|
119 | 119 | "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" |
120 | 120 | ] |
121 | 121 | }, |
122 | | - { |
123 | | - "atOrAbove": "1.8.0", |
124 | | - "below": "1.12.0", |
125 | | - "cwe": [ |
126 | | - "CWE-79" |
127 | | - ], |
128 | | - "severity": "medium", |
129 | | - "identifiers": { |
130 | | - "summary": "3rd party CORS request may execute", |
131 | | - "issue": "2432", |
132 | | - "CVE": [ |
133 | | - "CVE-2015-9251" |
134 | | - ], |
135 | | - "githubID": "GHSA-rmxg-73gg-4p98" |
136 | | - }, |
137 | | - "info": [ |
138 | | - "http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/", |
139 | | - "http://research.insecurelabs.org/jquery/test/", |
140 | | - "https://bugs.jquery.com/ticket/11974", |
141 | | - "https://github.com/advisories/GHSA-rmxg-73gg-4p98", |
142 | | - "https://github.com/jquery/jquery/issues/2432", |
143 | | - "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" |
144 | | - ] |
145 | | - }, |
146 | | - { |
147 | | - "atOrAbove": "1.12.2", |
148 | | - "below": "2.2.0", |
149 | | - "cwe": [ |
150 | | - "CWE-79" |
151 | | - ], |
152 | | - "severity": "medium", |
153 | | - "identifiers": { |
154 | | - "summary": "3rd party CORS request may execute", |
155 | | - "issue": "2432", |
156 | | - "CVE": [ |
157 | | - "CVE-2015-9251" |
158 | | - ], |
159 | | - "githubID": "GHSA-rmxg-73gg-4p98" |
160 | | - }, |
161 | | - "info": [ |
162 | | - "http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/", |
163 | | - "http://research.insecurelabs.org/jquery/test/", |
164 | | - "https://bugs.jquery.com/ticket/11974", |
165 | | - "https://github.com/advisories/GHSA-rmxg-73gg-4p98", |
166 | | - "https://github.com/jquery/jquery/issues/2432", |
167 | | - "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" |
168 | | - ] |
169 | | - }, |
170 | 122 | { |
171 | 123 | "below": "2.999.999", |
172 | 124 | "cwe": [ |
|
175 | 127 | "severity": "low", |
176 | 128 | "identifiers": { |
177 | 129 | "summary": "jQuery 1.x and 2.x are End-of-Life and no longer receiving security updates", |
178 | | - "retid": "73" |
| 130 | + "retid": "73", |
| 131 | + "issue": "162" |
179 | 132 | }, |
180 | 133 | "info": [ |
181 | 134 | "https://github.com/jquery/jquery.com/issues/162" |
|
205 | 158 | "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" |
206 | 159 | ] |
207 | 160 | }, |
208 | | - { |
209 | | - "atOrAbove": "2.2.2", |
210 | | - "below": "3.0.0", |
211 | | - "cwe": [ |
212 | | - "CWE-79" |
213 | | - ], |
214 | | - "severity": "medium", |
215 | | - "identifiers": { |
216 | | - "summary": "3rd party CORS request may execute", |
217 | | - "issue": "2432", |
218 | | - "CVE": [ |
219 | | - "CVE-2015-9251" |
220 | | - ], |
221 | | - "githubID": "GHSA-rmxg-73gg-4p98" |
222 | | - }, |
223 | | - "info": [ |
224 | | - "http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/", |
225 | | - "http://research.insecurelabs.org/jquery/test/", |
226 | | - "https://bugs.jquery.com/ticket/11974", |
227 | | - "https://github.com/advisories/GHSA-rmxg-73gg-4p98", |
228 | | - "https://github.com/jquery/jquery/issues/2432", |
229 | | - "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" |
230 | | - ] |
231 | | - }, |
232 | 161 | { |
233 | 162 | "atOrAbove": "3.0.0-rc.1", |
234 | 163 | "below": "3.0.0", |
|
898 | 827 | "jquery-deparam": { |
899 | 828 | "vulnerabilities": [ |
