Code Monkey home page Code Monkey logo

example-javascript-yarn's People

Contributors

confz avatar fufunoyu avatar jamijam avatar mend-bolt-for-github[bot] avatar priteshmehta avatar

Watchers

 avatar

Forkers

pujasanap

example-javascript-yarn's Issues

WS-2017-0115 (Medium) detected in angular-1.3.19.tgz

WS-2017-0115 - Medium Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

angular.js doesn't sanitize a url attribute usemap causing a potential XSS vulnerability

Publish Date: 2016-01-22

URL: WS-2017-0115

CVSS 3 Score Details (5.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: angular/angular.js#13826

Release Date: 2016-01-22

Fix Resolution: angular - 1.5.0

WS-2016-0082 (Medium) detected in tinymce-4.2.3.tgz

WS-2016-0082 - Medium Severity Vulnerability

Vulnerable Library - tinymce-4.2.3.tgz

Web based JavaScript HTML WYSIWYG editor control.

Library home page: https://registry.npmjs.org/tinymce/-/tinymce-4.2.3.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/tinymce/package.json

Dependency Hierarchy:

  • tinymce-4.2.3.tgz (Vulnerable Library)

Vulnerability Details

Tinymce is vulnerable to Cross-Site Scripting (XSS) attacks due to improperly filtered script attributes.

Publish Date: 2015-08-13

URL: WS-2016-0082

CVSS 3 Score Details (5.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: tinymce/tinymce@c68a593

Release Date: 2015-08-13

Fix Resolution: 4.2.4

CVE-2018-1000620 (High) detected in cryptiles-2.0.5.tgz

CVE-2018-1000620 - High Severity Vulnerability

Vulnerable Library - cryptiles-2.0.5.tgz

General purpose crypto utilities

Library home page: https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/cryptiles/package.json

Dependency Hierarchy:

  • vision-0.8.0.tgz (Root Library)
    • common-0.12.2.tgz
      • retry-request-1.3.2.tgz
        • request-2.76.0.tgz
          • hawk-3.1.3.tgz
            • cryptiles-2.0.5.tgz (Vulnerable Library)

Vulnerability Details

Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.

Publish Date: 2018-07-09

URL: CVE-2018-1000620

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620

Release Date: 2018-07-09

Fix Resolution: v4.1.2

WS-2018-0076 (Medium) detected in tunnel-agent-0.4.3.tgz

WS-2018-0076 - Medium Severity Vulnerability

Vulnerable Library - tunnel-agent-0.4.3.tgz

HTTP proxy tunneling agent. Formerly part of mikeal/request, now a standalone module.

Library home page: https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/retry-request/node_modules/tunnel-agent/package.json

Dependency Hierarchy:

  • vision-0.8.0.tgz (Root Library)
    • common-0.12.2.tgz
      • retry-request-1.3.2.tgz
        • request-2.76.0.tgz
          • tunnel-agent-0.4.3.tgz (Vulnerable Library)

Vulnerability Details

Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure.

This is exploitable if user supplied input is provided to the auth value and is a number.

Publish Date: 2017-03-05

URL: WS-2018-0076

CVSS 3 Score Details (5.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nodesecurity.io/advisories/598

Release Date: 2018-01-27

Fix Resolution: 0.6.0

WS-2017-0116 (Medium) detected in angular-1.3.19.tgz

WS-2017-0116 - Medium Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

The use element can reference external svg's (same origin) and can include xlink javascript urls or foreign object that can execute xss.

Publish Date: 2015-12-05

URL: WS-2017-0116

CVSS 3 Score Details (5.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: angular/angular.js#13453

Release Date: 2015-12-05

Fix Resolution: angular - 1.5.0

CVE-2016-1000236 (Medium) detected in cookie-signature-1.0.3.tgz, cookie-signature-1.0.2.tgz

CVE-2016-1000236 - Medium Severity Vulnerability

Vulnerable Libraries - cookie-signature-1.0.3.tgz, cookie-signature-1.0.2.tgz

cookie-signature-1.0.3.tgz

Sign and unsign cookies

Library home page: https://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.3.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/cookie-signature/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • cookie-signature-1.0.3.tgz (Vulnerable Library)
cookie-signature-1.0.2.tgz

Sign and unsign cookies

Library home page: https://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.2.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/cookie-signature/package.json

Dependency Hierarchy:

  • cookie-signature-1.0.2.tgz (Vulnerable Library)

Found in HEAD commit: feafbfc408c2cad0c55aeb6164e9fc5c778f4193

Vulnerability Details

Node-cookie-signature before 1.0.6 is affected by a timing attack due to the type of comparison used.

Publish Date: 2019-11-19

URL: CVE-2016-1000236

CVSS 3 Score Details (4.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: tj/node-cookie-signature@3979108

Release Date: 2019-11-19

Fix Resolution: 1.0.4

CVE-2019-14863 (Medium) detected in angular-1.3.19.tgz

CVE-2019-14863 - Medium Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Found in HEAD commit: 5952b4799973c967cddd832c81814ba707512636

Vulnerability Details

There is a vulnerability in all angular versions before 1.5.0-beta.0, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.

