True,* ,n/a
Command Injection,monorepo-build,https://security.snyk.io/vuln/SNYK-JS-MONOREPOBUILD-1050392,CVE-2020-28423,True,* ,n/a
Command Injection,git-archive,https://security.snyk.io/vuln/SNYK-JS-GITARCHIVE-1050391,CVE-2020-28422,False,* ,n/a
Command Injection,s3-kilatstorage,https://security.snyk.io/vuln/SNYK-JS-S3KILATSTORAGE-1050396,CVE-2020-28424,True,* ,n/a
Command Injection,curljs,https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404,CVE-2020-28425,True,* ,n/a
Command Injection,get-npm-package-version,https://security.snyk.io/vuln/SNYK-JS-GETNPMPACKAGEVERSION-1050390,CVE-2020-7795,True,<1.0.7 ,https://github.com/hoperyy/get-npm-package-version/commit/40b1cf31a0607ea66f9e30a0c3af1383b52b2dec
Malicious Package,an0n-chat-lib,https://security.snyk.io/vuln/SNYK-JS-AN0NCHATLIB-1063033,,False,* ,n/a
Malicious Package,discord-fix,https://security.snyk.io/vuln/SNYK-JS-DISCORDFIX-1063034,,False,* ,n/a
Malicious Package,sonatype,https://security.snyk.io/vuln/SNYK-JS-SONATYPE-1063035,,False,* ,n/a
Arbitrary Code Injection,ejs,https://security.snyk.io/vuln/SNYK-JS-EJS-1049328,,False,<3.1.6 ,https://github.com/mde/ejs/commit/abaee2be937236b1b8da9a1f55096c17dda905fd
Command Injection,@graphql-tools/git-loader,https://security.snyk.io/vuln/SNYK-JS-GRAPHQLTOOLSGITLOADER-1062543,CVE-2021-23326,False,<6.2.6 ,https://github.com/ardatan/graphql-tools/commit/6a966beee8ca8b2f4adfe93318b96e4a5c501eac
Denial of Service (DoS),jointjs,https://security.snyk.io/vuln/SNYK-JS-JOINTJS-1062038,CVE-2020-28479,True,<3.3.0 ,n/a
Prototype Pollution,jointjs,https://security.snyk.io/vuln/SNYK-JS-JOINTJS-1024444,CVE-2020-28480,True,<3.3.0 ,n/a
Cross-site Request Forgery (CSRF),fastify-csrf,https://security.snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044,CVE-2020-28482,False,<3.0.0 ,n/a
Prototype Pollution,gsap,https://security.snyk.io/vuln/SNYK-JS-GSAP-1054614,CVE-2020-28478,True,<3.6.0 ,n/a
Prototype Pollution,immer,https://security.snyk.io/vuln/SNYK-JS-IMMER-1019369,CVE-2020-28477,True,<8.0.1 ,https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5
Regular Expression Denial of Service (ReDoS),jquery-validation,https://security.snyk.io/vuln/SNYK-JS-JQUERYVALIDATION-1056868,CVE-2021-21252,False,<1.19.3 ,https://github.com/jquery-validation/jquery-validation/pull/2371/commits/5e5641072312845b9130ed06f115816c8f0e6b3c
Remote Code Execution (RCE),arpping,https://security.snyk.io/vuln/SNYK-JS-ARPPING-1060047,,True,<3.0.0 ,https://github.com/haf-decent/arpping/commit/0db06723f8c3c73a5cc0829c667d45cba25ca44d
Remote Code Execution,curling,https://security.snyk.io/vuln/SNYK-JS-CURLING-1060043,,True,* ,n/a
Remote Code Execution,imagickal,https://security.snyk.io/vuln/SNYK-JS-IMAGICKAL-1060040,,True,* ,n/a
Cross-site Scripting (XSS),dy-server2,https://security.snyk.io/vuln/SNYK-JS-DYSERVER2-1060044,,True,* ,n/a
Prototype Pollution,aws-sdk,https://security.snyk.io/vuln/SNYK-JS-AWSSDK-1059424,CVE-2020-28472,True,<2.814.0 ,https://github.com/aws/aws-sdk-js/pull/3585/commits/7d72aff2a941173733fcb6741b104cd83d3bc611
Prototype Pollution,@aws-sdk/shared-ini-file-loader,https://security.snyk.io/vuln/SNYK-JS-AWSSDKSHAREDINIFILELOADER-1049304,CVE-2020-28472,True,<1.0.0-rc.9 ,https://github.com/aws/aws-sdk-js/pull/3585/commits/7d72aff2a941173733fcb6741b104cd83d3bc611
Prototype Pollution,properties-reader,https://security.snyk.io/vuln/SNYK-JS-PROPERTIESREADER-1048968,CVE-2020-28471,True,<2.2.0 ,https://github.com/steveukx/properties/commit/0877cc871db9865f58dd9389ce99e61be05380a5
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1050999,CVE-2020-16037,False,<9.4.1 >=10.0.0 <10.3.2 ,https://github.com/electron/electron/commit/435f831a391960e693b1a441a691049fb8d268f3
Out-of-bounds Read,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1051000,CVE-2020-16041,False,<9.4.1 >=10.0.0 <10.3.2 ,https://github.com/electron/electron/commit/1df71df4f9648b0530cbc9fe4f460f2020a5050f
Regular Expression Denial of Service (ReDoS),glob-parent,https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905,CVE-2020-28469,True,<5.1.2 ,n/a
Improper Certificate Validation,node-sass,https://security.snyk.io/vuln/SNYK-JS-NODESASS-1059081,CVE-2020-24025,False,>=2.0.0 <7.0.0 ,n/a
Denial of Service (DoS),engine.io,https://security.snyk.io/vuln/SNYK-JS-ENGINEIO-1056749,CVE-2020-36048,True,<4.0.0 ,https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b
Denial of Service (DoS),socket.io-parser,https://security.snyk.io/vuln/SNYK-JS-SOCKETIOPARSER-1056752,CVE-2020-36049,True,<3.3.2 >3.4.0 <3.4.1 ,https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55
Command Injection,ts-process-promises,https://security.snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334,CVE-2020-7784,True,* ,n/a
Command Injection,buns,https://security.snyk.io/vuln/SNYK-JS-BUNS-1050389,CVE-2020-7794,True,* ,n/a
Insecure Defaults,socket.io,https://security.snyk.io/vuln/SNYK-JS-SOCKETIO-1024859,CVE-2020-28481,False,<2.4.0 ,n/a
Arbitrary Code Execution,typescript-tslint-plugin,https://security.snyk.io/vuln/SNYK-JS-TYPESCRIPTTSLINTPLUGIN-1056512,CVE-2020-17150,False,<1.0.0 ,https://github.com/microsoft/typescript-tslint-plugin/commit/2e866e88ce6fad1bb9199dfeb71ead5529e10486
Cross-site Scripting (XSS),tinymce,https://security.snyk.io/vuln/SNYK-JS-TINYMCE-1056408,,False,<5.6.0 ,n/a
Command Injection,image-tiler,https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029,CVE-2020-28451,True,<2.0.2 ,https://github.com/MrP/image-tiler/commit/f4a0b13a4bf43655fc4013e04bbceaf77aecbeb8
Cross-site Scripting (XSS),@scullyio/scully,https://security.snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829,CVE-2020-28470,False,<1.0.9 ,n/a
Command Injection,google-cloudstorage-commands,https://security.snyk.io/vuln/SNYK-JS-GOOGLECLOUDSTORAGECOMMANDS-1050431,CVE-2020-28436,True,* ,n/a
Prototype Pollution,asciitable.js,https://security.snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799,CVE-2020-7771,False,<1.0.3 ,n/a
Remote Code Execution (RCE),djv,https://security.snyk.io/vuln/SNYK-JS-DJV-1014545,CVE-2020-28464,False,<2.1.4 ,n/a
Cross-site Scripting (XSS),vega,https://security.snyk.io/vuln/SNYK-JS-VEGA-1054999,CVE-2020-26296,False,<5.17.3 ,https://github.com/vega/vega/commit/bde41b2cb0bdf282fb9d526462428d1a0e73832d
Improper Input Validation,urijs,https://security.snyk.io/vuln/SNYK-JS-URIJS-1055003,CVE-2020-26291,False,<1.19.4 ,https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155
Prototype Pollution,flattenizer,https://security.snyk.io/vuln/SNYK-JS-FLATTENIZER-1054934,CVE-2020-28279,False,>=0.0.5 <1.1.1 ,n/a
Prototype Pollution,libnested,https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930,CVE-2020-28283,False,<1.5.1 ,https://github.com/dominictarr/libnested/commit/9619863a319ed1e5c19ddcbdbe3312f9cef72760
