All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad().
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1127 All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad().
Github GHSA Github GHSA GHSA-jvf4-g24p-2qgw Arbitrary Code Execution in shiba
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-17T02:11:06.591Z

Reserved: 2020-01-21T00:00:00

Link: CVE-2020-7738

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-02T10:15:13.090

Modified: 2024-11-21T05:37:42.577

Link: CVE-2020-7738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses