Vulnerabilities (CVE)

Total 82278 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-7678 1 Node-import Project 1 Node-import 2024-11-21 N/A 8.6 HIGH
This affects all versions of package node-import. The "params" argument of module function can be controlled by users without any sanitization.b. This is then provided to the “eval” function located in line 79 in the index file "index.js".
CVE-2020-7677 3 Debian, Fedoraproject, Thenify Project 3 Debian Linux, Fedora, Thenify 2024-11-21 N/A 8.6 HIGH
This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
CVE-2020-7672 1 Mosc Project 1 Mosc 2024-11-21 7.5 HIGH 8.6 HIGH
mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution.
CVE-2020-7671 1 Goliath Project 1 Goliath 2024-11-21 5.0 MEDIUM 7.5 HIGH
goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.
CVE-2020-7670 1 Ohler 1 Agoo 2024-11-21 5.0 MEDIUM 7.5 HIGH
agoo prior to 2.14.0 allows request smuggling attacks where agoo is used as a backend and a frontend proxy also being vulnerable. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks where `agoo` is used as part of a chain of backend servers due to insufficient `Content-Length` and `Transfer Encoding` parsing.
CVE-2020-7669 1 U-root 1 U-root 2024-11-21 5.0 MEDIUM 7.5 HIGH
This affects all versions of package github.com/u-root/u-root/pkg/tarutil. It is vulnerable to both leading and non-leading relative path traversal attacks in tar file extraction.
CVE-2020-7668 1 Compression And Archive Extensions Tz Project 1 Compression And Archive Extensions Tz Project 2024-11-21 5.0 MEDIUM 7.5 HIGH
In all versions of the package github.com/unknwon/cae/tz, the ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide.
CVE-2020-7667 1 Sas 1 Go Rpm Utils 2024-11-21 5.0 MEDIUM 7.5 HIGH
In package github.com/sassoftware/go-rpmutils/cpio before version 0.1.0, the CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note: the fixing commit was applied to all affected versions which were re-released.
CVE-2020-7666 1 U-root 1 U-root 2024-11-21 5.0 MEDIUM 7.5 HIGH
This affects all versions of package github.com/u-root/u-root/pkg/cpio. It is vulnerable to leading, non-leading relative path traversal attacks and symlink based (relative and absolute) path traversal attacks in cpio file extraction.
CVE-2020-7665 1 U-root 1 U-root 2024-11-21 5.0 MEDIUM 7.5 HIGH
This affects all versions of package github.com/u-root/u-root/pkg/uzip. It is vulnerable to both leading and non-leading relative path traversal attacks in zip file extraction.
CVE-2020-7664 1 Compression And Archive Extensions Project 1 Compression And Archive Extensions Zip Project 2024-11-21 5.0 MEDIUM 7.5 HIGH
In all versions of the package github.com/unknwon/cae/zip, the ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide.
CVE-2020-7663 1 Websocket-extensions Project 1 Websocket-extensions 2024-11-21 5.0 MEDIUM 7.5 HIGH
websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.
CVE-2020-7662 1 Websocket-extensions Project 1 Websocket-extensions 2024-11-21 5.0 MEDIUM 7.5 HIGH
websocket-extensions npm module prior to 0.1.4 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.
CVE-2020-7661 1 Url-regex Project 1 Url-regex 2024-11-21 7.8 HIGH 7.5 HIGH
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
CVE-2020-7660 1 Verizon 1 Serialize-javascript 2024-11-21 6.8 MEDIUM 8.1 HIGH
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".
CVE-2020-7659 1 Celluloid 1 Reel 2024-11-21 5.0 MEDIUM 7.5 HIGH
reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks. Note: This project is deprecated, and is not maintained any more.
CVE-2020-7654 1 Synk 1 Broker 2024-11-21 4.3 MEDIUM 7.5 HIGH
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.
CVE-2020-7644 1 Fun-map Project 1 Fun-map 2024-11-21 6.8 MEDIUM 8.1 HIGH
fun-map through 3.3.1 is vulnerable to Prototype Pollution. The function assocInM could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
CVE-2020-7615 1 Fsa Project 1 Fsa 2024-11-21 4.6 MEDIUM 7.8 HIGH
fsa through 0.5.1 is vulnerable to Command Injection. The first argument of 'execGitCommand()', located within 'lib/rep.js#63' can be controlled by users without any sanitization to inject arbitrary commands.
CVE-2020-7613 1 Clamscan Project 1 Clamscan 2024-11-21 6.8 MEDIUM 8.1 HIGH
clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that this vulnerability requires a pre-requisite that a folder should be created with the same command that will be chained to execute. This lowers the risk of this issue.