Publish Date: 2020-01-02

URL: CVE-2019-14863

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: angular/angular.js#12524

Release Date: 2020-01-02

Fix Resolution: angular - v1.5.0-beta.1;org.webjars:angularjs:1.5.0-rc.0

CVE-2016-10542 High Severity Vulnerability detected by WhiteSource

CVE-2016-10542 - High Severity Vulnerability

Vulnerable Libraries - ws-1.0.1.tgz, ws-1.1.0.tgz

ws-1.0.1.tgz

simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455

path: /tmp/git/example-javascript-yarn/node_modules/engine.io-client/node_modules/ws/package.json

Library home page: http://registry.npmjs.org/ws/-/ws-1.0.1.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • socket.io-client-1.4.8.tgz
        • engine.io-client-1.6.11.tgz
          • ws-1.0.1.tgz (Vulnerable Library)
ws-1.1.0.tgz

simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455

path: /tmp/git/example-javascript-yarn/node_modules/ws/package.json

Library home page: https://registry.npmjs.org/ws/-/ws-1.1.0.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • engine.io-1.6.11.tgz
        • ws-1.1.0.tgz (Vulnerable Library)

Vulnerability Details

ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a ws server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.

Publish Date: 2018-05-31

URL: CVE-2016-10542

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858

Release Date: 2018-12-15

Fix Resolution: v2.4.24


Step up your Open Source Security Game with WhiteSource here

WS-2017-0117 (Medium) detected in angular-1.3.19.tgz

WS-2017-0117 - Medium Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

Affected versions of the package are vulnerable to Cross-site Scripting (XSS) attacks.

Publish Date: 2015-11-30

URL: WS-2017-0117

CVSS 3 Score Details (5.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Change files

Origin: angular/angular.js@5a674f3

Release Date: 2015-12-06

Fix Resolution: Replace or update the following files: parseSpec.js, parse.js

CVE-2015-9251 (Medium) detected in jquery-2.1.0.min.js

CVE-2015-9251 - Medium Severity Vulnerability

Vulnerable Library - jquery-2.1.0.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.0/jquery.min.js

Path to dependency file: /tmp/ws-scm/example-javascript-yarn/node_modules/console-io/modules/jq-console/demos/index.html

Path to vulnerable library: /example-javascript-yarn/node_modules/console-io/modules/jq-console/demos/index.html

Dependency Hierarchy:

  • jquery-2.1.0.min.js (Vulnerable Library)

Found in HEAD commit: c6a72f0e5f5a8da54ee8f9eceb189bfd80a88878

Vulnerability Details

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

Publish Date: 2018-01-18

URL: CVE-2015-9251

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-9251

Release Date: 2018-01-18

Fix Resolution: jQuery - v3.0.0

WS-2019-0017 (Medium) detected in clean-css-3.4.28.tgz

WS-2019-0017 - Medium Severity Vulnerability

Vulnerable Library - clean-css-3.4.28.tgz

A well-tested CSS minifier

Library home page: https://registry.npmjs.org/clean-css/-/clean-css-3.4.28.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/clean-css/package.json

Dependency Hierarchy:

  • console-io-3.0.12.tgz (Root Library)
    • join-io-1.4.6.tgz
      • minify-2.1.8.tgz
        • clean-css-3.4.28.tgz (Vulnerable Library)

Vulnerability Details

Version of clean-css prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.

Publish Date: 2018-03-06

URL: WS-2019-0017

CVSS 2 Score Details (5.0)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/785

Release Date: 2019-02-21

Fix Resolution: v4.1.11

CVE-2019-11358 (Medium) detected in jquery-3.0.0-alpha1.tgz

CVE-2019-11358 - Medium Severity Vulnerability

Vulnerable Library - jquery-3.0.0-alpha1.tgz

JavaScript library for DOM operations

Library home page: https://registry.npmjs.org/jquery/-/jquery-3.0.0-alpha1.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/jquery/package.json

Dependency Hierarchy:

  • jquery-3.0.0-alpha1.tgz (Vulnerable Library)

Found in HEAD commit: c6a72f0e5f5a8da54ee8f9eceb189bfd80a88878

Vulnerability Details

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable proto property, it could extend the native Object.prototype.

Publish Date: 2019-04-20

URL: CVE-2019-11358

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358

Release Date: 2019-04-20

Fix Resolution: 3.4.0

WS-2017-0268 (Medium) detected in angular-1.3.19.tgz

WS-2017-0268 - Medium Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

Both Firefox and Safari are vulnerable to XSS if we use an inert document created via document.implementation.createHTMLDocument().

Publish Date: 2017-05-25

URL: WS-2017-0268

CVSS 3 Score Details (4.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Change files

Origin: angular/angular.js@8f31f1f

Release Date: 2017-06-05

Fix Resolution: Replace or update the following files: sanitize.js, sanitizeSpec.js

CVE-2017-16113 High Severity Vulnerability detected by WhiteSource

CVE-2017-16113 - High Severity Vulnerability

Vulnerable Library - parsejson-0.0.1.tgz

Method that parses a JSON string and returns a JSON object

path: /tmp/git/example-javascript-yarn/node_modules/parsejson/package.json

Library home page: http://registry.npmjs.org/parsejson/-/parsejson-0.0.1.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • socket.io-client-1.4.8.tgz
        • engine.io-client-1.6.11.tgz
          • parsejson-0.0.1.tgz (Vulnerable Library)

Vulnerability Details

The parsejson module is vulnerable to regular expression denial of service when untrusted user input is passed into it to be parsed.