900 | 829 | { |
901 | | - "below": "999", |
| 830 | + "below": "0.5.4", |
902 | 831 | "severity": "high", |
903 | 832 | "cwe": [ |
904 | 833 | "CWE-1321" |
|
3227 | 3156 | ] |
3228 | 3157 | }, |
3229 | 3158 | { |
3230 | | - "below": "1.999", |
3231 | | - "severity": "low", |
3232 | | - "cwe": [ |
3233 | | - "CWE-1104" |
3234 | | - ], |
3235 | | - "identifiers": { |
3236 | | - "summary": "End-of-Life: Long term support for AngularJS has been discontinued as of December 31, 2021", |
3237 | | - "retid": "54" |
3238 | | - }, |
3239 | | - "info": [ |
3240 | | - "https://blog.angular.io/discontinued-long-term-support-for-angularjs-cc066b82e65a?gi=9d3103b5445c" |
3241 | | - ] |
3242 | | - }, |
3243 | | - { |
3244 | | - "below": "999", |
| 3159 | + "below": "1.8.4", |
3245 | 3160 | "severity": "medium", |
3246 | 3161 | "cwe": [ |
3247 | 3162 | "CWE-1333" |
|
3258 | 3173 | ] |
3259 | 3174 | }, |
3260 | 3175 | { |
3261 | | - "below": "999", |
| 3176 | + "below": "1.8.4", |
3262 | 3177 | "severity": "medium", |
3263 | 3178 | "cwe": [ |
3264 | 3179 | "CWE-1333" |
|
3275 | 3190 | ] |
3276 | 3191 | }, |
3277 | 3192 | { |
3278 | | - "below": "999", |
| 3193 | + "below": "1.8.4", |
3279 | 3194 | "severity": "medium", |
3280 | 3195 | "cwe": [ |
3281 | 3196 | "CWE-79" |
|
3292 | 3207 | ] |
3293 | 3208 | }, |
3294 | 3209 | { |
3295 | | - "below": "999", |
| 3210 | + "below": "1.8.4", |
3296 | 3211 | "severity": "medium", |
3297 | 3212 | "cwe": [ |
3298 | 3213 | "CWE-1333" |
|
3310 | 3225 | }, |
3311 | 3226 | { |
3312 | 3227 | "atOrAbove": "1.3.0", |
3313 | | - "below": "999", |
| 3228 | + "below": "1.8.4", |
3314 | 3229 | "cwe": [ |
3315 | 3230 | "CWE-1333" |
3316 | 3231 | ], |
|
3332 | 3247 | "https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos" |
3333 | 3248 | ] |
3334 | 3249 | }, |
| 3250 | + { |
| 3251 | + "below": "1.999", |
| 3252 | + "severity": "low", |
| 3253 | + "cwe": [ |
| 3254 | + "CWE-1104" |
| 3255 | + ], |
| 3256 | + "identifiers": { |
| 3257 | + "summary": "End-of-Life: Long term support for AngularJS has been discontinued as of December 31, 2021", |
| 3258 | + "retid": "54" |
| 3259 | + }, |
| 3260 | + "info": [ |
| 3261 | + "https://docs.angularjs.org/misc/version-support-status" |
| 3262 | + ] |
| 3263 | + }, |
3335 | 3264 | { |
3336 | 3265 | "atOrAbove": "1.7.0", |
3337 | 3266 | "below": "999", |
|
5055 | 4984 | "https://github.com/twbs/bootstrap/issues/28236" |
5056 | 4985 | ] |
5057 | 4986 | }, |
| 4987 | + { |
| 4988 | + "atOrAbove": "2.0.0", |
| 4989 | + "below": "3.4.2", |
| 4990 | + "cwe": [ |
| 4991 | + "CWE-79" |
| 4992 | + ], |
| 4993 | + "severity": "medium", |
| 4994 | + "identifiers": { |
| 4995 | + "summary": "Bootstrap Cross-Site Scripting (XSS) vulnerability", |
| 4996 | + "CVE": [ |
| 4997 | + "CVE-2024-6484" |
| 4998 | + ], |
| 4999 | + "githubID": "GHSA-9mvj-f7w8-pvh2" |
| 5000 | + }, |
| 5001 | + "info": [ |
| 5002 | + "https://github.com/advisories/GHSA-9mvj-f7w8-pvh2", |
| 5003 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-6484", |
| 5004 | + "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2024-6484.yml", |
| 5005 | + "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2024-6484.yml", |
| 5006 | + "https://github.com/twbs/bootstrap", |
| 5007 | + "https://www.herodevs.com/vulnerability-directory/cve-2024-6484" |
