Search for packages
| purl | pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-5?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4f1w-xpyy-2fcf
Aliases: CVE-2020-28469 GHSA-ww39-953v-wcq6 |
glob-parent vulnerable to Regular Expression Denial of Service in enclosure regex This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator. | There are no reported fixed by versions. |
|
VCID-7tyw-ppyt-zqgr
Aliases: CVE-2020-7788 GHSA-qqgx-2p2h-9c37 |
ini before 1.3.6 vulnerable to Prototype Pollution via ini.parse ### Overview The `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability. If an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context. ### Patches This has been patched in 1.3.6. ### Steps to reproduce payload.ini ``` [__proto__] polluted = "polluted" ``` poc.js: ``` var fs = require('fs') var ini = require('ini') var parsed = ini.parse(fs.readFileSync('./payload.ini', 'utf-8')) console.log(parsed) console.log(parsed.__proto__) console.log(polluted) ``` ``` > node poc.js {} { polluted: 'polluted' } { polluted: 'polluted' } polluted ``` | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:03:46.122886+00:00 | RedHat Importer | Affected by | VCID-7tyw-ppyt-zqgr | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7788.json | 38.0.0 |
| 2026-04-01T14:03:33.224541+00:00 | RedHat Importer | Affected by | VCID-4f1w-xpyy-2fcf | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28469.json | 38.0.0 |