Skip to content

Commit 035e8c2

Browse files
1 parent f819679 commit 035e8c2

File tree

2 files changed

+8
-6
lines changed

2 files changed

+8
-6
lines changed

advisories/github-reviewed/2019/05/GHSA-qr32-j4j6-3m7r/GHSA-qr32-j4j6-3m7r.json

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qr32-j4j6-3m7r",
4-
"modified": "2020-08-31T18:20:27Z",
4+
"modified": "2026-01-23T22:50:14Z",
55
"published": "2019-05-29T20:23:00Z",
6+
"withdrawn": "2026-01-23T22:50:14Z",
67
"aliases": [
78
"CVE-2017-16087"
89
],
9-
"summary": "Command Injection in fs-git",
10-
"details": "Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution.\n\n\n## Recommendation\n\nUpdate to version 1.0.2 or later. ",
10+
"summary": "Duplicate Advisory: Command Injection in fs-git",
11+
"details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-wp3j-gv53-4pg8. This link is maintained to preserve external references.\n\n## Original Description\nAffected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution.\n\n\n## Recommendation\n\nUpdate to version 1.0.2 or later.",
1112
"severity": [],
1213
"affected": [
1314
{

advisories/github-reviewed/2020/09/GHSA-8whr-v3gm-w8h9/GHSA-8whr-v3gm-w8h9.json

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8whr-v3gm-w8h9",
4-
"modified": "2021-10-04T21:08:30Z",
4+
"modified": "2026-01-23T22:49:42Z",
55
"published": "2020-09-03T15:51:04Z",
6+
"withdrawn": "2026-01-23T22:49:42Z",
67
"aliases": [],
7-
"summary": "Command Injection in node-rules",
8-
"details": "Versions of `node-rules` prior to 5.0.0 are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `eval` call when using the `fromJSON` function. This may allow attackers to execute arbitrary code in the system if the rules are user-controlled.\n\n\n## Recommendation\n\nUpgrade to version 5.0.0 or later.",
8+
"summary": "Duplicate Advisory: Command Injection in node-rules",
9+
"details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-f78f-353m-cf4j. This link is maintained to preserve external references.\n\n## Original Description\nVersions of `node-rules` prior to 5.0.0 are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `eval` call when using the `fromJSON` function. This may allow attackers to execute arbitrary code in the system if the rules are user-controlled.\n\n\n## Recommendation\n\nUpgrade to version 5.0.0 or later.",
910
"severity": [
1011
{
1112
"type": "CVSS_V3",

0 commit comments

Comments
 (0)