"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-05-01 16:01:34 +00:00
parent c8932539ca
commit 57c997cb60
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
17 changed files with 167 additions and 117 deletions

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756",
"name": "https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/libxmljs/libxmljs/pull/594"
"refsource": "MISC",
"url": "https://github.com/libxmljs/libxmljs/pull/594",
"name": "https://github.com/libxmljs/libxmljs/pull/594"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d"
"refsource": "MISC",
"url": "https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d",
"name": "https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "This affects all versions of package libxmljs.\n When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function\r\nobject V8 will crash. \r\n\r\n"
"value": "This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will crash."
}
]
},

View File

@ -66,12 +66,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035",
"name": "https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036",
"name": "https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036"
}
]
},
@ -79,7 +81,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package s-cart/s-cart before 6.9; the package s-cart/core before 6.9 are vulnerable to Cross-site Scripting (XSS) which can lead to cookie stealing of any victim that visits the affected URL so the attacker can gain unauthorized access to that user's account through the stolen cookie.\r\n\r\n"
"value": "The package s-cart/s-cart before 6.9; the package s-cart/core before 6.9 are vulnerable to Cross-site Scripting (XSS) which can lead to cookie stealing of any victim that visits the affected URL so the attacker can gain unauthorized access to that user's account through the stolen cookie."
}
]
},

View File

@ -48,12 +48,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-DOTNET-MASUITTOOLSCORE-2316875"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-DOTNET-MASUITTOOLSCORE-2316875",
"name": "https://snyk.io/vuln/SNYK-DOTNET-MASUITTOOLSCORE-2316875"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/ldqk/Masuit.Tools/blob/327f42b9f20f25bb66188672199c8265fc968d91/Masuit.Tools.Abstractions/Net/SocketClient.cs%23L197"
"refsource": "MISC",
"url": "https://github.com/ldqk/Masuit.Tools/blob/327f42b9f20f25bb66188672199c8265fc968d91/Masuit.Tools.Abstractions/Net/SocketClient.cs%23L197",
"name": "https://github.com/ldqk/Masuit.Tools/blob/327f42b9f20f25bb66188672199c8265fc968d91/Masuit.Tools.Abstractions/Net/SocketClient.cs%23L197"
}
]
},
@ -61,7 +63,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package masuit.tools.core are vulnerable to Arbitrary Code Execution via the ReceiveVarData<T> function in the SocketClient.cs component. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter.\n"
"value": "All versions of package masuit.tools.core are vulnerable to Arbitrary Code Execution via the ReceiveVarData<T> function in the SocketClient.cs component. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter."
}
]
},

View File

@ -56,20 +56,24 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-DEXIE-2607042"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-DEXIE-2607042",
"name": "https://snyk.io/vuln/SNYK-JS-DEXIE-2607042"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805308"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805308",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805308"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/dexie/Dexie.js/blob/fe682ef24568278c3b31d9d6c93de095d4b77ae8/src/functions/utils.ts%23L134-L164"
"refsource": "MISC",
"url": "https://github.com/dexie/Dexie.js/blob/fe682ef24568278c3b31d9d6c93de095d4b77ae8/src/functions/utils.ts%23L134-L164",
"name": "https://github.com/dexie/Dexie.js/blob/fe682ef24568278c3b31d9d6c93de095d4b77ae8/src/functions/utils.ts%23L134-L164"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/dexie/Dexie.js/commit/1d655a69b9f28c3af6fae10cf5c61df387dc689b"
"refsource": "MISC",
"url": "https://github.com/dexie/Dexie.js/commit/1d655a69b9f28c3af6fae10cf5c61df387dc689b",
"name": "https://github.com/dexie/Dexie.js/commit/1d655a69b9f28c3af6fae10cf5c61df387dc689b"
}
]
},
@ -77,7 +81,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package dexie before 3.2.2, from 4.0.0-alpha.1 and before 4.0.0-alpha.3 are vulnerable to Prototype Pollution in the Dexie.setByKeyPath(obj, keyPath, value) function which does not properly check the keys being set (like __proto__ or constructor). This can allow an attacker to add/modify properties of the Object.prototype leading to prototype pollution vulnerability.\r\n\r\n**Note:** This vulnerability can occur in multiple ways, for example when modifying a collection with untrusted user input.\r\n\r\n\r\n"
"value": "The package dexie before 3.2.2, from 4.0.0-alpha.1 and before 4.0.0-alpha.3 are vulnerable to Prototype Pollution in the Dexie.setByKeyPath(obj, keyPath, value) function which does not properly check the keys being set (like __proto__ or constructor). This can allow an attacker to add/modify properties of the Object.prototype leading to prototype pollution vulnerability. **Note:** This vulnerability can occur in multiple ways, for example when modifying a collection with untrusted user input."
}
]
},

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645",
"name": "https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a"
"refsource": "MISC",
"url": "https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a",
"name": "https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine.\r\n\r\n"
"value": "The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine."
}
]
},

View File

@ -48,20 +48,24 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGNANOHTTPD-2422798"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGNANOHTTPD-2422798",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGNANOHTTPD-2422798"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/NanoHttpd/nanohttpd/blob/efb2ebf85a2b06f7c508aba9eaad5377e3a01e81/core/src/main/java/org/nanohttpd/protocols/http/tempfiles/DefaultTempFile.java%23L58"
"refsource": "MISC",
"url": "https://github.com/NanoHttpd/nanohttpd/blob/efb2ebf85a2b06f7c508aba9eaad5377e3a01e81/core/src/main/java/org/nanohttpd/protocols/http/tempfiles/DefaultTempFile.java%23L58",
"name": "https://github.com/NanoHttpd/nanohttpd/blob/efb2ebf85a2b06f7c508aba9eaad5377e3a01e81/core/src/main/java/org/nanohttpd/protocols/http/tempfiles/DefaultTempFile.java%23L58"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/NanoHttpd/nanohttpd/blob/efb2ebf85a2b06f7c508aba9eaad5377e3a01e81/core/src/main/java/org/nanohttpd/protocols/http/tempfiles/DefaultTempFileManager.java%23L60"
"refsource": "MISC",
"url": "https://github.com/NanoHttpd/nanohttpd/blob/efb2ebf85a2b06f7c508aba9eaad5377e3a01e81/core/src/main/java/org/nanohttpd/protocols/http/tempfiles/DefaultTempFileManager.java%23L60",
"name": "https://github.com/NanoHttpd/nanohttpd/blob/efb2ebf85a2b06f7c508aba9eaad5377e3a01e81/core/src/main/java/org/nanohttpd/protocols/http/tempfiles/DefaultTempFileManager.java%23L60"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-2r85-x9cf-8fcg"
"refsource": "MISC",
"url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-2r85-x9cf-8fcg",
"name": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-2r85-x9cf-8fcg"
}
]
},
@ -69,7 +73,7 @@
"description_data": [
{
"lang": "eng",
"value": "This affects all versions of package org.nanohttpd:nanohttpd.\n Whenever an HTTP Session is parsing the body of an HTTP request, the body of the request is written to a RandomAccessFile when the it is larger than 1024 bytes. This file is created with insecure permissions that allow its contents to be viewed by all users on the host machine.\r\n\r\n**Workaround:** Manually specifying the -Djava.io.tmpdir= argument when launching Java to set the temporary directory to a directory exclusively controlled by the current user can fix this issue.\n"
"value": "This affects all versions of package org.nanohttpd:nanohttpd. Whenever an HTTP Session is parsing the body of an HTTP request, the body of the request is written to a RandomAccessFile when the it is larger than 1024 bytes. This file is created with insecure permissions that allow its contents to be viewed by all users on the host machine. **Workaround:** Manually specifying the -Djava.io.tmpdir= argument when launching Java to set the temporary directory to a directory exclusively controlled by the current user can fix this issue."
}
]
},

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-CONVICT-2340604"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-CONVICT-2340604",
"name": "https://snyk.io/vuln/SNYK-JS-CONVICT-2340604"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569"
"refsource": "MISC",
"url": "https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569",
"name": "https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880"
"refsource": "MISC",
"url": "https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880",
"name": "https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey.\r\n\r\n**Note:** This vulnerability derives from an incomplete fix of another [vulnerability](https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508)\r\n\r\n"
"value": "The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey. **Note:** This vulnerability derives from an incomplete fix of another [vulnerability](https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508)"
}
]
},

View File

@ -48,12 +48,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-JAILED-2391490"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-JAILED-2391490",
"name": "https://snyk.io/vuln/SNYK-JS-JAILED-2391490"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254"
}
]
},
@ -61,7 +63,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package jailed are vulnerable to Sandbox Bypass via an exported alert() method which can access the main application. Exported methods are stored in the application.remote object.\r\n\r\n"
"value": "All versions of package jailed are vulnerable to Sandbox Bypass via an exported alert() method which can access the main application. Exported methods are stored in the application.remote object."
}
]
},

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307",
"name": "https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307"
},
{
"refsource": "CONFIRM",
"url": "https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b"
"refsource": "MISC",
"url": "https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b",
"name": "https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/feross/git-pull-or-clone/commit/f9ce092be13cc32e685dfa26e7705e9c6e3108a3"
"refsource": "MISC",
"url": "https://github.com/feross/git-pull-or-clone/commit/f9ce092be13cc32e685dfa26e7705e9c6e3108a3",
"name": "https://github.com/feross/git-pull-or-clone/commit/f9ce092be13cc32e685dfa26e7705e9c6e3108a3"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection.\r\n\r\n"
"value": "The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection."
}
]
},

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800",
"name": "https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/Dogfalo/materialize/blob/v1-dev/js/autocomplete.js%23L285%20"
"refsource": "MISC",
"url": "https://github.com/Dogfalo/materialize/blob/v1-dev/js/autocomplete.js%23L285%20",
"name": "https://github.com/Dogfalo/materialize/blob/v1-dev/js/autocomplete.js%23L285%20"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package materialize-css are vulnerable to Cross-site Scripting (XSS) due to improper escape of user input (such as &lt;not-a-tag /&gt;) that is being parsed as HTML/JavaScript, and inserted into the Document Object Model (DOM). This vulnerability can be exploited when the user-input is provided to the autocomplete component.\r\n\r\n"
"value": "All versions of package materialize-css are vulnerable to Cross-site Scripting (XSS) due to improper escape of user input (such as &lt;not-a-tag /&gt;) that is being parsed as HTML/JavaScript, and inserted into the Document Object Model (DOM). This vulnerability can be exploited when the user-input is provided to the autocomplete component."
}
]
},

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-DSET-2330881"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-DSET-2330881",
"name": "https://snyk.io/vuln/SNYK-JS-DSET-2330881"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/lukeed/dset/blob/master/src/merge.js%23L9"
"refsource": "MISC",
"url": "https://github.com/lukeed/dset/blob/master/src/merge.js%23L9",
"name": "https://github.com/lukeed/dset/blob/master/src/merge.js%23L9"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package dset are vulnerable to Prototype Pollution via 'dset/merge' mode, as the dset function checks for prototype pollution by validating if the top-level path contains __proto__, constructor or protorype. \r\nBy crafting a malicious object, it is possible to bypass this check and achieve prototype pollution.\r\n\r\n"
"value": "All versions of package dset are vulnerable to Prototype Pollution via 'dset/merge' mode, as the dset function checks for prototype pollution by validating if the top-level path contains __proto__, constructor or protorype. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution."
}
]
},

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327",
"name": "https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/google/gson/pull/1991"
"refsource": "MISC",
"url": "https://github.com/google/gson/pull/1991",
"name": "https://github.com/google/gson/pull/1991"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/google/gson/pull/1991/commits"
"refsource": "MISC",
"url": "https://github.com/google/gson/pull/1991/commits",
"name": "https://github.com/google/gson/pull/1991/commits"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.\n"
"value": "The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks."
}
]
},

View File

@ -48,12 +48,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-COMBSTEKUREPORT-2322018"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-COMBSTEKUREPORT-2322018",
"name": "https://snyk.io/vuln/SNYK-JAVA-COMBSTEKUREPORT-2322018"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/JinYiTong/CVE-Req/blob/main/ureport2/ureport2-console.md"
"refsource": "MISC",
"url": "https://github.com/JinYiTong/CVE-Req/blob/main/ureport2/ureport2-console.md",
"name": "https://github.com/JinYiTong/CVE-Req/blob/main/ureport2/ureport2-console.md"
}
]
},
@ -61,7 +63,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package com.bstek.ureport:ureport2-console are vulnerable to Remote Code Execution by connecting to a malicious database server, causing arbitrary file read and deserialization of local gadgets.\n"
"value": "All versions of package com.bstek.ureport:ureport2-console are vulnerable to Remote Code Execution by connecting to a malicious database server, causing arbitrary file read and deserialization of local gadgets."
}
]
},

View File

@ -48,20 +48,24 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874",
"name": "https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/alibaba/one-java-agent/blob/1f399a2299a8a409d15ea6111a7098629b8f1050/one-java-agent-plugin/src/main/java/com/alibaba/oneagent/utils/IOUtils.java"
"refsource": "MISC",
"url": "https://github.com/alibaba/one-java-agent/blob/1f399a2299a8a409d15ea6111a7098629b8f1050/one-java-agent-plugin/src/main/java/com/alibaba/oneagent/utils/IOUtils.java",
"name": "https://github.com/alibaba/one-java-agent/blob/1f399a2299a8a409d15ea6111a7098629b8f1050/one-java-agent-plugin/src/main/java/com/alibaba/oneagent/utils/IOUtils.java"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/alibaba/one-java-agent/pull/29"
"refsource": "MISC",
"url": "https://github.com/alibaba/one-java-agent/pull/29",
"name": "https://github.com/alibaba/one-java-agent/pull/29"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/alibaba/one-java-agent/pull/29/commits/359603b63fc6c59d8b57e061c171954bab3433bf"
"refsource": "MISC",
"url": "https://github.com/alibaba/one-java-agent/pull/29/commits/359603b63fc6c59d8b57e061c171954bab3433bf",
"name": "https://github.com/alibaba/one-java-agent/pull/29/commits/359603b63fc6c59d8b57e061c171954bab3433bf"
}
]
},
@ -69,7 +73,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package com.alibaba.oneagent:one-java-agent-plugin are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe).\r\nThe attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim\u2019s machine.\r\n\r\n"
"value": "All versions of package com.alibaba.oneagent:one-java-agent-plugin are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim\u2019s machine."
}
]
},

View File

@ -48,24 +48,29 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735",
"name": "https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738"
},
{
"refsource": "CONFIRM",
"url": "https://stackblitz.com/edit/angularjs-material-blank-zvtdvb"
"refsource": "MISC",
"url": "https://stackblitz.com/edit/angularjs-material-blank-zvtdvb",
"name": "https://stackblitz.com/edit/angularjs-material-blank-zvtdvb"
}
]
},
@ -73,7 +78,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package angular after 1.7.0 are vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value.\r\n\r\n**Note:**\r\n\r\n1) This package has been deprecated and is no longer maintained.\r\n\r\n2) The vulnerable versions are 1.7.0 and higher.\r\n\r\n"
"value": "The package angular after 1.7.0 are vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value. **Note:** 1) This package has been deprecated and is no longer maintained. 2) The vulnerable versions are 1.7.0 and higher."
}
]
},

View File

@ -48,12 +48,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228",
"name": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/hoppscotch/proxyscotch/commit/de67380f62f907f201d75854b76024ba4885fab7"
"refsource": "MISC",
"url": "https://github.com/hoppscotch/proxyscotch/commit/de67380f62f907f201d75854b76024ba4885fab7",
"name": "https://github.com/hoppscotch/proxyscotch/commit/de67380f62f907f201d75854b76024ba4885fab7"
}
]
},
@ -61,7 +63,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It leads to a leakage of sensitive information from the server.\n"
"value": "The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It leads to a leakage of sensitive information from the server."
}
]
},

View File

@ -48,12 +48,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-UNMANAGED-PISTACHEIOPISTACHE-2806332"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-UNMANAGED-PISTACHEIOPISTACHE-2806332",
"name": "https://snyk.io/vuln/SNYK-UNMANAGED-PISTACHEIOPISTACHE-2806332"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/pistacheio/pistache/pull/1065"
"refsource": "MISC",
"url": "https://github.com/pistacheio/pistache/pull/1065",
"name": "https://github.com/pistacheio/pistache/pull/1065"
}
]
},
@ -61,7 +63,7 @@
"description_data": [
{
"lang": "eng",
"value": "This affects the package pistacheio/pistache before 0.0.3.20220425.\n It is possible to traverse directories to fetch arbitrary files from the server.\r\n\r\n"
"value": "This affects the package pistacheio/pistache before 0.0.3.20220425. It is possible to traverse directories to fetch arbitrary files from the server."
}
]
},