All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad().
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2021-1127 | All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad(). | 
  Github GHSA | 
                GHSA-jvf4-g24p-2qgw | Arbitrary Code Execution in shiba | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        | Link | Providers | 
|---|---|
| https://snyk.io/vuln/SNYK-JS-SHIBA-596466 | 
                     | 
            
History
                    No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T02:11:06.591Z
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7738
No data.
Status : Modified
Published: 2020-10-02T10:15:13.090
Modified: 2024-11-21T05:37:42.577
Link: CVE-2020-7738
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD
 Github GHSA