mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-05 10:18:17 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
2f4c0d3576
commit
6d88fa74cc
@ -48,12 +48,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230",
|
||||
"name": "https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,7 +63,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "This affects all versions of package lightning-server.\n It is possible to inject malicious JavaScript code as part of a session controller. \r\n\r\n\r\n\r\n"
|
||||
"value": "This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,16 +48,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36",
|
||||
"name": "https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b",
|
||||
"name": "https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -65,7 +68,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "This affects the package @tsed/core before 5.65.7.\n This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program. \r\n\r\n\r\n"
|
||||
"value": "This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,16 +48,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142",
|
||||
"name": "https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/jperelli/osm-static-maps/pull/24"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/jperelli/osm-static-maps/pull/24",
|
||||
"name": "https://github.com/jperelli/osm-static-maps/pull/24"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -65,7 +68,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "This affects all versions of package osm-static-maps.\n User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. \r\n\r\nIt will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.\r\n\r\n"
|
||||
"value": "This affects all versions of package osm-static-maps. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user