Prototype Pollution,libnested,https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930,CVE-2020-28283,False,<1.5.1 ,https://github.com/dominictarr/libnested/commit/9619863a319ed1e5c19ddcbdbe3312f9cef72760
Prototype Pollution,predefine,https://security.snyk.io/vuln/SNYK-JS-PREDEFINE-1054935,CVE-2020-28280,False,* ,n/a
Prototype Pollution,dset,https://security.snyk.io/vuln/SNYK-JS-DSET-1054939,CVE-2020-28277,False,>=1.0.0 <2.1.0 ,n/a
Prototype Pollution,shvl,https://security.snyk.io/vuln/SNYK-JS-SHVL-1054936,CVE-2020-28278,False,>=1.0.0 <2.0.2 ,https://github.com/robinvdvleuten/shvl/commit/513c0848774dfb114ad0d0554abf7927cfdd569e
Prototype Pollution,deep-set,https://security.snyk.io/vuln/SNYK-JS-DEEPSET-1054938,CVE-2020-28276,False,>=1.0.0 ,n/a
Prototype Pollution,getobject,https://security.snyk.io/vuln/SNYK-JS-GETOBJECT-1054932,CVE-2020-28282,False,<1.0.0 ,n/a
Prototype Pollution,ion-parser,https://security.snyk.io/vuln/SNYK-JS-IONPARSER-1048971,CVE-2020-28462,True,* ,n/a
Prototype Pollution,js-ini,https://security.snyk.io/vuln/SNYK-JS-JSINI-1048970,CVE-2020-28461,True,<1.3.0 ,https://github.com/Sdju/js-ini/commit/fa17efb7e3a7c9464508a254838d4c231784931e
Insecure Storage of Sensitive Information,parse-server,https://security.snyk.io/vuln/SNYK-JS-PARSESERVER-1054842,CVE-2020-26288,False,>=3.10.0 <4.5.0 ,https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a
Prototype Pollution,node-ini,https://security.snyk.io/vuln/SNYK-JS-NODEINI-1054844,,True,* ,n/a
Prototype Pollution,inireader,https://security.snyk.io/vuln/SNYK-JS-INIREADER-1054843,,True,<2.0.0 ,https://github.com/Ajnasz/IniReader/commit/c260e4e9050c731dbdb88e1d2e23e851528d3d93
Regular Expression Denial of Service (ReDoS),semver-regex,https://security.snyk.io/vuln/SNYK-JS-SEMVERREGEX-1047770,,True,<3.1.2 ,https://github.com/sindresorhus/semver-regex/commit/6baf2cc1d470c2fb63666bdebeef06822be7ba8c
Regular Expression Denial of Service (ReDoS),date-and-time,https://security.snyk.io/vuln/SNYK-JS-DATEANDTIME-1054430,CVE-2020-26289,False,<0.14.2 ,https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a
Regular Expression Denial of Service (ReDoS),doiuse,https://security.snyk.io/vuln/SNYK-JS-DOIUSE-1037304,,False,<4.4.0 ,n/a
Cross-site Scripting (XSS),vega,https://security.snyk.io/vuln/SNYK-JS-VEGA-1053433,,False,<5.17.1 ,n/a
Prototype Pollution,multi-ini,https://security.snyk.io/vuln/SNYK-JS-MULTIINI-1048969,CVE-2020-28448,True,<2.1.1 ,n/a
Cross-site Request Forgery (CSRF),nodebb-plugin-blog-comments,https://security.snyk.io/vuln/SNYK-JS-NODEBBPLUGINBLOGCOMMENTS-1053246,CVE-2020-15156,False,<0.7.0 ,https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618
Prototype Pollution,multi-ini,https://security.snyk.io/vuln/SNYK-JS-MULTIINI-1053229,CVE-2020-28460,True,<2.1.2 ,https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde
Arbitrary File Read,@sdscoep/web-review,https://security.snyk.io/vuln/SNYK-JS-SDSCOEPWEBREVIEW-1053230,,True,* ,n/a
Cross-site Scripting (XSS),ng-zorro-antd,https://security.snyk.io/vuln/SNYK-JS-NGZORROANTD-1052821,,False,<11.0.0 ,https://github.com/NG-ZORRO/ng-zorro-antd/commit/a393b89bf82eece5b0586592d709629865b27b3a
Prototype Pollution,datatables.net,https://security.snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402,CVE-2020-28458,False,<1.10.23 ,https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03
Command Injection,connection-tester,https://security.snyk.io/vuln/SNYK-JS-CONNECTIONTESTER-1048337,CVE-2020-7781,True,<0.2.1 ,n/a
Information Exposure,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1050427,CVE-2020-16042,False,<9.4.1 >=10.0.0 <10.3.2 ,n/a
Cross-site Scripting (XSS),markdown-it-decorate,https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITDECORATE-1044068,CVE-2020-28459,True,* ,n/a
Cross-site Scripting (XSS),frappe-charts,https://security.snyk.io/vuln/SNYK-JS-FRAPPECHARTS-1044066,,True,<1.5.5 ,n/a
Cross-site Scripting (XSS),markdown-it-toc,https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITTOC-1044067,CVE-2020-28455,True,* ,n/a
Prototype Pollution,jiff,https://security.snyk.io/vuln/SNYK-JS-JIFF-1017118,,False,* ,n/a
Command Injection,props,https://security.snyk.io/vuln/SNYK-JS-PROPS-1015750,,False,* ,n/a
Prototype Pollution,js-data,https://security.snyk.io/vuln/SNYK-JS-JSDATA-1023655,CVE-2020-28442,True,<3.0.10 ,n/a
Command Injection,systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1050436,CVE-2020-26274,True,<4.31.1 ,https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99
Prototype Pollution,conf-cfg-ini,https://security.snyk.io/vuln/SNYK-JS-CONFCFGINI-1048973,CVE-2020-28441,True,<1.2.2 ,https://github.com/loge5/conf-cfg-ini/commit/3a88a6c52c31eb6c0f033369eed40aa168a636ea
Prototype Pollution,mout,https://security.snyk.io/vuln/SNYK-JS-MOUT-1014544,CVE-2020-7792,False,<1.2.3 ,n/a
Regular Expression Denial of Service (ReDoS),ua-parser-js,https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599,CVE-2020-7793,False,<0.7.23 ,https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18
Cross-site Scripting (XSS),liveaddress,https://security.snyk.io/vuln/SNYK-JS-LIVEADDRESS-1050852,CVE-2020-29455,False,* ,n/a
Prototype Pollution,mquery,https://security.snyk.io/vuln/SNYK-JS-MQUERY-1050858,CVE-2020-35149,True,<3.2.3 ,https://github.com/aheckmann/mquery/commit/792e69fd0a7281a0300be5cade5a6d7c1d468ad4
Prototype Pollution,rxdb,https://security.snyk.io/vuln/SNYK-JS-RXDB-1050985,CVE-2020-35149,True,<9.11.0 ,https://github.com/aheckmann/mquery/commit/792e69fd0a7281a0300be5cade5a6d7c1d468ad4
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1050424,CVE-2020-16023,False,>=10.0.0-beta.1 <10.2.0 <9.4.4 ,https://github.com/electron/electron/commit/135133e3918d9e641a5626b09433f989c0f19410
Insufficient Validation,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1050882,CVE-2020-16040,False,<9.4.0 >=10.0.0 <10.2.0 ,n/a
Cross-site Scripting (XSS),mavon-editor,https://security.snyk.io/vuln/SNYK-JS-MAVONEDITOR-1050888,,False,<2.9.0 ,https://github.com/hinesboy/mavonEditor/commit/c117c74348c9fbf60f248afcd21ffcdd20eeea2a
Command Injection,node-notifier,https://security.snyk.io/vuln/SNYK-JS-NODENOTIFIER-1035794,CVE-2020-7789,False,<5.4.5 >=8.0.0 <8.0.2 >=9.0.0 <9.0.1 ,https://github.com/mikaelbr/node-notifier/commit/2d3927b200a0fd1721e8b8ad59f84f383d3f0e0a
Command Injection,corenlp-js-prefab,https://security.snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434,CVE-2020-28439,True,* ,n/a
Command Injection,corenlp-js-interface,https://security.snyk.io/vuln/SNYK-JS-CORENLPJSINTERFACE-1050435,CVE-2020-28440,True,* ,n/a
Prototype Pollution,ini,https://security.snyk.io/vuln/SNYK-JS-INI-1048974,CVE-2020-7788,True,<1.3.6 ,https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1
Prototype Pollution,deepref,https://security.snyk.io/vuln/SNYK-JS-DEEPREF-1049536,CVE-2020-28274,False,<1.2.1 ,https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2
