Vulnerabilities (CVE)

Total 316927 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-16024 2 Nodejs, Sync-exec Project 2 Node.js, Sync-exec 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
The sync-exec module is used to simulate child_process.execSync in node versions <0.11.9. Sync-exec uses tmp directories as a buffer before returning values. Other users on the server have read access to the tmp directory, possibly allowing an attacker on the server to obtain confidential information from the buffer/tmp file, while it exists.
CVE-2017-16023 1 Decamelize Project 1 Decamelize 2024-11-21 5.0 MEDIUM 7.5 HIGH
Decamelize is used to convert a dash/dot/underscore/space separated string to camelCase. Decamelize 1.1.0 through 1.1.1 uses regular expressions to evaluate a string and takes unescaped separator values, which can be used to create a denial of service attack.
CVE-2017-16022 1 Morris.js Project 1 Morris.js 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Morris.js creates an svg graph, with labels that appear when hovering over a point. The hovering label names are not escaped in versions 0.5.0 and earlier. If control over the labels is obtained, script can be injected. The script will run on the client side whenever that specific graph is loaded.
CVE-2017-16021 1 Garycourt 1 Uri-js 2024-11-21 6.8 MEDIUM 6.5 MEDIUM
uri-js is a module that tries to fully implement RFC 3986. One of these features is validating whether or not a supplied URL is valid or not. To do this, uri-js uses a regular expression, This regular expression is vulnerable to redos. This causes the program to hang and the CPU to idle at 100% usage while uri-js is trying to validate if the supplied URL is valid or not. To check if you're vulnerable, look for a call to `require("uri-js").parse()` where a user is able to send their own input. This affects uri-js 2.1.1 and earlier.
CVE-2017-16020 1 Summit Project 1 Summit 2024-11-21 7.5 HIGH 9.8 CRITICAL
Summit is a node web framework. When using the PouchDB driver in the module, Summit 0.1.0 and later allows an attacker to execute arbitrary commands via the collection name.
CVE-2017-16019 1 Gitbook 1 Gitbook 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
GitBook is a command line tool (and Node.js library) for building beautiful books using GitHub/Git and Markdown (or AsciiDoc). Stored Cross-Site-Scripting (XSS) is possible in GitBook before 3.2.2 by including code outside of backticks in any ebook. This code will be executed on the online reader.
CVE-2017-16018 1 Restify 1 Restify 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Restify is a framework for building REST APIs. Restify >=2.0.0 <=4.0.4 using URL encoded script tags in a non-existent URL, an attacker can get script to run in some browsers.
CVE-2017-16017 1 Punkave 1 Sanitize-html 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
sanitize-html is a library for scrubbing html input for malicious values Versions 1.2.2 and below have a cross site scripting vulnerability.
CVE-2017-16016 1 Punkave 1 Sanitize-html 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Sanitize-html is a library for scrubbing html input of malicious values. Versions 1.11.1 and below are vulnerable to cross site scripting (XSS) in certain scenarios: If allowed at least one nonTextTags, the result is a potential XSS vulnerability.
CVE-2017-16015 1 Forms Project 1 Forms 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Forms is a library for easily creating HTML forms. Versions before 1.3.0 did not have proper html escaping. This means that if the application did not sanitize html on behalf of forms, use of forms may be vulnerable to cross site scripting
CVE-2017-16014 1 Http-proxy Project 1 Http-proxy 2024-11-21 5.0 MEDIUM 7.5 HIGH
Http-proxy is a proxying library. Because of the way errors are handled in versions before 0.7.0, an attacker that forces an error can crash the server, causing a denial of service.
CVE-2017-16013 1 Hapijs 1 Hapi 2024-11-21 5.0 MEDIUM 7.5 HIGH
hapi is a web and services application framework. When hapi >= 15.0.0 <= 16.1.0 encounters a malformed `accept-encoding` header an uncaught exception is thrown. This may cause hapi to crash or to hang the client connection until the timeout period is reached.
CVE-2017-16010 1 I18next 1 I18next 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
i18next is a language translation framework. When using the .init method, passing interpolation options without passing an escapeValue will default to undefined rather than the assumed true. This can result in a cross-site scripting vulnerability because user input is assumed to be escaped, but is not. This vulnerability affects i18next 2.0.0 and later.
CVE-2017-16009 2 Ag-grid, Angularjs 2 Ag-grid, Angularjs 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
ag-grid is an advanced data grid that is library agnostic. ag-grid is vulnerable to Cross-site Scripting (XSS) via Angular Expressions, if AngularJS is used in combination with ag-grid.
CVE-2017-16008 1 I18next 1 I18next 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
i18next is a language translation framework. Because of how the interpolation is implemented, making replacements from the dictionary one at a time, untrusted user input can use the name of one of the dictionary keys to inject script into the browser. This affects i18next <=1.10.2.
CVE-2017-16007 1 Cisco 1 Node-jose 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for current web browsers and node.js-based servers. node-jose earlier than version 0.9.3 is vulnerable to an invalid curve attack. This allows an attacker to recover the private secret key when JWE with Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES) is used.
CVE-2017-16006 1 Remarkable Project 1 Remarkable 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Remarkable is a markdown parser. In versions 1.6.2 and lower, remarkable allows the use of `data:` URIs in links and can therefore execute javascript.
CVE-2017-16005 1 Joyent 1 Http-signature 2024-11-21 5.0 MEDIUM 7.5 HIGH
Http-signature is a "Reference implementation of Joyent's HTTP Signature Scheme". In versions <=0.9.11, http-signature signs only the header values, but not the header names. This makes http-signature vulnerable to header forgery. Thus, if an attacker can intercept a request, he can swap header names and change the meaning of the request without changing the signature.
CVE-2017-16003 1 Windows-build-tools Project 1 Windows-build-tools 2024-11-21 9.3 HIGH 8.1 HIGH
windows-build-tools is a module for installing C++ Build Tools for Windows using npm. windows-build-tools versions below 1.0.0 download resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
CVE-2017-15941 1 Paloaltonetworks 1 Pan-os 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.7, when the GlobalProtect gateway or portal is configured, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.