| 5008 | + ] |
| 5009 | + }, |
5058 | 5010 | { |
5059 | 5011 | "below": "3.999.999", |
5060 | 5012 | "severity": "low", |
|
5164 | 5116 | "https://github.com/advisories/GHSA-9v3m-8fp8-mj99", |
5165 | 5117 | "https://github.com/twbs/bootstrap/issues/28236" |
5166 | 5118 | ] |
| 5119 | + }, |
| 5120 | + { |
| 5121 | + "atOrAbove": "4.0.0", |
| 5122 | + "below": "4.6.3", |
| 5123 | + "cwe": [ |
| 5124 | + "CWE-79" |
| 5125 | + ], |
| 5126 | + "severity": "medium", |
| 5127 | + "identifiers": { |
| 5128 | + "summary": "Bootstrap Cross-Site Scripting (XSS) vulnerability", |
| 5129 | + "CVE": [ |
| 5130 | + "CVE-2024-6531" |
| 5131 | + ], |
| 5132 | + "githubID": "GHSA-vc8w-jr9v-vj7f" |
| 5133 | + }, |
| 5134 | + "info": [ |
| 5135 | + "https://github.com/advisories/GHSA-vc8w-jr9v-vj7f", |
| 5136 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-6531", |
| 5137 | + "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2024-6531.yml", |
| 5138 | + "https://github.com/twbs/bootstrap", |
| 5139 | + "https://www.herodevs.com/vulnerability-directory/cve-2024-6531" |
| 5140 | + ] |
5167 | 5141 | } |
5168 | 5142 | ], |
5169 | 5143 | "extractors": { |
|
5887 | 5861 | "info": [ |
5888 | 5862 | "https://github.com/axios/axios/pull/6300" |
5889 | 5863 | ] |
| 5864 | + }, |
| 5865 | + { |
| 5866 | + "atOrAbove": "1.3.2", |
| 5867 | + "below": "1.7.4", |
| 5868 | + "cwe": [ |
| 5869 | + "CWE-918" |
| 5870 | + ], |
| 5871 | + "severity": "high", |
| 5872 | + "identifiers": { |
| 5873 | + "summary": "Server-Side Request Forgery in axios", |
| 5874 | + "CVE": [ |
| 5875 | + "CVE-2024-39338" |
| 5876 | + ], |
| 5877 | + "githubID": "GHSA-8hc4-vh64-cxmj" |
| 5878 | + }, |
| 5879 | + "info": [ |
| 5880 | + "https://github.com/advisories/GHSA-8hc4-vh64-cxmj", |
| 5881 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-39338", |
| 5882 | + "https://github.com/axios/axios/issues/6463", |
| 5883 | + "https://github.com/axios/axios/pull/6539", |
| 5884 | + "https://github.com/axios/axios/pull/6543", |
| 5885 | + "https://github.com/axios/axios/commit/6b6b605eaf73852fb2dae033f1e786155959de3a", |
| 5886 | + "https://github.com/axios/axios", |
| 5887 | + "https://github.com/axios/axios/releases", |
| 5888 | + "https://github.com/axios/axios/releases/tag/v1.7.4", |
| 5889 | + "https://jeffhacks.com/advisories/2024/06/24/CVE-2024-39338.html" |
| 5890 | + ] |
5890 | 5891 | } |
5891 | 5892 | ], |
5892 | 5893 | "extractors": { |
|
6562 | 6563 | "extractors": { |
6563 | 6564 | "filecontent": [ |
6564 | 6565 | "version=\"(§§version§§)\".{1,1500}document\\.getElementById\\(\"__NEXT_DATA__\"\\)\\.textContent", |
6565 | | - "document\\.getElementById\\(\"__NEXT_DATA__\"\\)\\.textContent\\);window\\.__NEXT_DATA__=.;.\\.version=\"(§§version§§)\"" |
| 6566 | + "document\\.getElementById\\(\"__NEXT_DATA__\"\\)\\.textContent\\);window\\.__NEXT_DATA__=.;.\\.version=\"(§§version§§)\"", |
| 6567 | + "=\"(§§version§§)\"[\\s\\S]{10,100}Component[\\s\\S]{1,10}componentDidCatch[\\s\\S]{10,30}componentDidMount" |
6566 | 6568 | ] |
6567 | 6569 | } |
6568 | 6570 | }, |
|
7403 | 7405 | }, |
7404 | 7406 | { |
7405 | 7407 | "atOrAbove": "0", |
7406 | | - "below": "999", |
| 7408 | + "below": "2.7.10", |
7407 | 7409 | "cwe": [ |
7408 | 7410 | "CWE-1333" |
7409 | 7411 | ], |
|
0 commit comments