"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-10-20 11:01:51 +00:00
parent 2f4c0d3576
commit 6d88fa74cc
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
3 changed files with 27 additions and 19 deletions

View File

@ -48,12 +48,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381",
"name": "https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230"
"refsource": "MISC",
"url": "https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230",
"name": "https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230"
}
]
},
@ -61,7 +63,7 @@
"description_data": [
{
"lang": "eng",
"value": "This affects all versions of package lightning-server.\n It is possible to inject malicious JavaScript code as part of a session controller. \r\n\r\n\r\n\r\n"
"value": "This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller."
}
]
},

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382",
"name": "https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36"
"refsource": "MISC",
"url": "https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36",
"name": "https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b"
"refsource": "MISC",
"url": "https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b",
"name": "https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "This affects the package @tsed/core before 5.65.7.\n This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program. \r\n\r\n\r\n"
"value": "This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program."
}
]
},

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637",
"name": "https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142"
"refsource": "MISC",
"url": "https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142",
"name": "https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/jperelli/osm-static-maps/pull/24"
"refsource": "MISC",
"url": "https://github.com/jperelli/osm-static-maps/pull/24",
"name": "https://github.com/jperelli/osm-static-maps/pull/24"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "This affects all versions of package osm-static-maps.\n User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. \r\n\r\nIt will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.\r\n\r\n"
"value": "This affects all versions of package osm-static-maps. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read."
}
]
},