Regular Expression Denial of Service (ReDoS),@fast-csv/parse,https://security.snyk.io/vuln/SNYK-JS-FASTCSVPARSE-1049537,CVE-2020-26256,False,<4.3.6 ,https://github.com/C2FO/fast-csv/commit/4bbd39f26a8cd7382151ab4f5fb102234b2f829e
Regular Expression Denial of Service (ReDoS),fast-csv,https://security.snyk.io/vuln/SNYK-JS-FASTCSV-1049538,CVE-2020-26256,False,<4.3.6 ,https://github.com/C2FO/fast-csv/commit/4bbd39f26a8cd7382151ab4f5fb102234b2f829e
Improper Authentication,react-adal,https://security.snyk.io/vuln/SNYK-JS-REACTADAL-1018907,CVE-2020-7787,True,<0.5.1 ,n/a
Cross-site Scripting (XSS),ckeditor4-dev,https://security.snyk.io/vuln/SNYK-JS-CKEDITOR4DEV-1048832,,False,<4.15.1 ,https://github.com/ckeditor/ckeditor4/commit/4594cea3ed50b1fa7a26dd2488513c1bc6a68103
Regular Expression Denial of Service (ReDoS),highlight.js,https://security.snyk.io/vuln/SNYK-JS-HIGHLIGHTJS-1048676,,False,>=9.0.0 <10.4.1 ,https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c
Cross-site Scripting (XSS),html-purify,https://security.snyk.io/vuln/SNYK-JS-HTMLPURIFY-1048671,,False,* ,n/a
Prototype Pollution,keyget,https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048,CVE-2020-28272,False,<2.3.0 ,https://github.com/rumkin/keyget/commit/17d15b6c75036eb429075a8cfeccfc18094dd2e2
Prototype Pollution,set-in,https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049,CVE-2020-28273,False,<2.0.1 ,https://github.com/ahdinosaur/set-in/commit/e431effa00195a6f06b111e09733cd1445a91a88
Information Exposure,cordova-plugin-camera,https://security.snyk.io/vuln/SNYK-JS-CORDOVAPLUGINCAMERA-1047870,CVE-2020-11990,False,<5.0.0 ,n/a
Improper Validation,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1047306,CVE-2020-16013,True,>=10.0.0-beta.1 <10.1.6 <9.4.4 ,n/a
Cross-site Scripting (XSS),markdown-it-texmath,https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITTEXMATH-1040463,,True,<0.9.0 ,n/a
Cross-site Scripting (XSS),netlify-cms-widget-markdown,https://security.snyk.io/vuln/SNYK-JS-NETLIFYCMSWIDGETMARKDOWN-1039890,,True,<2.12.9 ,n/a
Prototype Pollution,systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1047312,CVE-2020-26245,False,<4.30.5 ,https://github.com/sebhildebrandt/systeminformation/commit/8113ff0e87b2f422a5756c48f1057575e73af016
Prototype Pollution,ts-dot-prop,https://security.snyk.io/vuln/SNYK-JS-TSDOTPROP-1024441,,True,<1.4.1 ,https://github.com/justinlettau/ts-dot-prop/commit/816b887a669ab959c3c2f85c6563d33928f00f14#diff-f41e9d04a45c83f3b6f6e630f10117feR183
Command Injection,last-commit-log,https://security.snyk.io/vuln/SNYK-JS-LASTCOMMITLOG-1047325,,False,* ,n/a
Prototype Pollution,systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1043753,CVE-2020-7778,True,<4.30.2 ,n/a
Prototype Pollution,highlight.js,https://security.snyk.io/vuln/SNYK-JS-HIGHLIGHTJS-1045326,CVE-2020-26237,False,>=7.2.0 <9.18.2 >=10.0.0 <10.1.2 ,https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0
Server-side Request Forgery (SSRF),private-ip,https://security.snyk.io/vuln/SNYK-JS-PRIVATEIP-1044035,CVE-2020-28360,False,<2.3.0 ,https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9
Arbitrary Code Execution,jsen,https://security.snyk.io/vuln/SNYK-JS-JSEN-1014670,CVE-2020-7777,True,* ,n/a
Information Exposure,libvips,https://security.snyk.io/vuln/SNYK-JS-LIBVIPS-1042950,CVE-2020-20739,False,* ,https://github.com/libvips/libvips/commit/2ab5aa7bf515135c2b02d42e9a72e4c98e17031a
Regular Expression Denial of Service (ReDoS),djvalidator,https://security.snyk.io/vuln/SNYK-JS-DJVALIDATOR-1018709,CVE-2020-7779,False,* ,n/a
Information Disclosure,semantic-release,https://security.snyk.io/vuln/SNYK-JS-SEMANTICRELEASE-1041706,CVE-2020-26226,False,<17.2.3 ,https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a
Denial of Service (DoS),tui-editor,https://security.snyk.io/vuln/SNYK-JS-TUIEDITOR-837924,,False,* ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1041745,CVE-2020-16017,False,<8.5.4 >=9.0.0 <9.3.5 >=10.0.0 <10.1.6 ,https://github.com/electron/electron/commit/f04721c7c06b4f955cc07d20acd2a1bf4a0e4b7c
Improper Access Control,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1049321,CVE-2020-16022,False,<9.4.0 >=10.0.0 <10.1.7 ,n/a
Improper Input Validation,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1049323,CVE-2020-16015,False,<9.4.0 >=10.0.0 <10.1.7 ,https://github.com/electron/electron/pull/26858/commits/bc7261900896aa818b51a107f20721e3d1b20d22
Heap-based Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1048693,CVE-2020-16024,False,<9.4.0 >=10.0.0 <10.2.0 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1049547,CVE-2020-16014,False,<9.4.0 >=10.0.0 <10.2.0 ,n/a
Prototype Pollution,objnest,https://security.snyk.io/vuln/SNYK-JS-OBJNEST-1041787,,False,<5.1.0 ,https://github.com/okunishinishi/node-objnest/commit/c541e1a775b562d63402a14dac9f8cbc52b116d7
Authentication Bypass,expressjs-ip-control,https://security.snyk.io/vuln/SNYK-JS-EXPRESSJSIPCONTROL-1024442,,False,<1.0.7 ,n/a
Directory Traversal,zenn-cli,https://security.snyk.io/vuln/SNYK-JS-ZENNCLI-1024443,,False,<0.1.40 ,https://github.com/zenn-dev/zenn-editor/commit/eb9e67b39f93f8fbe79c5e4ce3c333936c79cff4
Cross-site Scripting (XSS),markdown-it-prism,https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITPRISM-1040462,,True,<2.1.3 ,n/a
Cross-site Scripting (XSS),markdown-it-highlightjs,https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITHIGHLIGHTJS-1040461,CVE-2020-7773,False,<3.3.1 ,n/a
Prototype Pollution,controlled-merge,https://security.snyk.io/vuln/SNYK-JS-CONTROLLEDMERGE-1040460,CVE-2020-28268,False,>=1.0.0 <1.3.0 ,https://github.com/hlfshell/controlled-merge/commit/5a4b2e9ffe5a0be7f8843d4ab038599d3ae5f9d4
Prototype Pollution,merge,https://security.snyk.io/vuln/SNYK-JS-MERGE-1040469,,False,<2.1.0 ,n/a
Prototype Pollution,doc-path,https://security.snyk.io/vuln/SNYK-JS-DOCPATH-1011952,CVE-2020-7772,True,<2.3.0 ,https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7
Cross-site Scripting (XSS),handsontable,https://security.snyk.io/vuln/SNYK-JS-HANDSONTABLE-1019380,,False,<8.2.0 ,n/a
Prototype Pollution,object-hierarchy-access,https://security.snyk.io/vuln/SNYK-JS-OBJECTHIERARCHYACCESS-1039883,CVE-2020-28270,False,>=0.2.0 <0.33.0 ,https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572
Prototype Pollution,field,https://security.snyk.io/vuln/SNYK-JS-FIELD-1039884,CVE-2020-28269,False,* ,n/a
Prototype Pollution,deephas,https://security.snyk.io/vuln/SNYK-JS-DEEPHAS-1039845,CVE-2020-28271,False,<1.0.7 ,https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20
Command Injection,nodemailer,https://security.snyk.io/vuln/SNYK-JS-NODEMAILER-1038834,CVE-2020-7769,True,<6.4.16 ,https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54
Cross-site Scripting (XSS),joplin,https://security.snyk.io/vuln/SNYK-JS-JOPLIN-1024440,CVE-2020-28249,False,<1.4.2 ,https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13
Cross-site Scripting (XSS),@joplin/renderer,https://security.snyk.io/vuln/SNYK-JS-JOPLINRENDERER-1290615,CVE-2020-28249,False,<1.7.1 ,https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13
Cross-site Scripting (XSS),@joplin/lib,https://security.snyk.io/vuln/SNYK-JS-JOPLINLIB-1290616,CVE-2020-28249,False,<1.7.1 ,https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13
Regular Expression Denial of Service (ReDoS),express-validators,https://security.snyk.io/vuln/SNYK-JS-EXPRESSVALIDATORS-1017404,CVE-2020-7767,False,* ,n/a
Prototype Pollution,grpc,https://security.snyk.io/vuln/SNYK-JS-GRPC-598671,CVE-2020-7768,False,<1.24.4 ,n/a
Prototype Pollution,grpc,https://security.snyk.io/vuln/SNYK-JS-GRPC-598671,CVE-2020-7768,False,<1.24.4 ,n/a
Prototype Pollution,@strikeentco/set,https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821,CVE-2020-28267,False,<1.0.1 ,https://github.com/strikeentco/set/commit/102cc6b2e1d1e0c928ced87e75df759d5541ff60
Directory Traversal,node-downloader-helper,https://security.snyk.io/vuln/SNYK-JS-NODEDOWNLOADERHELPER-1038832,,False,<1.0.15 ,https://github.com/hgouveia/node-downloader-helper/commit/3f000fccce973b972132cc11e1aa7724ca08f85b
Malicious Package,xpc.js,https://security.snyk.io/vuln/SNYK-JS-XPCJS-1040419,,False,* ,n/a
Malicious Package,ac-addon,https://security.snyk.io/vuln/SNYK-JS-ACADDON-1038824,,False,* ,n/a
Malicious Package,discord.app,https://security.snyk.io/vuln/SNYK-JS-DISCORDAPP-1038826,,False,* ,n/a
Malicious Package,wsbd.js,https://security.snyk.io/vuln/SNYK-JS-WSBDJS-1038825,,False,* ,n/a
Malicious Package,db-json.js,https://security.snyk.io/vuln/SNYK-JS-DBJSONJS-1047461,,False,* ,n/a
Malicious Package,jdb.js,https://security.snyk.io/vuln/SNYK-JS-JDBJS-1047462,,False,* ,n/a
Prototype Pollution,json8-merge-patch,https://security.snyk.io/vuln/SNYK-JS-JSON8MERGEPATCH-1038399,CVE-2020-8268,True,<1.0.3 ,n/a
Malicious Package,discord.dll,https://security.snyk.io/vuln/SNYK-JS-DISCORDDLL-1038397,,False,* ,n/a
Prototype Pollution,json-ptr,https://security.snyk.io/vuln/SNYK-JS-JSONPTR-1016939,CVE-2020-7766,True,<2.0.0 ,n/a
Prototype Pollution,y18n,https://security.snyk.io/vuln/SNYK-JS-Y18N-1021887,CVE-2020-7774,True,<3.2.2 >=4.0.0 <4.0.1 >=5.0.0 <5.0.5 ,n/a
Prototype Pollution,@firebase/util,https://security.snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324,CVE-2020-7765,True,<0.3.4 ,https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada
Web Cache Poisoning,find-my-way,https://security.snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269,CVE-2020-7764,False,<2.2.5 >=3.0.0 <3.0.5 ,https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac
Denial of Service (DoS),krb5,https://security.snyk.io/vuln/SNYK-JS-KRB5-1038261,CVE-2020-28196,False,* ,https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
Denial of Service (DoS),node-krb5,https://security.snyk.io/vuln/SNYK-JS-NODEKRB5-1038260,CVE-2020-28196,False,* ,https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
Server-Side Request Forgery (SSRF),axios,https://security.snyk.io/vuln/SNYK-JS-AXIOS-1038255,CVE-2020-28168,False,<0.21.1 ,https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55
Arbitrary File Read,jsreport-chrome-pdf,https://security.snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310,CVE-2020-7762,True,<1.10.0 ,https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2
Regular Expression Denial of Service (ReDoS),@absolunet/kafe,https://security.snyk.io/vuln/SNYK-JS-ABSOLUNETKAFE-1017403,CVE-2020-7761,False,<3.2.10 ,https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0#diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857
Arbitrary File Read,phantom-html-to-pdf,https://security.snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598,CVE-2020-7763,True,<0.6.1 ,https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259
Prototype Pollution,json8,https://security.snyk.io/vuln/SNYK-JS-JSON8-1017116,CVE-2020-7770,False,<1.0.3 ,https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e
Malicious Package,twilio-npm,https://security.snyk.io/vuln/SNYK-JS-TWILIONPM-1035374,,False,* ,n/a
Cross-site Scripting (XSS),dompurify,https://security.snyk.io/vuln/SNYK-JS-DOMPURIFY-1035544,,False,<2.2.2 ,n/a
Regular Expression Denial of Service (ReDoS),codemirror,https://security.snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937,CVE-2020-7760,True,<5.58.2 ,https://github.com/codemirror/CodeMirror/commit/55d0333907117c9231ffdf555ae8824705993bbb
Server-side Request Forgery (SSRF),strapi,https://security.snyk.io/vuln/SNYK-JS-STRAPI-1022256,CVE-2020-27664,False,<3.2.5 ,n/a
Path Traversal,browserless-chrome,https://security.snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657,CVE-2020-7758,True,<1.43.0 ,https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6
Path Traversal,droppy,https://security.snyk.io/vuln/SNYK-JS-DROPPY-1023656,CVE-2020-7757,True,* ,n/a
Command Injection,gfc,https://security.snyk.io/vuln/SNYK-JS-GFC-1023302,,False,* ,n/a
Command Injection,systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1023168,CVE-2020-26300,False,<4.26.2 ,https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607
Command Injection,systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1023168,CVE-2020-26300,False,<4.26.2 ,https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607
Regular Expression Denial of Service (ReDoS),dat.gui,https://security.snyk.io/vuln/SNYK-JS-DATGUI-1016275,CVE-2020-7755,False,* ,n/a
Prototype Pollution,nested-property,https://security.snyk.io/vuln/SNYK-JS-NESTEDPROPERTY-1022154,,True,<3.0.0 ,https://github.com/cosmosio/nested-property/commit/881cf37eb956641fc26011ff66a436eb603c89d1
Denial of Service (DoS),http-live-simulator,https://security.snyk.io/vuln/SNYK-JS-HTTPLIVESIMULATOR-1022148,,False,* ,https://github.com/prahladyeri/http-live-simulator/commit/810248f5e28935abe9f4260ac9c1fa897f8d7067
Cross-site Scripting (XSS),grapesjs,https://security.snyk.io/vuln/SNYK-JS-GRAPESJS-1020496,,False,<0.17.25 ,n/a
Command Injection,create-git,https://security.snyk.io/vuln/SNYK-JS-CREATEGIT-1022150,,False,<1.0.0-2 ,n/a
Regular Expression Denial of Service (ReDoS),trim,https://security.snyk.io/vuln/SNYK-JS-TRIM-1017038,CVE-2020-7753,True,<0.0.3 ,n/a
Command Injection,systeminformation,https://security.snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909,CVE-2020-7752,True,<4.27.11 ,https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61
XML External Entity (XXE) Injection,jstoxml,https://security.snyk.io/vuln/SNYK-JS-JSTOXML-1017039,,False,<2.0.0 ,https://github.com/davidcalhoun/jstoxml/commit/a9c888bf1c47821d9868198001ca7bb1306091b3
Cross-site Request Forgery (CSRF),mountebank,https://security.snyk.io/vuln/SNYK-JS-MOUNTEBANK-1021889,,False,<2.3.3 ,https://github.com/bbyars/mountebank/commit/f1c453ab8b744d08a561c346c3a034738eefc0b4
