Files
awesome-copilot/skills/security-review/references/vulnerable-packages.md
Mrigank Singh 7e375eac04 feat: add security-review skill for AI-powered codebase vulnerability scanning (#1211)
* feat: add security-review skill for AI-powered codebase vulnerability scanning

* chore: regenerate README tables

* fix: address Copilot review comments on reference files
2026-03-30 11:44:48 +11:00

3.9 KiB

Vulnerable & High-Risk Package Watchlist

Load this during Step 2 (Dependency Audit). Check versions in the project's lock files.


npm / Node.js

Package Vulnerable Versions Issue Safe Version
lodash < 4.17.21 Prototype pollution (CVE-2021-23337) >= 4.17.21
axios < 1.6.0 SSRF, open redirect >= 1.6.0
jsonwebtoken < 9.0.0 Algorithm confusion bypass >= 9.0.0
node-jose < 2.2.0 Key confusion >= 2.2.0
shelljs < 0.8.5 ReDoS >= 0.8.5
tar < 6.1.9 Path traversal >= 6.1.9
minimist < 1.2.6 Prototype pollution >= 1.2.6
qs < 6.7.3 Prototype pollution >= 6.7.3
express < 4.19.2 Open redirect >= 4.19.2
multer < 1.4.4 DoS >= 1.4.4-lts.1
xml2js < 0.5.0 Prototype pollution >= 0.5.0
fast-xml-parser < 4.2.4 ReDoS >= 4.2.4
semver < 7.5.2 ReDoS >= 7.5.2
tough-cookie < 4.1.3 Prototype pollution >= 4.1.3
word-wrap < 1.2.4 ReDoS >= 1.2.4
vm2 ANY Sandbox escape (deprecated) Use isolated-vm instead
serialize-javascript < 3.1.0 XSS >= 3.1.0
node-fetch < 2.6.7 Open redirect >= 2.6.7 or 3.x

Patterns to flag (regardless of version):

  • eval or vm.runInContext in dependencies
  • Any package pulling in node-gyp native addons from unknown publishers
  • Packages with < 1000 weekly downloads but required in production code (supply chain risk)

Python / pip

Package Vulnerable Versions Issue Safe Version
Pillow < 10.0.1 Multiple CVEs, buffer overflow >= 10.0.1
cryptography < 41.0.0 OpenSSL vulnerabilities >= 41.0.0
PyYAML < 6.0 Arbitrary code via yaml.load() >= 6.0
paramiko < 3.4.0 Authentication bypass >= 3.4.0
requests < 2.31.0 Proxy auth info leak >= 2.31.0
urllib3 < 2.0.7 Header injection >= 2.0.7
Django < 4.2.16 Various >= 4.2.16
Flask < 3.0.3 Various >= 3.0.3
Jinja2 < 3.1.4 HTML attribute injection >= 3.1.4
sqlalchemy < 2.0.28 Various >= 2.0.28
aiohttp < 3.9.4 SSRF, path traversal >= 3.9.4
werkzeug < 3.0.3 Various >= 3.0.3

Java / Maven

Package Vulnerable Versions Issue
log4j-core 2.0-2.14.1 Log4Shell RCE (CVE-2021-44228) — CRITICAL
log4j-core 2.15.0 Incomplete fix — still vulnerable
Spring Framework < 5.3.28, < 6.0.13 Various CVEs
Spring Boot < 3.1.4 Various
Jackson-databind < 2.14.0 Deserialization
Apache Commons Text < 1.10.0 Text4Shell RCE (CVE-2022-42889)
Apache Struts < 6.3.0 Various RCE
Netty < 4.1.94 HTTP request smuggling

Ruby / Gems

Gem Vulnerable Versions Issue
rails < 7.1.3 Various
nokogiri < 1.16.2 XXE, various
rexml < 3.2.7 ReDoS
rack < 3.0.9 Various
devise < 4.9.3 Various

Rust / Cargo

Crate Issue
openssl Check advisory db for current version
hyper Check advisory db for current version

Reference: https://rustsec.org/advisories/


Go

Reference: https://pkg.go.dev/vuln/ and https://vuln.go.dev

Common risky patterns:

  • golang.org/x/crypto — check if version is within 6 months of current
  • Any dependency using syscall package directly — review carefully

General Red Flags (Any Ecosystem)

Flag any dependency that:

  1. Has not been updated in > 2 years AND has > 10 open security issues
  2. Has been deprecated by its maintainer with a security advisory
  3. Is a fork of a known package from an unknown publisher (typosquatting)
  4. Has a name that's one character off from a popular package (e.g., lodash vs 1odash)
  5. Was recently transferred to a new owner (check git history / npm transfer notices)