Description
exxxxxxxxxxx is an Http eX Frame Google Style JavaScript Guide. exxxxxxxxxxx is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Accessible files are restricted to those with a file extension. Files with no extension such as /etc/passwd throw an error.
Remediation
References
https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx
https://nodesecurity.io/advisories/478
Related Vulnerabilities
CVE-2018-3739 Vulnerability in maven package org.webjars.npm:https-proxy-agent
CVE-2020-10992 Vulnerability in maven package com.linkedin.azkaban:azkaban-common
CVE-2020-36732 Vulnerability in maven package org.webjars.bower:crypto-js
CVE-2020-7763 Vulnerability in npm package phantom-html-to-pdf
CVE-2022-45146 Vulnerability in maven package org.bouncycastle:bc-fips-debug