Prototype Pollution,pathval,https://security.snyk.io/vuln/SNYK-JS-PATHVAL-596926,CVE-2020-7751,True,<1.1.1 ,https://github.com/chaijs/pathval/commit/7859e0e1ce4c2c67de897edce097ed31f80661d0
Regular Expression Denial of Service (ReDoS),locutus,https://security.snyk.io/vuln/SNYK-JS-LOCUTUS-1009836,,True,<2.0.15 ,https://github.com/locutusjs/locutus/commit/e094f85153753d7f919df7dd6f8503d8742c960a
Improper Authorization,strapi-plugin-content-type-builder,https://security.snyk.io/vuln/SNYK-JS-STRAPIPLUGINCONTENTTYPEBUILDER-1021616,CVE-2020-27665,False,<3.2.5 ,n/a
Cross-site Scripting (XSS),strapi-plugin-content-manager,https://security.snyk.io/vuln/SNYK-JS-STRAPIPLUGINCONTENTMANAGER-1021615,CVE-2020-27666,False,<3.2.5 ,n/a
Operation on a Resource after Expiration or Release,parse-server,https://security.snyk.io/vuln/SNYK-JS-PARSESERVER-1021232,CVE-2020-15270,False,<4.4.0 ,https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58
Cross-site Scripting (XSS),scratch-svg-renderer,https://security.snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497,CVE-2020-7750,False,<0.2.0-prerelease.20201019174008 ,https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90
Heap-based Buffer Overflow,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1021884,CVE-2020-15999,True,<8.5.3 >=9.0.0-beta.1 <9.3.3 >=10.0.0-beta.1 <10.1.5 ,n/a
Cross-site Scripting (XSS),hermes-engine,https://security.snyk.io/vuln/SNYK-JS-HERMESENGINE-1015406,CVE-2020-1914,False,<0.7.2 ,https://github.com/facebook/hermes/commit/b2021df620824627f5a8c96615edbd1eb7fdddfc
Access Restriction Bypass,webpack-subresource-integrity,https://security.snyk.io/vuln/SNYK-JS-WEBPACKSUBRESOURCEINTEGRITY-1019475,CVE-2020-15262,False,>=1.5.0 <1.5.1 ,n/a
Server-side Request Forgery (SSRF),osm-static-maps,https://security.snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637,CVE-2020-7749,True,<3.9.0 ,n/a
Prototype Pollution,@tsed/core,https://security.snyk.io/vuln/SNYK-JS-TSEDCORE-1019382,CVE-2020-7748,True,<5.65.7 ,https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b
Cross-site Scripting (XSS),lightning-server,https://security.snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381,CVE-2020-7747,True,* ,n/a
Prototype Pollution,chart.js,https://security.snyk.io/vuln/SNYK-JS-CHARTJS-1018716,CVE-2020-7746,False,<2.9.4 ,n/a
Regular Expression Denial of Service (ReDoS),npm-user-validate,https://security.snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352,CVE-2020-7754,False,<1.0.1 ,https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e
Malicious Package,nodetest1010,https://security.snyk.io/vuln/SNYK-JS-NODETEST1010-1018833,,False,* ,n/a
Malicious Package,nodetest199,https://security.snyk.io/vuln/SNYK-JS-NODETEST199-1018834,,False,* ,n/a
Malicious Package,npmpubman,https://security.snyk.io/vuln/SNYK-JS-NPMPUBMAN-1018835,,False,* ,n/a
Malicious Package,plutov-slack-client,https://security.snyk.io/vuln/SNYK-JS-PLUTOVSLACKCLIENT-1018836,,False,* ,n/a
Command Injection,freespace,https://security.snyk.io/vuln/SNYK-JS-FREESPACE-1018705,,True,* ,n/a
Cross-site Scripting (XSS),bizcharts,https://security.snyk.io/vuln/SNYK-JS-BIZCHARTS-608848,,False,<4.0.15 ,https://github.com/alibaba/BizCharts/commit/317941b0f1e9a42f7d7cc14b3631dd3c3a8041f0
Prototype Pollution,mathjs,https://security.snyk.io/vuln/SNYK-JS-MATHJS-1016401,CVE-2020-7743,False,<7.5.1 ,https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e
Cross-site Scripting (XSS),summernote,https://security.snyk.io/vuln/SNYK-JS-SUMMERNOTE-597187,,True,* ,https://github.com/summernote/summernote/commit/9408255baf27a899089271267de5279376965f8a
Open Redirect,next,https://security.snyk.io/vuln/SNYK-JS-NEXT-1063481,CVE-2020-15242,False,>=9.5.0 <9.5.4 ,n/a
Cross-site Scripting (XSS),dompurify,https://security.snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634,CVE-2020-26870,False,<2.0.17 ,https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d
Improper Restriction of Rendered UI Layers or Frames,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1016273,CVE-2020-15174,False,>=8.0.0-beta.0 <8.5.1 >=9.0.0-beta.0 <9.3.0 >=10.0.0-beta.0 <10.0.1 >=11.0.0-beta.0 <11.0.0-beta.1 ,n/a
Prototype Pollution,simpl-schema,https://security.snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157,CVE-2020-7742,True,<1.10.2 ,n/a
Improper Access Control,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-1016271,CVE-2020-15215,False,>=8.0.0-beta.0 <8.5.2 >=9.0.0-beta.0 <9.3.1 >=10.0.0-beta.0 <10.1.2 >=11.0.0-beta.0 <11.0.0-beta.6 ,n/a
Cross-site Scripting (XSS),hellojs,https://security.snyk.io/vuln/SNYK-JS-HELLOJS-1014546,CVE-2020-7741,False,<1.18.6 ,n/a
Prototype Pollution,json-pointer,https://security.snyk.io/vuln/SNYK-JS-JSONPOINTER-596925,CVE-2020-7709,True,<0.6.1 ,n/a
Server-Side Request Forgery (SSRF),node-pdf-generator,https://security.snyk.io/vuln/SNYK-JS-NODEPDFGENERATOR-609636,CVE-2020-7740,True,* ,n/a
Server-side Request Forgery (SSRF),phantomjs-seo,https://security.snyk.io/vuln/SNYK-JS-PHANTOMJSSEO-609638,CVE-2020-7739,True,* ,n/a
File Type Restriction Bypass,socket.io-file,https://security.snyk.io/vuln/SNYK-JS-SOCKETIOFILE-1015597,CVE-2020-24807,False,* ,n/a
Cross-site Scripting (XSS),froala-editor,https://security.snyk.io/vuln/SNYK-JS-FROALAEDITOR-1015371,CVE-2020-26523,False,<3.2.2 ,n/a
Improper Input Validation,@actions/core,https://security.snyk.io/vuln/SNYK-JS-ACTIONSCORE-1015402,CVE-2020-15228,False,<1.2.6 ,n/a
Malicious Package,electorn,https://security.snyk.io/vuln/SNYK-JS-ELECTORN-1015404,,False,* ,n/a
Malicious Package,loadyaml,https://security.snyk.io/vuln/SNYK-JS-LOADYAML-1015403,,False,* ,n/a
Prototype Pollution,safetydance,https://security.snyk.io/vuln/SNYK-JS-SAFETYDANCE-598687,CVE-2020-7737,False,* ,n/a
Prototype Pollution,bmoor,https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664,CVE-2020-7736,False,<0.8.12 ,n/a
Cross-site Scripting (XSS),canvas-designer,https://security.snyk.io/vuln/SNYK-JS-CANVASDESIGNER-597485,,False,* ,n/a
Prototype Pollution,datatables.net,https://security.snyk.io/vuln/SNYK-JS-DATATABLESNET-598806,,False,<1.10.22 ,n/a
Open Redirect,amp-html,https://security.snyk.io/vuln/SNYK-JS-AMPHTML-598262,,False,* ,n/a
Cross-site Scripting (XSS),bootstrap-select,https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-1014662,CVE-2019-20921,False,<1.13.6 ,n/a
Information Exposure,nats.ws,https://security.snyk.io/vuln/SNYK-JS-NATSWS-1014647,CVE-2020-26149,False,<1.0.0-111 ,https://github.com/nats-io/nats.deno/commit/e7c566eb9941cd07bfd891a6965bd4e46cbdc8c3
Resource Exhaustion,mountebank,https://security.snyk.io/vuln/SNYK-JS-MOUNTEBANK-1014529,,False,<2.3.1 ,https://github.com/bbyars/mountebank/commit/65f583c521bf3828a7c53037b2795a4ff5269820
Directory Traversal,mountebank,https://security.snyk.io/vuln/SNYK-JS-MOUNTEBANK-1014526,,False,<2.3.2 ,https://github.com/bbyars/mountebank/commit/b4e1c19cb9b43bab137f9045160efc4335ca43bb
