aapl-yumi / subscription-manager Goto Github PK
View Code? Open in Web Editor NEWSimple on device subscription manager app for mobile
License: MIT License
Simple on device subscription manager app for mobile
License: MIT License
a CSS selector parser
Library home page: https://registry.npmjs.org/css-what/-/css-what-3.4.2.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/css-what/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input.
Publish Date: 2021-05-28
URL: CVE-2021-33587
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33587
Release Date: 2021-05-28
Fix Resolution: css-what - 5.0.1
Step up your Open Source Security Game with WhiteSource here
Strips glob magic from a string to provide the parent directory path
Library home page: https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/webpack-dev-server/node_modules/glob-parent/package.json,subscription-manager/node_modules/watchpack-chokidar2/node_modules/glob-parent/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
Publish Date: 2021-06-03
URL: CVE-2020-28469
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469
Release Date: 2021-06-03
Fix Resolution: glob-parent - 5.1.2
Step up your Open Source Security Game with WhiteSource here
A light-weight module that brings window.fetch to node.js and io.js
Library home page: https://registry.npmjs.org/node-fetch/-/node-fetch-1.7.3.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/node-fetch/package.json
Dependency Hierarchy:
A light-weight module that brings window.fetch to node.js
Library home page: https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.0.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/pouchdb-fetch/node_modules/node-fetch/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
node-fetch before versions 2.6.1 and 3.0.0-beta.9 did not honor the size option after following a redirect, which means that when a content size was over the limit, a FetchError would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after fetch() has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.
Publish Date: 2020-09-10
URL: CVE-2020-15168
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-w7rc-rwvf-8q5r
Release Date: 2020-07-21
Fix Resolution: 2.6.1,3.0.0-beta.9
Step up your Open Source Security Game with WhiteSource here
An elegant lib that converts the chalked (ANSI) text to HTML.
Library home page: https://registry.npmjs.org/ansi-html/-/ansi-html-0.0.7.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/ansi-html/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
Publish Date: 2021-08-18
URL: CVE-2021-23424
Base Score Metrics:
Step up your Open Source Security Game with WhiteSource here
Normalize a URL
Library home page: https://registry.npmjs.org/normalize-url/-/normalize-url-1.9.1.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/normalize-url/package.json
Dependency Hierarchy:
Normalize a URL
Library home page: https://registry.npmjs.org/normalize-url/-/normalize-url-3.3.0.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/postcss-normalize-url/node_modules/normalize-url/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
Publish Date: 2021-05-24
URL: CVE-2021-33502
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
Release Date: 2021-05-24
Fix Resolution: normalize-url - 4.5.1, 5.3.1, 6.0.1
Step up your Open Source Security Game with WhiteSource here
Access deep object properties using a path
Library home page: https://registry.npmjs.org/object-path/-/object-path-0.11.5.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/object-path/package.json,subscription-manager/node_modules/event-reduce-js/node_modules/object-path/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Publish Date: 2021-09-17
URL: CVE-2021-3805
Base Score Metrics:
Type: Upgrade version
Origin: https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053/
Release Date: 2021-09-17
Fix Resolution: object-path - 0.11.8
Step up your Open Source Security Game with WhiteSource here
Share target browsers between different front-end tools, like Autoprefixer, Stylelint and babel-env-preset
Library home page: https://registry.npmjs.org/browserslist/-/browserslist-4.14.2.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/react-dev-utils/node_modules/browserslist/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.
Publish Date: 2021-04-28
URL: CVE-2021-23364
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23364
Release Date: 2021-04-28
Fix Resolution: browserslist - 4.16.5
Step up your Open Source Security Game with WhiteSource here
Regular expression for matching ANSI escape codes
Library home page: https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/webpack-dev-server/node_modules/wrap-ansi/node_modules/ansi-regex/package.json,subscription-manager/node_modules/webpack-dev-server/node_modules/cliui/node_modules/ansi-regex/package.json,subscription-manager/node_modules/webpack-dev-server/node_modules/string-width/node_modules/ansi-regex/package.json
Dependency Hierarchy:
Regular expression for matching ANSI escape codes
Library home page: https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
Publish Date: 2021-09-17
URL: CVE-2021-3807
Base Score Metrics:
Type: Upgrade version
Origin: https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994/
Release Date: 2021-09-17
Fix Resolution: ansi-regex - 5.0.1,6.0.1
Step up your Open Source Security Game with WhiteSource here
Access deep object properties using a path
Library home page: https://registry.npmjs.org/object-path/-/object-path-0.11.5.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/object-path/package.json,subscription-manager/node_modules/event-reduce-js/node_modules/object-path/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === 'proto' returns false if currentPath is ['proto']. This is because the === operator returns always false when the type of the operands is different.
Publish Date: 2021-08-27
URL: CVE-2021-23434
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23434
Release Date: 2021-08-27
Fix Resolution: object-path - 0.11.6
Step up your Open Source Security Game with WhiteSource here
performant nth-check parser & compiler
Library home page: https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/nth-check/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
nth-check is vulnerable to Inefficient Regular Expression Complexity
Publish Date: 2021-09-17
URL: CVE-2021-3803
Base Score Metrics:
Type: Upgrade version
Origin: fb55/nth-check@v2.0.0...v2.0.1
Release Date: 2021-09-17
Fix Resolution: nth-check - v2.0.1
Step up your Open Source Security Game with WhiteSource here
Embedded JavaScript templates
Library home page: https://registry.npmjs.org/ejs/-/ejs-2.7.4.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/ejs/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
Arbitrary Code Injection vulnerability was found in ejs before 3.1.6. Caused by filename which isn't sanitized for display.
Publish Date: 2021-01-22
URL: WS-2021-0153
Base Score Metrics:
Type: Upgrade version
Origin: mde/ejs#571
Release Date: 2021-01-22
Fix Resolution: ejs - 3.1.6
Step up your Open Source Security Game with WhiteSource here
Create your next immutable state by mutating the current one
Library home page: https://registry.npmjs.org/immer/-/immer-8.0.1.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/immer/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Publish Date: 2021-09-02
URL: CVE-2021-3757
Base Score Metrics:
Type: Upgrade version
Origin: https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa/
Release Date: 2021-09-02
Fix Resolution: immer - 9.0.6
Step up your Open Source Security Game with WhiteSource here
Create your next immutable state by mutating the current one
Library home page: https://registry.npmjs.org/immer/-/immer-8.0.1.tgz
Path to dependency file: subscription-manager/package.json
Path to vulnerable library: subscription-manager/node_modules/immer/package.json
Dependency Hierarchy:
Found in HEAD commit: ab542a4121b85e1e263db5e67b1e949c36a3124a
Found in base branch: main
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "proto" || p === "constructor") in applyPatches_ returns false if p is ['proto'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.
Publish Date: 2021-09-01
URL: CVE-2021-23436
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23436
Release Date: 2021-09-01
Fix Resolution: immer - 9.0.6
Step up your Open Source Security Game with WhiteSource here
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.