# Vulnerable & High-Risk Package Watchlist Load this during Step 2 (Dependency Audit). Check versions in the project's lock files. --- ## npm / Node.js | Package | Vulnerable Versions | Issue | Safe Version | |---------|-------------------|-------|--------------| | lodash | < 4.17.21 | Prototype pollution (CVE-2021-23337) | >= 4.17.21 | | axios | < 1.6.0 | SSRF, open redirect | >= 1.6.0 | | jsonwebtoken | < 9.0.0 | Algorithm confusion bypass | >= 9.0.0 | | node-jose | < 2.2.0 | Key confusion | >= 2.2.0 | | shelljs | < 0.8.5 | ReDoS | >= 0.8.5 | | tar | < 6.1.9 | Path traversal | >= 6.1.9 | | minimist | < 1.2.6 | Prototype pollution | >= 1.2.6 | | qs | < 6.7.3 | Prototype pollution | >= 6.7.3 | | express | < 4.19.2 | Open redirect | >= 4.19.2 | | multer | < 1.4.4 | DoS | >= 1.4.4-lts.1 | | xml2js | < 0.5.0 | Prototype pollution | >= 0.5.0 | | fast-xml-parser | < 4.2.4 | ReDoS | >= 4.2.4 | | semver | < 7.5.2 | ReDoS | >= 7.5.2 | | tough-cookie | < 4.1.3 | Prototype pollution | >= 4.1.3 | | word-wrap | < 1.2.4 | ReDoS | >= 1.2.4 | | vm2 | ANY | Sandbox escape (deprecated) | Use isolated-vm instead | | serialize-javascript | < 3.1.0 | XSS | >= 3.1.0 | | node-fetch | < 2.6.7 | Open redirect | >= 2.6.7 or 3.x | ### Patterns to flag (regardless of version): - `eval` or `vm.runInContext` in dependencies - Any package pulling in `node-gyp` native addons from unknown publishers - Packages with < 1000 weekly downloads but required in production code (supply chain risk) --- ## Python / pip | Package | Vulnerable Versions | Issue | Safe Version | |---------|-------------------|-------|--------------| | Pillow | < 10.0.1 | Multiple CVEs, buffer overflow | >= 10.0.1 | | cryptography | < 41.0.0 | OpenSSL vulnerabilities | >= 41.0.0 | | PyYAML | < 6.0 | Arbitrary code via yaml.load() | >= 6.0 | | paramiko | < 3.4.0 | Authentication bypass | >= 3.4.0 | | requests | < 2.31.0 | Proxy auth info leak | >= 2.31.0 | | urllib3 | < 2.0.7 | Header injection | >= 2.0.7 | | Django | < 4.2.16 | Various | >= 4.2.16 | | Flask | < 3.0.3 | Various | >= 3.0.3 | | Jinja2 | < 3.1.4 | HTML attribute injection | >= 3.1.4 | | sqlalchemy | < 2.0.28 | Various | >= 2.0.28 | | aiohttp | < 3.9.4 | SSRF, path traversal | >= 3.9.4 | | werkzeug | < 3.0.3 | Various | >= 3.0.3 | --- ## Java / Maven | Package | Vulnerable Versions | Issue | |---------|-------------------|-------| | log4j-core | 2.0-2.14.1 | Log4Shell RCE (CVE-2021-44228) — CRITICAL | | log4j-core | 2.15.0 | Incomplete fix — still vulnerable | | Spring Framework | < 5.3.28, < 6.0.13 | Various CVEs | | Spring Boot | < 3.1.4 | Various | | Jackson-databind | < 2.14.0 | Deserialization | | Apache Commons Text | < 1.10.0 | Text4Shell RCE (CVE-2022-42889) | | Apache Struts | < 6.3.0 | Various RCE | | Netty | < 4.1.94 | HTTP request smuggling | --- ## Ruby / Gems | Gem | Vulnerable Versions | Issue | |-----|-------------------|-------| | rails | < 7.1.3 | Various | | nokogiri | < 1.16.2 | XXE, various | | rexml | < 3.2.7 | ReDoS | | rack | < 3.0.9 | Various | | devise | < 4.9.3 | Various | --- ## Rust / Cargo | Crate | Issue | |-------|-------| | openssl | Check advisory db for current version | | hyper | Check advisory db for current version | Reference: https://rustsec.org/advisories/ --- ## Go Reference: https://pkg.go.dev/vuln/ and https://vuln.go.dev Common risky patterns: - `golang.org/x/crypto` — check if version is within 6 months of current - Any dependency using `syscall` package directly — review carefully --- ## General Red Flags (Any Ecosystem) Flag any dependency that: 1. Has not been updated in > 2 years AND has > 10 open security issues 2. Has been deprecated by its maintainer with a security advisory 3. Is a fork of a known package from an unknown publisher (typosquatting) 4. Has a name that's one character off from a popular package (e.g., `lodash` vs `1odash`) 5. Was recently transferred to a new owner (check git history / npm transfer notices)