Information Exposure,generator-jhipster,https://security.snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-608849,,False,<6.10.2 ,https://github.com/avdev4j/generator-jhipster/commit/26bdfc35ed95c05e238cddcf188f88919f4ccb09
Cross-site Scripting (XSS),m-server,https://security.snyk.io/vuln/SNYK-JS-MSERVER-1013436,,True,* ,n/a
Command Injection,ng-packagr,https://security.snyk.io/vuln/SNYK-JS-NGPACKAGR-1012427,CVE-2020-7735,False,<10.1.1 ,https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d
Remote Code Execution (RCE),gity,https://security.snyk.io/vuln/SNYK-JS-GITY-1012730,,True,* ,n/a
Cross-site Scripting (XSS),snekserve,https://security.snyk.io/vuln/SNYK-JS-SNEKSERVE-1012731,,True,* ,n/a
Remote Code Execution (RCE),git-lib,https://security.snyk.io/vuln/SNYK-JS-GITLIB-1012734,,True,* ,n/a
Arbitrary File Read,hnzserver,https://security.snyk.io/vuln/SNYK-JS-HNZSERVER-1012733,,True,* ,n/a
Arbitrary File Read,http_server,https://security.snyk.io/vuln/SNYK-JS-HTTPSERVER-1012732,,True,* ,n/a
Remote Code Execution (RCE),commit-msg,https://security.snyk.io/vuln/SNYK-JS-COMMITMSG-1012729,,False,* ,n/a
Cross-site Scripting (XSS),joplin,https://security.snyk.io/vuln/SNYK-JS-JOPLIN-1012726,CVE-2020-15930,False,<1.1.4 ,n/a
Cross-site Scripting (XSS),react-native-webview,https://security.snyk.io/vuln/SNYK-JS-REACTNATIVEWEBVIEW-1011954,CVE-2020-6506,False,<11.0.0 ,n/a
Arbitrary Code Execution,shiba,https://security.snyk.io/vuln/SNYK-JS-SHIBA-596466,CVE-2020-7738,False,* ,n/a
Arbitrary Command Execution,@knutkirkhorn/free-space,https://security.snyk.io/vuln/SNYK-JS-KNUTKIRKHORNFREESPACE-1009833,,False,<1.3.0 ,n/a
Command Injection,node-idevice,https://security.snyk.io/vuln/SNYK-JS-NODEIDEVICE-609343,,False,* ,n/a
Remote Code Execution (RCE),heroku-exec-util,https://security.snyk.io/vuln/SNYK-JS-HEROKUEXECUTIL-674661,,False,* ,n/a
Improper Authentication,authmagic-timerange-stateless-core,https://security.snyk.io/vuln/SNYK-JS-AUTHMAGICTIMERANGESTATELESSCORE-674658,,False,* ,n/a
Regular Expression Denial of Service (ReDoS),ua-parser-js,https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-610226,CVE-2020-7733,False,<0.7.22 ,https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d
Command Injection,alfred-workflow-nodejs,https://security.snyk.io/vuln/SNYK-JS-ALFREDWORKFLOWNODEJS-608975,,True,* ,n/a
Malicious Package,nagibabel,https://security.snyk.io/vuln/SNYK-JS-NAGIBABEL-674575,,False,* ,n/a
Information Exposure,renovate,https://security.snyk.io/vuln/SNYK-JS-RENOVATE-674573,,False,>=19.180.0 <23.25.1 ,https://github.com/renovatebot/renovate/commit/6c9c4ac14ef478ddbeb534e5a2b95c450af12fc7
Cross-site Scripting (XSS),flsaba,https://security.snyk.io/vuln/SNYK-JS-FLSABA-674473,,False,* ,n/a
Prototype Pollution,keyd,https://security.snyk.io/vuln/SNYK-JS-KEYD-674472,,False,<1.4.3 ,n/a
Prototype Pollution,objtools,https://security.snyk.io/vuln/SNYK-JS-OBJTOOLS-674471,,False,* ,n/a
Denial of Service (DoS),passport-azure-ad,https://security.snyk.io/vuln/SNYK-JS-PASSPORTAZUREAD-608126,,False,<4.3.0 ,https://github.com/AzureAD/passport-azure-ad/pull/474/commits/d8cffbe9a32f740eb9ff1a9f4e9dec9dada3633a
Cross-site Scripting (XSS),trezor-connect,https://security.snyk.io/vuln/SNYK-JS-TREZORCONNECT-598796,,False,<8.1.12 ,n/a
Cross-site Scripting (XSS),joplin,https://security.snyk.io/vuln/SNYK-JS-JOPLIN-674433,,False,<1.1.1 ,https://github.com/laurent22/joplin/commit/57d750bc9aeb0f98d53ed4b924458b54984c15ff
Denial of Service,node-fetch,https://security.snyk.io/vuln/SNYK-JS-NODEFETCH-674311,CVE-2020-15168,False,<2.6.1 >=3.0.0-beta.1 <3.0.0-beta.9 ,https://github.com/node-fetch/node-fetch/commit/2358a6c2563d1730a0cdaccc197c611949f6a334
Prototype Pollution,json-logic-js,https://security.snyk.io/vuln/SNYK-JS-JSONLOGICJS-674308,,True,<2.0.0 ,n/a
Denial of Service (DoS),bcoin,https://security.snyk.io/vuln/SNYK-JS-BCOIN-674318,CVE-2018-17145,False,>=1.0.0-pre <1.0.2 ,n/a
Cross-site Scripting (XSS),zulip,https://security.snyk.io/vuln/SNYK-JS-ZULIP-674319,CVE-2020-24582,False,<5.4.3 ,https://github.com/zulip/zulip-desktop/commit/a9d59b3dcdb59c76a3b5dcb99bb61c78634e3a8f
Improper Input Validation,personnummer,https://security.snyk.io/vuln/SNYK-JS-PERSONNUMMER-674153,,False,<3.1.0 ,https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab
Authentication Bypass,node-lemonldap-ng-handler,https://security.snyk.io/vuln/SNYK-JS-NODELEMONLDAPNGHANDLER-655999,CVE-2020-24660,False,<0.5.2 ,n/a
Denial of Service (DoS),hermes-engine,https://security.snyk.io/vuln/SNYK-JS-HERMESENGINE-629268,CVE-2020-1913,False,<0.7.0 ,https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6
Out-of-Bounds,hermes-engine,https://security.snyk.io/vuln/SNYK-JS-HERMESENGINE-629748,CVE-2020-1912,False,<0.7.0 ,https://github.com/facebook/hermes/commit/091835377369c8fd5917d9b87acffa721ad2a168
Cross-site Scripting (XSS),bitcore-node,https://security.snyk.io/vuln/SNYK-JS-BITCORENODE-589925,,False,<8.22.2 ,https://github.com/bitpay/bitcore/commit/038af75d9a53f190c535a6d70552fc1eae929a34
Arbitrary Code Execution,sanitize-html,https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-585892,,False,<2.0.0-beta ,n/a
Prototype Pollution,extend-merge,https://security.snyk.io/vuln/SNYK-JS-EXTENDMERGE-609868,,False,<1.0.6 ,https://github.com/crysalead-js/extend-merge/commit/6c8dc4e4b5983fa3e85544716f8e347dea2ba3b0
Server-side Request Forgery (SSRF),@uppy/companion,https://security.snyk.io/vuln/SNYK-JS-UPPYCOMPANION-609858,CVE-2020-8135,False,<1.9.3 ,n/a
Directory Traversal,static-server-gx,https://security.snyk.io/vuln/SNYK-JS-STATICSERVERGX-609517,,True,* ,n/a
Cross-site Scripting (XSS),gitbook,https://security.snyk.io/vuln/SNYK-JS-GITBOOK-609389,CVE-2017-16019,False,<3.2.2 ,n/a
Command Injection,bestzip,https://security.snyk.io/vuln/SNYK-JS-BESTZIP-609371,CVE-2020-7730,False,<2.1.7 ,https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6
Arbitrary Code Execution,infraserver,https://security.snyk.io/vuln/SNYK-JS-INFRASERVER-595968,,False,* ,n/a
Prototype Pollution,gedi,https://security.snyk.io/vuln/SNYK-JS-GEDI-598803,CVE-2020-7727,False,* ,n/a
Prototype Pollution,safe-object2,https://security.snyk.io/vuln/SNYK-JS-SAFEOBJECT2-598801,CVE-2020-7726,False,* ,n/a
Prototype Pollution,node-oojs,https://security.snyk.io/vuln/SNYK-JS-NODEOOJS-598678,CVE-2020-7721,False,* ,n/a
Prototype Pollution,nodee-utils,https://security.snyk.io/vuln/SNYK-JS-NODEEUTILS-598679,CVE-2020-7722,False,<1.2.3 ,https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c
Prototype Pollution,worksmith,https://security.snyk.io/vuln/SNYK-JS-WORKSMITH-598798,CVE-2020-7725,False,* ,n/a
Prototype Pollution,promisehelpers,https://security.snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686,CVE-2020-7723,False,* ,n/a
Prototype Pollution,tiny-conf,https://security.snyk.io/vuln/SNYK-JS-TINYCONF-598792,CVE-2020-7724,False,* ,n/a