Publish Date: 2018-06-07

URL: CVE-2017-16113

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with WhiteSource here

CVE-2019-10768 (High) detected in angular-1.3.19.tgz

CVE-2019-10768 - High Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Found in HEAD commit: feafbfc408c2cad0c55aeb6164e9fc5c778f4193

Vulnerability Details

In AngularJS before 1.7.9 the function merge() could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.

Publish Date: 2019-11-19

URL: CVE-2019-10768

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10768

Release Date: 2019-11-19

Fix Resolution: v1.7.9

CVE-2016-10539 (High) detected in negotiator-0.4.9.tgz

CVE-2016-10539 - High Severity Vulnerability

Vulnerable Library - negotiator-0.4.9.tgz

HTTP content negotiation

Library home page: https://registry.npmjs.org/negotiator/-/negotiator-0.4.9.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/negotiator/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • accepts-1.0.1.tgz
      • negotiator-0.4.9.tgz (Vulnerable Library)

Vulnerability Details

negotiator is an HTTP content negotiator for Node.js and is used by many modules and frameworks including Express and Koa. The header for "Accept-Language", when parsed by negotiator 0.6.0 and earlier is vulnerable to Regular Expression Denial of Service via a specially crafted string.

Publish Date: 2018-05-31

URL: CVE-2016-10539

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/106

Release Date: 2018-05-31

Fix Resolution: 0.6.1

WS-2016-0031 High Severity Vulnerability detected by WhiteSource

WS-2016-0031 - High Severity Vulnerability

Vulnerable Libraries - ws-1.0.1.tgz, ws-1.1.0.tgz

ws-1.0.1.tgz

simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455

path: /tmp/git/example-javascript-yarn/node_modules/engine.io-client/node_modules/ws/package.json

Library home page: http://registry.npmjs.org/ws/-/ws-1.0.1.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • socket.io-client-1.4.8.tgz
        • engine.io-client-1.6.11.tgz
          • ws-1.0.1.tgz (Vulnerable Library)
ws-1.1.0.tgz

simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455

path: /tmp/git/example-javascript-yarn/node_modules/ws/package.json

Library home page: https://registry.npmjs.org/ws/-/ws-1.1.0.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • engine.io-1.6.11.tgz
        • ws-1.1.0.tgz (Vulnerable Library)

Vulnerability Details

DoS in ws module due to excessively large websocket message.

Publish Date: 2016-06-24

URL: WS-2016-0031

CVSS 2 Score Details (7.5)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://nodesecurity.io/advisories/120

Release Date: 2016-06-24

Fix Resolution: Update to version 1.1.1 of ws, or if that is not possible, set the `maxpayload` option for the `ws` server - make sure the value is less than 256MB.


Step up your Open Source Security Game with WhiteSource here

CVE-2017-16137 (Medium) detected in debug-0.8.1.tgz, debug-0.8.0.tgz

CVE-2017-16137 - Medium Severity Vulnerability

Vulnerable Libraries - debug-0.8.1.tgz, debug-0.8.0.tgz

debug-0.8.1.tgz

small debugging utility

Library home page: https://registry.npmjs.org/debug/-/debug-0.8.1.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/debug/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • debug-0.8.1.tgz (Vulnerable Library)
debug-0.8.0.tgz

small debugging utility

Library home page: https://registry.npmjs.org/debug/-/debug-0.8.0.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/send/node_modules/debug/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • send-0.3.0.tgz
      • debug-0.8.0.tgz (Vulnerable Library)

Vulnerability Details

The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.

Publish Date: 2018-06-07

URL: CVE-2017-16137

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137

Release Date: 2018-06-07

Fix Resolution: 2.6.9

WS-2020-0008 (High) detected in tinymce-4.2.3.tgz

WS-2020-0008 - High Severity Vulnerability

Vulnerable Library - tinymce-4.2.3.tgz

Web based JavaScript HTML WYSIWYG editor control.

Library home page: https://registry.npmjs.org/tinymce/-/tinymce-4.2.3.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/tinymce/package.json

Dependency Hierarchy:

  • tinymce-4.2.3.tgz (Vulnerable Library)

Found in HEAD commit: 5952b4799973c967cddd832c81814ba707512636

Vulnerability Details

A cross-site scripting (XSS) vulnerability was discovered in the core parser, "paste" and "visualchars" plugins.

Publish Date: 2019-12-11

URL: WS-2020-0008

CVSS 3 Score Details (7.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: High
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-27gm-ghr9-4v95

Release Date: 2020-02-10

Fix Resolution: 4.9.7

CVE-2014-10064 (High) detected in qs-0.6.6.tgz

CVE-2014-10064 - High Severity Vulnerability

Vulnerable Library - qs-0.6.6.tgz

querystring parser

Library home page: https://registry.npmjs.org/qs/-/qs-0.6.6.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/qs/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • qs-0.6.6.tgz (Vulnerable Library)

Vulnerability Details

The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.

Publish Date: 2018-05-31

URL: CVE-2014-10064

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nodesecurity.io/advisories/28

Release Date: 2014-08-06

Fix Resolution: Update to version 1.0.0 or later

CVE-2020-8116 (High) detected in dot-prop-2.4.0.tgz

CVE-2020-8116 - High Severity Vulnerability

Vulnerable Library - dot-prop-2.4.0.tgz

Get, set, or delete a property from a nested object using a dot path

Library home page: https://registry.npmjs.org/dot-prop/-/dot-prop-2.4.0.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/dot-prop/package.json

Dependency Hierarchy:

  • vision-0.8.0.tgz (Root Library)
    • common-grpc-0.1.6.tgz
      • dot-prop-2.4.0.tgz (Vulnerable Library)

Found in HEAD commit: 8de8dcc36a2d87b12fc311a53d1f13c12501a12c

Vulnerability Details

Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.

Publish Date: 2020-02-04

URL: CVE-2020-8116

CVSS 3 Score Details (7.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116

Release Date: 2020-02-04

Fix Resolution: dot-prop - 5.1.1

WS-2017-0118 (Medium) detected in angular-1.3.19.tgz

WS-2017-0118 - Medium Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

Affected versions of the package are vulnerable to Mutation Cross-site Scripting (mXSS).

Publish Date: 2015-09-08

URL: WS-2017-0118

CVSS 3 Score Details (5.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: angular/angular.js#12524

Release Date: 2017-01-31

Fix Resolution: v1.5.0-beta.1

CVE-2017-16119 (High) detected in fresh-0.2.2.tgz

CVE-2017-16119 - High Severity Vulnerability

Vulnerable Library - fresh-0.2.2.tgz

HTTP response freshness testing

Library home page: https://registry.npmjs.org/fresh/-/fresh-0.2.2.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/fresh/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • fresh-0.2.2.tgz (Vulnerable Library)

Vulnerability Details

Fresh is a module used by the Express.js framework for HTTP response freshness testing. It is vulnerable to a regular expression denial of service when it is passed specially crafted input to parse. This causes the event loop to be blocked causing a denial of service condition.

Publish Date: 2018-06-07

URL: CVE-2017-16119

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16119

Release Date: 2018-06-07

Fix Resolution: 0.5.2

WS-2017-0120 High Severity Vulnerability detected by WhiteSource

WS-2017-0120 - High Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

path: /example-javascript-yarn/node_modules/angular/package.json

Library home page: http://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

No proper sanitize of xlink:href attribute interoplation, thus vulnerable to Cross-site Scripting (XSS).

Publish Date: 2017-01-20

URL: WS-2017-0120

CVSS 2 Score Details (7.8)

Base Score Metrics not available

Suggested Fix

Type: Change files

Origin: angular/angular.js@f33ce17

Release Date: 2015-09-18

Fix Resolution: Replace or update the following files: compileSpec.js, compile.js


Step up your Open Source Security Game with WhiteSource here

WS-2019-0367 (Medium) detected in angular-1.3.19.tgz

WS-2019-0367 - Medium Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: /tmp/ws-scm/example-javascript-yarn/package.json

Path to vulnerable library: /example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Found in HEAD commit: feafbfc408c2cad0c55aeb6164e9fc5c778f4193

Vulnerability Details

Prototype Pollution vulnerability found in Angular before 1.7.9.

Publish Date: 2020-01-08

URL: WS-2019-0367

CVSS 2 Score Details (5.0)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://github.com/angular/angular.js/blob/master/CHANGELOG.md#179-pollution-eradication-2019-11-19

Release Date: 2020-01-08

Fix Resolution: angular - 1.7.9

CVE-2015-1164 (Medium) detected in serve-static-1.1.0.tgz

CVE-2015-1164 - Medium Severity Vulnerability

Vulnerable Library - serve-static-1.1.0.tgz

Serve static files

Library home page: https://registry.npmjs.org/serve-static/-/serve-static-1.1.0.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/serve-static/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • serve-static-1.1.0.tgz (Vulnerable Library)

Vulnerability Details

Open redirect vulnerability in the serve-static plugin before 1.7.2 for Node.js, when mounted at the root, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the PATH_INFO to the default URI.

Publish Date: 2015-01-21

URL: CVE-2015-1164

CVSS 2 Score Details (4.3)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-1164

Release Date: 2015-01-21

Fix Resolution: 1.7.2

WS-2016-0040 High Severity Vulnerability detected by WhiteSource

WS-2016-0040 - High Severity Vulnerability

Vulnerable Libraries - ws-1.0.1.tgz, ws-1.1.0.tgz

ws-1.0.1.tgz

simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455

path: /tmp/git/example-javascript-yarn/node_modules/engine.io-client/node_modules/ws/package.json

Library home page: http://registry.npmjs.org/ws/-/ws-1.0.1.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • socket.io-client-1.4.8.tgz
        • engine.io-client-1.6.11.tgz
          • ws-1.0.1.tgz (Vulnerable Library)
ws-1.1.0.tgz

simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455

path: /tmp/git/example-javascript-yarn/node_modules/ws/package.json

Library home page: https://registry.npmjs.org/ws/-/ws-1.1.0.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • engine.io-1.6.11.tgz
        • ws-1.1.0.tgz (Vulnerable Library)

Vulnerability Details

By sending an overly long websocket payload to a ws server, it is possible to crash the node process.

Publish Date: 2016-06-24

URL: WS-2016-0040

CVSS 2 Score Details (7.5)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://nodesecurity.io/advisories/120

Release Date: 2016-06-24

Fix Resolution: Update to version 1.1.1 of ws, or if that is not possible, set the `maxpayload` option for the `ws` server - make sure the value is less than 256MB.


Step up your Open Source Security Game with WhiteSource here

CVE-2014-7191 (Medium) detected in qs-0.6.6.tgz

CVE-2014-7191 - Medium Severity Vulnerability

Vulnerable Library - qs-0.6.6.tgz

querystring parser

Library home page: https://registry.npmjs.org/qs/-/qs-0.6.6.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/qs/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • qs-0.6.6.tgz (Vulnerable Library)

Vulnerability Details

The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.

Publish Date: 2014-10-19

URL: CVE-2014-7191

CVSS 2 Score Details (5.0)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2014-7191

Release Date: 2014-10-19

Fix Resolution: 1.0.0

WS-2017-0330 Medium Severity Vulnerability detected by WhiteSource

WS-2017-0330 - Medium Severity Vulnerability

Vulnerable Libraries - mime-1.3.4.tgz, mime-1.2.11.tgz

mime-1.3.4.tgz

A comprehensive library for mime-type mapping

path: /tmp/git/example-javascript-yarn/node_modules/send/node_modules/mime/package.json

Library home page: http://registry.npmjs.org/mime/-/mime-1.3.4.tgz

Dependency Hierarchy:

  • nodejs-repo-tools-1.0.0.tgz (Root Library)
    • supertest-1.2.0.tgz
      • superagent-1.8.5.tgz
        • mime-1.3.4.tgz (Vulnerable Library)
mime-1.2.11.tgz

A comprehensive library for mime-type mapping

path: /tmp/git/example-javascript-yarn/node_modules/express/node_modules/mime/package.json

Library home page: http://registry.npmjs.org/mime/-/mime-1.2.11.tgz

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • accepts-1.0.1.tgz
      • mime-1.2.11.tgz (Vulnerable Library)

Vulnerability Details

Affected version of mime (1.0.0 throw 1.4.0 and 2.0.0 throw 2.0.2), are vulnerable to regular expression denial of service.

Publish Date: 2017-09-27

URL: WS-2017-0330

CVSS 2 Score Details (5.0)

Base Score Metrics not available


Step up your Open Source Security Game with WhiteSource here

WS-2018-0022 (Medium) detected in angular-1.3.19.tgz

WS-2018-0022 - Medium Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

XSS vulnerability in angular.js (1.6.8 and before)

Publish Date: 2018-01-06

URL: WS-2018-0022

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/angular/angular.js/blob/master/CHANGELOG.md#169-fiery-basilisk-2018-02-02

Release Date: 2018-01-21

Fix Resolution: 1.6.9

WS-2016-0090 Medium Severity Vulnerability detected by WhiteSource

WS-2016-0090 - Medium Severity Vulnerability

Vulnerable Library - jquery-3.0.0-alpha1.tgz

JavaScript library for DOM operations

path: /example-javascript-yarn/node_modules/jquery/package.json

Library home page: http://registry.npmjs.org/jquery/-/jquery-3.0.0-alpha1.tgz

Dependency Hierarchy:

  • jquery-3.0.0-alpha1.tgz (Vulnerable Library)

Vulnerability Details

JQuery is vulnerable to Cross-site Scripting (XSS) attacks via text/javascript response with arbitrary code execution.

Publish Date: 2016-11-27

URL: WS-2016-0090

CVSS 2 Score Details (4.3)

Base Score Metrics not available


Step up your Open Source Security Game with WhiteSource here

CVE-2017-16129 (Medium) detected in superagent-1.8.5.tgz

CVE-2017-16129 - Medium Severity Vulnerability

Vulnerable Library - superagent-1.8.5.tgz

elegant & feature rich browser / node HTTP with a fluent API

Library home page: https://registry.npmjs.org/superagent/-/superagent-1.8.5.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/superagent/package.json

Dependency Hierarchy:

  • nodejs-repo-tools-1.0.0.tgz (Root Library)
    • supertest-1.2.0.tgz
      • superagent-1.8.5.tgz (Vulnerable Library)

Vulnerability Details

The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.

Publish Date: 2018-06-07

URL: CVE-2017-16129

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/479/versions

Release Date: 2018-06-07

Fix Resolution: 3.7.0

WS-2017-0119 (High) detected in angular-1.3.19.tgz

WS-2017-0119 - High Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

All versions of Angular.js prior to 1.5.0-beta1 are vulnerable to click-hijacking.
This was caused by the svg support being turned on by default.
The svg support is now an opt-in. Applications that depend on this option can turn it back on but they should inform themselves on preventing the vulnerability while the option is turned on.

Publish Date: 2015-08-07

URL: WS-2017-0119

CVSS 3 Score Details (7.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: angular/angular.js#12524

Release Date: 2017-01-31

Fix Resolution: v1.5.0-beta.1

CVE-2017-16138 (High) detected in mime-1.3.4.tgz, mime-1.2.11.tgz

CVE-2017-16138 - High Severity Vulnerability

Vulnerable Libraries - mime-1.3.4.tgz, mime-1.2.11.tgz

mime-1.3.4.tgz

A comprehensive library for mime-type mapping

Library home page: https://registry.npmjs.org/mime/-/mime-1.3.4.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/superagent/node_modules/mime/package.json

Dependency Hierarchy:

  • nodejs-repo-tools-1.0.0.tgz (Root Library)
    • supertest-1.2.0.tgz
      • superagent-1.8.5.tgz
        • mime-1.3.4.tgz (Vulnerable Library)
mime-1.2.11.tgz

A comprehensive library for mime-type mapping

Library home page: https://registry.npmjs.org/mime/-/mime-1.2.11.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/mime/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • accepts-1.0.1.tgz
      • mime-1.2.11.tgz (Vulnerable Library)

Vulnerability Details

The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.

Publish Date: 2018-06-07

URL: CVE-2017-16138

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138

Release Date: 2018-06-07

Fix Resolution: 1.4.1,2.0.3

WS-2016-0056 Medium Severity Vulnerability detected by WhiteSource

WS-2016-0056 - Medium Severity Vulnerability

Vulnerable Libraries - cookie-signature-1.0.3.tgz, cookie-signature-1.0.2.tgz

cookie-signature-1.0.3.tgz

Sign and unsign cookies

path: /tmp/git/example-javascript-yarn/node_modules/express/node_modules/cookie-signature/package.json

Library home page: http://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.3.tgz

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • cookie-signature-1.0.3.tgz (Vulnerable Library)
cookie-signature-1.0.2.tgz

Sign and unsign cookies

path: /example-javascript-yarn/node_modules/cookie-signature/package.json

Library home page: http://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.2.tgz

Dependency Hierarchy:

  • cookie-signature-1.0.2.tgz (Vulnerable Library)

Vulnerability Details

Cookie-signature before 1.0.4 allows attackers to guess the secret token one character at a time via a timing attack.

Publish Date: 2016-08-29

URL: WS-2016-0056

CVSS 2 Score Details (5.3)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: tj/node-cookie-signature@3979108

Release Date: 2017-01-31

Fix Resolution: 1.0.4


Step up your Open Source Security Game with WhiteSource here

CVE-2018-16492 (High) detected in extend-3.0.0.tgz

CVE-2018-16492 - High Severity Vulnerability

Vulnerable Library - extend-3.0.0.tgz

Port of jQuery.extend for node.js and the browser

Library home page: https://registry.npmjs.org/extend/-/extend-3.0.0.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/superagent/node_modules/extend/package.json

Dependency Hierarchy:

  • nodejs-repo-tools-1.0.0.tgz (Root Library)
    • supertest-1.2.0.tgz
      • superagent-1.8.5.tgz
        • extend-3.0.0.tgz (Vulnerable Library)

Vulnerability Details

A prototype pollution vulnerability was found in module extend <2.0.2, ~<3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype.

Publish Date: 2019-02-01

URL: CVE-2018-16492

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://hackerone.com/reports/381185

Release Date: 2019-02-01

Fix Resolution: extend - v3.0.2,v2.0.2

WS-2014-0005 (High) detected in qs-0.6.6.tgz

WS-2014-0005 - High Severity Vulnerability

Vulnerable Library - qs-0.6.6.tgz

querystring parser

Library home page: https://registry.npmjs.org/qs/-/qs-0.6.6.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/qs/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • qs-0.6.6.tgz (Vulnerable Library)

Vulnerability Details

Denial-of-Service Extended Event Loop Blocking.The qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time

Publish Date: 2014-07-31

URL: WS-2014-0005

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nodesecurity.io/advisories/qs_dos_extended_event_loop_blocking

Release Date: 2014-08-06

Fix Resolution: Update qs to version 1.0.0 or greater

CVE-2019-3820 (Medium) detected in jquery-3.0.0-alpha1.tgz

CVE-2019-3820 - Medium Severity Vulnerability

Vulnerable Library - jquery-3.0.0-alpha1.tgz

JavaScript library for DOM operations

Library home page: https://registry.npmjs.org/jquery/-/jquery-3.0.0-alpha1.tgz

Path to dependency file: /tmp/ws-scm/example-javascript-yarn/package.json

Path to vulnerable library: /example-javascript-yarn/node_modules/jquery/package.json

Dependency Hierarchy:

  • jquery-3.0.0-alpha1.tgz (Vulnerable Library)

Found in HEAD commit: a4714fad57f1f55e2c2c56f45d764d6f4bcad970

Vulnerability Details

It was discovered that the gnome-shell lock screen since version 3.15.91 did not properly restrict all contextual actions. An attacker with physical access to a locked workstation could invoke certain keyboard shortcuts, and potentially other actions.

Publish Date: 2019-02-06

URL: CVE-2019-3820

CVSS 3 Score Details (4.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Physical
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://gitlab.gnome.org/GNOME/gnome-shell/issues/851

Release Date: 2019-02-06

Fix Resolution: 3.15.91

WS-2019-0149 (Medium) detected in ponse-1.6.1.tgz

WS-2019-0149 - Medium Severity Vulnerability

Vulnerable Library - ponse-1.6.1.tgz

Module for work with requests and responses

Library home page: https://registry.npmjs.org/ponse/-/ponse-1.6.1.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/ponse/package.json

Dependency Hierarchy:

  • console-io-3.0.12.tgz (Root Library)
    • join-io-1.4.6.tgz
      • ponse-1.6.1.tgz (Vulnerable Library)

Found in HEAD commit: c6a72f0e5f5a8da54ee8f9eceb189bfd80a88878

Vulnerability Details

there is a path traversal vulnerability in ponse versions before 2.0.2 since the package fails to sanitize URLs

Publish Date: 2018-07-19

URL: WS-2019-0149

CVSS 2 Score Details (5.0)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1002

Release Date: 2019-07-15

Fix Resolution: 2.0.2

CVE-2018-3728 (High) detected in hoek-2.16.3.tgz

CVE-2018-3728 - High Severity Vulnerability

Vulnerable Library - hoek-2.16.3.tgz

General purpose node utilities

Library home page: https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/hoek/package.json

Dependency Hierarchy:

  • vision-0.8.0.tgz (Root Library)
    • common-0.12.2.tgz
      • retry-request-1.3.2.tgz
        • request-2.76.0.tgz
          • hawk-3.1.3.tgz
            • hoek-2.16.3.tgz (Vulnerable Library)

Vulnerability Details

hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via proto, causing the addition or modification of an existing property that will exist on all objects.

Publish Date: 2018-03-30

URL: CVE-2018-3728

CVSS 3 Score Details (8.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-3728

Release Date: 2018-03-30

Fix Resolution: 4.2.1,5.0.3

WS-2017-0107 Medium Severity Vulnerability detected by WhiteSource

WS-2017-0107 - Medium Severity Vulnerability

Vulnerable Libraries - ws-1.0.1.tgz, ws-1.1.0.tgz

ws-1.0.1.tgz

simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455

path: /tmp/git/example-javascript-yarn/node_modules/engine.io-client/node_modules/ws/package.json

Library home page: http://registry.npmjs.org/ws/-/ws-1.0.1.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • socket.io-client-1.4.8.tgz
        • engine.io-client-1.6.11.tgz
          • ws-1.0.1.tgz (Vulnerable Library)
ws-1.1.0.tgz

simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455

path: /tmp/git/example-javascript-yarn/node_modules/ws/package.json

Library home page: https://registry.npmjs.org/ws/-/ws-1.1.0.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • engine.io-1.6.11.tgz
        • ws-1.1.0.tgz (Vulnerable Library)

Vulnerability Details

Depending on the JavaScript engine, Math.random can be anywhere between extremely insecure and cryptographically pseudo-random.
Versions which use Math.random can produce predictable values, thus shall not be used.

Publish Date: 2016-09-20

URL: WS-2017-0107

CVSS 2 Score Details (5.9)

Base Score Metrics not available

Suggested Fix

Type: Change files

Origin: websockets/ws@7253f06

Release Date: 2016-11-25

Fix Resolution: Replace or update the following file: Sender.js


Step up your Open Source Security Game with WhiteSource here

CVE-2015-8859 (Medium) detected in send-0.3.0.tgz

CVE-2015-8859 - Medium Severity Vulnerability

Vulnerable Library - send-0.3.0.tgz

Better streaming static file server with Range and conditional-GET support

Library home page: https://registry.npmjs.org/send/-/send-0.3.0.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/send/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • send-0.3.0.tgz (Vulnerable Library)

Vulnerability Details

The send package before 0.11.1 for Node.js allows attackers to obtain the root path via unspecified vectors.

Publish Date: 2017-01-23

URL: CVE-2015-8859

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-8859

Release Date: 2017-01-23

Fix Resolution: 0.11.1

WS-2016-0055 Medium Severity Vulnerability detected by WhiteSource

WS-2016-0055 - Medium Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

path: /example-javascript-yarn/node_modules/angular/package.json

Library home page: http://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

Angular is HTML enhanced for web apps.
The sandbox (while not a security feature) is supposed to error on access to constructor properties. In its current state it is trivial to bypass.
The expected behavior is that the sandbox would throw an 'Assigning to constructor is disallowed' error.

Publish Date: 2016-07-21

URL: WS-2016-0055

CVSS 2 Score Details (6.2)

Base Score Metrics not available

Suggested Fix

Type: Change files

Origin: angular/angular.js@d7e31b5

Release Date: 2016-07-27

Fix Resolution: Replace or update the following files: parseSpec.js, parse.js


Step up your Open Source Security Game with WhiteSource here

CVE-2014-6393 (Medium) detected in express-4.1.1.tgz

CVE-2014-6393 - Medium Severity Vulnerability

Vulnerable Library - express-4.1.1.tgz

Sinatra inspired web development framework

Library home page: https://registry.npmjs.org/express/-/express-4.1.1.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Vulnerable Library)

Vulnerability Details

The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.

Publish Date: 2017-08-09

URL: CVE-2014-6393

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2014-6393

Release Date: 2017-08-09

Fix Resolution: 3.11,4.5

WS-2017-0421 High Severity Vulnerability detected by WhiteSource

WS-2017-0421 - High Severity Vulnerability

Vulnerable Libraries - ws-1.0.1.tgz, ws-1.1.0.tgz

ws-1.0.1.tgz

simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455

path: /tmp/git/example-javascript-yarn/node_modules/engine.io-client/node_modules/ws/package.json

Library home page: http://registry.npmjs.org/ws/-/ws-1.0.1.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • socket.io-client-1.4.8.tgz
        • engine.io-client-1.6.11.tgz
          • ws-1.0.1.tgz (Vulnerable Library)
ws-1.1.0.tgz

simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455

path: /tmp/git/example-javascript-yarn/node_modules/ws/package.json

Library home page: https://registry.npmjs.org/ws/-/ws-1.1.0.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • socket.io-1.4.8.tgz
      • engine.io-1.6.11.tgz
        • ws-1.1.0.tgz (Vulnerable Library)

Vulnerability Details

Affected version of ws (0.2.6--3.3.0) are vulnerable to A specially crafted value of the Sec-WebSocket-Extensions header that used Object.prototype property names as extension or parameter names could be used to make a ws server crash.

Publish Date: 2017-11-08

URL: WS-2017-0421

CVSS 2 Score Details (7.5)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/550/versions

Release Date: 2019-01-24

Fix Resolution: 3.3.1


Step up your Open Source Security Game with WhiteSource here

CVE-2014-6394 (High) detected in send-0.3.0.tgz

CVE-2014-6394 - High Severity Vulnerability

Vulnerable Library - send-0.3.0.tgz

Better streaming static file server with Range and conditional-GET support

Library home page: https://registry.npmjs.org/send/-/send-0.3.0.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/express/node_modules/send/package.json

Dependency Hierarchy:

  • express-4.1.1.tgz (Root Library)
    • send-0.3.0.tgz (Vulnerable Library)

Vulnerability Details

visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory.

Publish Date: 2014-10-08

URL: CVE-2014-6394

CVSS 2 Score Details (7.5)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2014-6394

Release Date: 2014-10-08

Fix Resolution: 0.8.4

WS-2017-0121 High Severity Vulnerability detected by WhiteSource

WS-2017-0121 - High Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

path: /example-javascript-yarn/node_modules/angular/package.json

Library home page: http://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

Affected versions of the package are vulnerable to Arbitrary Code Execution via unsafe svg animation tags.

Publish Date: 2017-01-20

URL: WS-2017-0121

CVSS 2 Score Details (7.8)

Base Score Metrics not available

Suggested Fix

Type: Change files

Origin: angular/angular.js@67688d5

Release Date: 2015-03-15

Fix Resolution: Replace or update the following files: sanitize.js, sanitizeSpec.js


Step up your Open Source Security Game with WhiteSource here

WS-2017-0247 Low Severity Vulnerability detected by WhiteSource

WS-2017-0247 - Low Severity Vulnerability

Vulnerable Library - ms-0.7.1.tgz

Tiny ms conversion utility

path: /tmp/git/example-javascript-yarn/node_modules/ms/package.json

Library home page: http://registry.npmjs.org/ms/-/ms-0.7.1.tgz

Dependency Hierarchy:

  • console-io-2.6.3.tgz (Root Library)
    • debug-2.2.0.tgz
      • ms-0.7.1.tgz (Vulnerable Library)

Vulnerability Details

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS).

Publish Date: 2017-05-15

URL: WS-2017-0247

CVSS 2 Score Details (3.4)

Base Score Metrics not available

Suggested Fix

Type: Change files

Origin: vercel/ms@305f2dd

Release Date: 2017-04-12

Fix Resolution: Replace or update the following file: index.js


Step up your Open Source Security Game with WhiteSource here

CVE-2020-7598 (High) detected in minimist-1.2.0.tgz, minimist-0.0.8.tgz

CVE-2020-7598 - High Severity Vulnerability

Vulnerable Libraries - minimist-1.2.0.tgz, minimist-0.0.8.tgz

minimist-1.2.0.tgz

parse argument options

Library home page: https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz

Path to dependency file: /tmp/ws-scm/example-javascript-yarn/package.json

Path to vulnerable library: /tmp/ws-scm/example-javascript-yarn/node_modules/grpc/node_modules/minimist/package.json

Dependency Hierarchy:

  • vision-0.12.0.tgz (Root Library)
    • google-gax-0.13.5.tgz
      • grpc-1.24.2.tgz
        • node-pre-gyp-0.14.0.tgz
          • rc-1.2.8.tgz
            • minimist-1.2.0.tgz (Vulnerable Library)
minimist-0.0.8.tgz

parse argument options

Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz

Path to dependency file: /tmp/ws-scm/example-javascript-yarn/package.json

Path to vulnerable library: /tmp/ws-scm/example-javascript-yarn/node_modules/grpc/node_modules/mkdirp/node_modules/minimist/package.json

Dependency Hierarchy:

  • vision-0.12.0.tgz (Root Library)
    • google-gax-0.13.5.tgz
      • grpc-1.24.2.tgz
        • node-pre-gyp-0.14.0.tgz
          • mkdirp-0.5.1.tgz
            • minimist-0.0.8.tgz (Vulnerable Library)

Found in HEAD commit: b6e94bd3c59734db2730d8cabff809c5986029d7

Vulnerability Details

minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "proto" payload.

Publish Date: 2020-03-11

URL: CVE-2020-7598

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94

Release Date: 2020-03-11

Fix Resolution: minimist - 0.2.1,1.2.2

WS-2018-0001 (Medium) detected in angular-1.3.19.tgz

WS-2018-0001 - Medium Severity Vulnerability

Vulnerable Library - angular-1.3.19.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.3.19.tgz

Path to dependency file: example-javascript-yarn/package.json

Path to vulnerable library: example-javascript-yarn/node_modules/angular/package.json

Dependency Hierarchy:

  • angular-1.3.19.tgz (Vulnerable Library)

Vulnerability Details

JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors.

Publish Date: 2016-09-20

URL: WS-2018-0001

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: angular/angular.js@6476af8

Release Date: 2016-09-20

Fix Resolution: angular - 1.6.0

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.