Prototype Pollution,dot-notes,https://security.snyk.io/vuln/SNYK-JS-DOTNOTES-598668,CVE-2020-7717,False,* ,n/a
Prototype Pollution,deeps,https://security.snyk.io/vuln/SNYK-JS-DEEPS-598667,CVE-2020-7716,False,* ,n/a
Prototype Pollution,deep-get-set,https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666,CVE-2020-7715,False,* ,n/a
Prototype Pollution,confucious,https://security.snyk.io/vuln/SNYK-JS-CONFUCIOUS-598665,CVE-2020-7714,False,* ,n/a
Prototype Pollution,node-forge,https://security.snyk.io/vuln/SNYK-JS-NODEFORGE-598677,CVE-2020-7720,False,<0.10.0 ,n/a
Prototype Pollution,gammautils,https://security.snyk.io/vuln/SNYK-JS-GAMMAUTILS-598670,CVE-2020-7718,False,* ,n/a
Prototype Pollution,arr-flatten-unflatten,https://security.snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396,CVE-2020-7713,False,* ,n/a
Prototype Pollution,locutus,https://security.snyk.io/vuln/SNYK-JS-LOCUTUS-598675,CVE-2020-7719,False,<2.0.12 ,n/a
Directory Traversal,hangersteak,https://security.snyk.io/vuln/SNYK-JS-HANGERSTEAK-608973,,True,<0.2.5 ,https://github.com/eldoy/hangersteak/commit/9e853cced065c5a98f242c7ac75438d035f63532
Command Injection,json,https://security.snyk.io/vuln/SNYK-JS-JSON-597481,CVE-2020-7712,True,<10.0.0 ,n/a
Prototype Pollution,hermes-engine,https://security.snyk.io/vuln/SNYK-JS-HERMESENGINE-608850,CVE-2020-1911,False,<0.7.0 ,https://github.com/facebook/hermes/commit/fe52854cdf6725c2eaa9e125995da76e6ceb27da
Remote Memory Exposure,bl,https://security.snyk.io/vuln/SNYK-JS-BL-608877,CVE-2020-8244,True,>=2.2.0 <2.2.1 >=3.0.0 <3.0.1 >=4.0.0 <4.0.3 <1.2.3 ,https://github.com/rvagg/bl/commit/0bd87ec97be399b129fc62feff2943ffa21bcc00
Denial of Service (DoS),aedes,https://security.snyk.io/vuln/SNYK-JS-AEDES-608837,CVE-2020-13410,False,<0.42.1 ,n/a
Malicious Package,fallguys,https://security.snyk.io/vuln/SNYK-JS-FALLGUYS-608657,,False,* ,n/a
Directory Traversal,min-http-server,https://security.snyk.io/vuln/SNYK-JS-MINHTTPSERVER-608658,,False,* ,n/a
Prototype Pollution,json-bigint,https://security.snyk.io/vuln/SNYK-JS-JSONBIGINT-608659,CVE-2020-8237,False,<1.0.0 ,n/a
Remote Code Execution (RCE),windows-edge,https://security.snyk.io/vuln/SNYK-JS-WINDOWSEDGE-608480,,True,<1.1.0 ,https://github.com/eugeneware/windows-edge/commit/20ce41e1111d05533d9b4f6e2da274c13b278e0d
Denial of Service (DoS),meemo-app,https://security.snyk.io/vuln/SNYK-JS-MEEMOAPP-608290,,False,<1.13.1 ,https://github.com/nebulade/meemo/commit/be31ad3da7d4f8653d6813e84125bb4d25b5658b
Command Injection,extra-asciinema,https://security.snyk.io/vuln/SNYK-JS-EXTRAASCIINEMA-608292,,False,<1.0.23 ,https://github.com/nodef/extra-asciinema/commit/fd1a8a38d6c72e1eb573b2ab03d5e86de8047480
Denial of Service (DoS),cloudron-surfer,https://security.snyk.io/vuln/SNYK-JS-CLOUDRONSURFER-608291,,False,<5.10.3 ,n/a
Prototype Pollution,lodash,https://security.snyk.io/vuln/SNYK-JS-LODASH-608086,,True,<4.17.17 ,n/a
Prototype Pollution,lodash.set,https://security.snyk.io/vuln/SNYK-JS-LODASHSET-1320032,,True,* ,n/a
Cross-site Scripting (XSS),jquery-confirm,https://security.snyk.io/vuln/SNYK-JS-JQUERYCONFIRM-608085,,False,* ,n/a
Sandbox Escape,safe-eval,https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-608076,CVE-2020-7710,False,* ,n/a
Arbitrary Code Execution,grunt,https://security.snyk.io/vuln/SNYK-JS-GRUNT-597546,CVE-2020-7729,False,<1.3.0 ,https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7
Improper Authorization,nodebb,https://security.snyk.io/vuln/SNYK-JS-NODEBB-607916,CVE-2020-15149,True,>=1.12.2 <1.14.3 ,https://github.com/NodeBB/NodeBB/commit/c2477d9d5ffc43e5ffeb537ea2ceb4ce9592aa39
Command Injection,extra-ffmpeg,https://security.snyk.io/vuln/SNYK-JS-EXTRAFFMPEG-607911,,True,* ,https://github.com/nodef/extra-ffmpeg/commit/e39f999494209c042b39cd74edc44758ff29172b
Prototype Pollution,object-path,https://security.snyk.io/vuln/SNYK-JS-OBJECTPATH-1017036,CVE-2020-15256,True,<0.11.5 ,https://github.com/skratchdot/object-path-set/commit/55f06d75abf5885f9cba3b7760acb38d7d7d06c0
Prototype Pollution,object-path-set,https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908,CVE-2020-15256,True,<1.0.1 ,https://github.com/skratchdot/object-path-set/commit/55f06d75abf5885f9cba3b7760acb38d7d7d06c0
Prototype Pollution,supermixer,https://security.snyk.io/vuln/SNYK-JS-SUPERMIXER-607909,CVE-2020-24939,True,<1.0.5 ,https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3
Command Injection,vboxmanage.js,https://security.snyk.io/vuln/SNYK-JS-VBOXMANAGEJS-607910,,True,<1.0.9 ,https://github.com/danielgindi/node-vboxmanage/commit/8efe421dd19c474cbdeb0908cbcc7aabfe343d5e
Cross-site Scripting (XSS),auth0-lock,https://security.snyk.io/vuln/SNYK-JS-AUTH0LOCK-607904,CVE-2020-15119,False,<11.26.3 ,n/a
Prototype Pollution,linux-cmdline,https://security.snyk.io/vuln/SNYK-JS-LINUXCMDLINE-598674,CVE-2020-7704,False,<1.0.1 ,https://github.com/piranna/linux-cmdline/commit/53c61a88bc47eb25d71832205056beaab95cf677
Prototype Pollution,connie-lang,https://security.snyk.io/vuln/SNYK-JS-CONNIELANG-598853,CVE-2020-7706,False,<0.1.1 ,https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a
Prototype Pollution,property-expr,https://security.snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800,CVE-2020-7707,False,<2.0.3 ,https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7
Prototype Pollution,@irrelon/path,https://security.snyk.io/vuln/SNYK-JS-IRRELONPATH-598673,CVE-2020-7708,False,<4.7.0 ,https://github.com/Irrelon/irrelon-path/commit/8a126b160c1a854ae511659c111413ad9910ebe3
Server-side Request Forgery (SSRF),ftp-srv,https://security.snyk.io/vuln/SNYK-JS-FTPSRV-598863,CVE-2020-15152,False,>=1.0.0 <4.3.4 ,https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca
Prototype Pollution,irrelon-path,https://security.snyk.io/vuln/SNYK-JS-IRRELONPATH-598672,CVE-2020-7708,False,<4.7.0 ,https://github.com/Irrelon/irrelon-path/commit/8a126b160c1a854ae511659c111413ad9910ebe3
Prototype Pollution,templ8,https://security.snyk.io/vuln/SNYK-JS-TEMPL8-598770,CVE-2020-7702,False,* ,n/a
Prototype Pollution,nis-utils,https://security.snyk.io/vuln/SNYK-JS-NISUTILS-598799,CVE-2020-7703,False,* ,n/a
Prototype Pollution,jsonpointer,https://security.snyk.io/vuln/SNYK-JS-JSONPOINTER-598804,,False,<4.1.0 ,https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34
Cross-site Scripting (XSS),bootstrap-switch,https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPSWITCH-597113,,True,* ,n/a
Prototype Pollution,lodash,https://security.snyk.io/vuln/SNYK-JS-LODASH-590103,,False,<4.17.20 ,n/a
Prototype Pollution,madlib-object-utils,https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676,CVE-2020-7701,False,<0.1.7 ,n/a
Prototype Pollution,phpjs,https://security.snyk.io/vuln/SNYK-JS-PHPJS-598681,CVE-2020-7700,False,* ,n/a
Cross-site Scripting (XSS),buefy,https://security.snyk.io/vuln/SNYK-JS-BUEFY-598386,,False,<0.9.0 ,https://github.com/buefy/buefy/commit/47d225053458657b4c4030d48ef946c51f7f5994
Cross-site Scripting (XSS),@progress/kendo-angular-editor,https://security.snyk.io/vuln/SNYK-JS-PROGRESSKENDOANGULAREDITOR-598159,,False,<1.2.3 ,n/a
Cross-site Scripting (XSS),tinymce,https://security.snyk.io/vuln/SNYK-JS-TINYMCE-598223,CVE-2020-12648,False,<4.9.11 >=5.0.0 <5.4.0 ,n/a
Improper Input Validation,jpv,https://security.snyk.io/vuln/SNYK-JS-JPV-598089,CVE-2020-17479,False,<2.2.2 ,https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6
Cross-site Scripting (XSS),prismjs,https://security.snyk.io/vuln/SNYK-JS-PRISMJS-597628,CVE-2020-15138,False,>=1.1.0 <1.21.0 ,https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c
Regular Expression Denial of Service (ReDoS),wappalyzer,https://security.snyk.io/vuln/SNYK-JS-WAPPALYZER-597530,,True,<6.0.6 ,https://github.com/AliasIO/wappalyzer/commit/ad853a3abdd1f558895aaa75852c0510d3b1b87d
Cross-Site Request Forgery (CSRF),polaris-website,https://security.snyk.io/vuln/SNYK-JS-POLARISWEBSITE-597473,,False,<1.1.1 ,n/a
Cross-site Request Forgery (CSRF),save-server,https://security.snyk.io/vuln/SNYK-JS-SAVESERVER-597396,CVE-2020-15135,False,<1.0.7 ,https://github.com/Neztore/save-server/commit/05409a72dfb3d41eb497079f40a4b8e1ff8b4a61
Server-side Request Forgery (SSRF),ftp-srv,https://security.snyk.io/vuln/SNYK-JS-FTPSRV-597159,,False,>=4.0.0 <4.3.4 >=3.1.0 <3.1.2 <2.19.6 ,n/a
Regular Expression Denial of Service (ReDoS),markdown,https://security.snyk.io/vuln/SNYK-JS-MARKDOWN-597156,,False,* ,n/a
Cross-site Scripting (XSS),markdown-it-katex,https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITKATEX-597160,,False,* ,n/a
Regular Expression Denial of Service (ReDoS),is-my-json-valid,https://security.snyk.io/vuln/SNYK-JS-ISMYJSONVALID-597165,,True,<2.20.2 ,https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb
Arbitrary Code Execution,is-my-json-valid,https://security.snyk.io/vuln/SNYK-JS-ISMYJSONVALID-597167,,True,<2.20.3 ,https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d
Incorrect Comparison,slp-validate,https://security.snyk.io/vuln/SNYK-JS-SLPVALIDATE-597083,CVE-2020-15131,False,<1.2.2 ,https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c
Incorrect Comparison,slpjs,https://security.snyk.io/vuln/SNYK-JS-SLPJS-597082,CVE-2020-15130,False,<0.27.4 ,https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c
Information Exposure,auth0,https://security.snyk.io/vuln/SNYK-JS-AUTH0-596476,CVE-2020-15125,False,<2.27.1 ,https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c
Prototype Pollution,express-fileupload,https://security.snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969,CVE-2020-7699,False,<1.1.10 ,n/a
Command Injection,git-tags-remote,https://security.snyk.io/vuln/SNYK-JS-GITTAGSREMOTE-596503,,True,<1.0.3 ,n/a
Prototype Pollution,flat,https://security.snyk.io/vuln/SNYK-JS-FLAT-596927,,True,>=5.0.0 <5.0.2 >=4.0.0 <4.1.1 >=3.0.0 <3.0.1 >=2.0.0 <2.0.2 >=5.0.0 <5.0.2 <1.6.2 ,n/a
Denial of Service (DoS),fastify,https://security.snyk.io/vuln/SNYK-JS-FASTIFY-596516,CVE-2020-8192,False,<2.15.1 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-608662,CVE-2020-6541,False,>=7.0.0 <7.3.3 >=8.0.0 <8.5.1 >=9.0.0 <9.2.2 ,n/a
Use After Free,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-598894,CVE-2020-6532,False,>=7.0.0 <7.3.3 >=8.0.0 <8.5.1 >=9.0.0 <9.2.1 ,n/a
Type Confusion,electron,https://security.snyk.io/vuln/SNYK-JS-ELECTRON-598949,CVE-2020-6537,False,>=9.0.0 <9.2.1 ,n/a
Denial of Service (DoS),fastify,https://security.snyk.io/vuln/SNYK-JS-FASTIFY-595959,,False,>=2.0.0 <2.15.1 >=3.0.0-alpha.1 <3.0.0-rc.5 ,n/a
Arbitrary Code Execution,jingo,https://security.snyk.io/vuln/SNYK-JS-JINGO-595966,,False,<1.9.6 ,https://github.com/claudioc/jingo/commit/6d4738c1aba892c372c4d0628a8a0a1d237ec95d
Prototype Pollution,fast-json-patch,https://security.snyk.io/vuln/SNYK-JS-FASTJSONPATCH-595663,,False,<2.2.1 ,https://github.com/Starcounter-Jack/JSON-Patch/pull/219/commits/dd5d353f5d65888aeac91359484a73f0e2a9e5bd
Regular Expression Denial of Service (ReDoS),marked,https://security.snyk.io/vuln/SNYK-JS-MARKED-584281,,False,<1.1.1 ,https://github.com/markedjs/marked/commit/bd4f8c464befad2b304d51e33e89e567326e62e0
Prototype Pollution,typeorm,https://security.snyk.io/vuln/SNYK-JS-TYPEORM-590152,CVE-2020-8158,False,<0.2.25 ,n/a
Insufficiently Protected Credentials,parse,https://security.snyk.io/vuln/SNYK-JS-PARSE-590110,,True,<2.10.0 ,n/a
Command Injection,diskstats,https://security.snyk.io/vuln/SNYK-JS-DISKSTATS-590099,,True,<0.1.0 ,https://github.com/PhilipSkinner/diskstats/commit/5631570fcaea48e9e86735c7e68757aa3c44e106
Command Injection,xps,https://security.snyk.io/vuln/SNYK-JS-XPS-590098,,True,<1.0.3 ,https://github.com/sorellabs/xps/commit/768481146b8ead3811310eecc0f56e2d107cb740
Access Restriction Bypass,parse-server,https://security.snyk.io/vuln/SNYK-JS-PARSESERVER-590063,CVE-2020-15126,False,>=3.5.0 <4.3.0 ,https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa
Command Injection,mock2easy,https://security.snyk.io/vuln/SNYK-JS-MOCK2EASY-572312,CVE-2020-7697,False,* ,n/a
Denial of Service (DoS),sails-hook-sockets,https://security.snyk.io/vuln/SNYK-JS-SAILSHOOKSOCKETS-589929,CVE-2018-21036,False,<1.5.5 ,https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44
Command Injection,codecov,https://security.snyk.io/vuln/SNYK-JS-CODECOV-585979,CVE-2020-15123,False,<3.7.1 ,https://github.com/codecov/codecov-node/commit/c0711c656686e902af2cd92d6aecc8074de4d83d
Cross-site Request Forgery (CSRF),express-cart,https://security.snyk.io/vuln/SNYK-JS-EXPRESSCART-585983,,True,* ,https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb
Prototype Pollution,i18next,https://security.snyk.io/vuln/SNYK-JS-I18NEXT-585930,,True,<19.8.3 ,https://github.com/i18next/i18next/commit/ed6169fa21b67d8e73b20d82579aff6f9b808a69
Prototype Pollution,fine-uploader,https://security.snyk.io/vuln/SNYK-JS-FINEUPLOADER-585902,,True,* ,n/a
Regular Expression Denial of Service (ReDoS),xlsx,https://security.snyk.io/vuln/SNYK-JS-XLSX-585898,,False,<0.16.0 ,https://github.com/SheetJS/sheetjs/commit/257d4e6db2444ce1a0be814c1c352423f4aba7b5
Cross-site Scripting (XSS),jquery-form,https://security.snyk.io/vuln/SNYK-JS-JQUERYFORM-574783,,False,* ,n/a
Prototype Pollution,ajv,https://security.snyk.io/vuln/SNYK-JS-AJV-584908,CVE-2020-15366,False,<6.12.3 ,n/a
Insecure Defaults,tmi.js,https://security.snyk.io/vuln/SNYK-JS-TMIJS-584986,,False,<1.7.0 ,https://github.com/tmijs/tmi.js/commit/df228dc818dbfe203bf85d19c54e7be1e6177077
Command Injection,windows-shortcuts,https://security.snyk.io/vuln/SNYK-JS-WINDOWSSHORTCUTS-584567,,False,* ,n/a
Cross-site Scripting (XSS),admin-lte,https://security.snyk.io/vuln/SNYK-JS-ADMINLTE-584564,,False,<3.1.0-rc ,https://github.com/ColorlibHQ/AdminLTE/commit/903143a1e1c02b94ec1194b7cec65675755c14a9