|
78 | 78 | ] |
79 | 79 | }, |
80 | 80 | { |
| 81 | + "atOrAbove": "1.2.1", |
81 | 82 | "below": "1.9.0", |
82 | 83 | "cwe": [ |
83 | 84 | "CWE-79" |
|
92 | 93 | }, |
93 | 94 | "info": [ |
94 | 95 | "https://github.com/advisories/GHSA-q4m3-2j7h-f7xw", |
95 | | - "https://nvd.nist.gov/vuln/detail/CVE-2020-7656" |
| 96 | + "https://nvd.nist.gov/vuln/detail/CVE-2020-7656", |
| 97 | + "https://research.insecurelabs.org/jquery/test/" |
96 | 98 | ] |
97 | 99 | }, |
98 | 100 | { |
|
4363 | 4365 | "https://github.com/cure53/DOMPurify/releases" |
4364 | 4366 | ] |
4365 | 4367 | }, |
| 4368 | + { |
| 4369 | + "atOrAbove": "0", |
| 4370 | + "below": "2.5.0", |
| 4371 | + "cwe": [ |
| 4372 | + "CWE-79" |
| 4373 | + ], |
| 4374 | + "severity": "high", |
| 4375 | + "identifiers": { |
| 4376 | + "summary": "DOMpurify has a nesting-based mXSS", |
| 4377 | + "CVE": [ |
| 4378 | + "CVE-2024-47875" |
| 4379 | + ], |
| 4380 | + "githubID": "GHSA-gx9m-whjm-85jf" |
| 4381 | + }, |
| 4382 | + "info": [ |
| 4383 | + "https://github.com/advisories/GHSA-gx9m-whjm-85jf", |
| 4384 | + "https://github.com/cure53/DOMPurify/security/advisories/GHSA-gx9m-whjm-85jf", |
| 4385 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-47875", |
| 4386 | + "https://github.com/cure53/DOMPurify/commit/0ef5e537a514f904b6aa1d7ad9e749e365d7185f", |
| 4387 | + "https://github.com/cure53/DOMPurify/commit/6ea80cd8b47640c20f2f230c7920b1f4ce4fdf7a", |
| 4388 | + "https://github.com/cure53/DOMPurify", |
| 4389 | + "https://github.com/cure53/DOMPurify/blob/0ef5e537a514f904b6aa1d7ad9e749e365d7185f/test/test-suite.js#L2098" |
| 4390 | + ] |
| 4391 | + }, |
4366 | 4392 | { |
4367 | 4393 | "atOrAbove": "0", |
4368 | 4394 | "below": "2.5.4", |
|
4387 | 4413 | "https://github.com/cure53/DOMPurify" |
4388 | 4414 | ] |
4389 | 4415 | }, |
| 4416 | + { |
| 4417 | + "atOrAbove": "3.0.0", |
| 4418 | + "below": "3.1.3", |
| 4419 | + "cwe": [ |
| 4420 | + "CWE-79" |
| 4421 | + ], |
| 4422 | + "severity": "high", |
| 4423 | + "identifiers": { |
| 4424 | + "summary": "DOMpurify has a nesting-based mXSS", |
| 4425 | + "CVE": [ |
| 4426 | + "CVE-2024-47875" |
| 4427 | + ], |
| 4428 | + "githubID": "GHSA-gx9m-whjm-85jf" |
| 4429 | + }, |
| 4430 | + "info": [ |
| 4431 | + "https://github.com/advisories/GHSA-gx9m-whjm-85jf", |
| 4432 | + "https://github.com/cure53/DOMPurify/security/advisories/GHSA-gx9m-whjm-85jf", |
| 4433 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-47875", |
| 4434 | + "https://github.com/cure53/DOMPurify/commit/0ef5e537a514f904b6aa1d7ad9e749e365d7185f", |
| 4435 | + "https://github.com/cure53/DOMPurify/commit/6ea80cd8b47640c20f2f230c7920b1f4ce4fdf7a", |
| 4436 | + "https://github.com/cure53/DOMPurify", |
| 4437 | + "https://github.com/cure53/DOMPurify/blob/0ef5e537a514f904b6aa1d7ad9e749e365d7185f/test/test-suite.js#L2098" |
| 4438 | + ] |
| 4439 | + }, |
4390 | 4440 | { |
4391 | 4441 | "atOrAbove": "3.0.0", |
4392 | 4442 | "below": "3.1.3", |
|
5613 | 5663 | "https://github.com/ckeditor/ckeditor5/compare/v34.2.0...v35.0.0", |
5614 | 5664 | "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j" |
5615 | 5665 | ] |
| 5666 | + }, |
| 5667 | + { |
| 5668 | + "atOrAbove": "40.0.0", |
| 5669 | + "below": "43.1.1", |
| 5670 | + "cwe": [ |
| 5671 | + "CWE-79" |
| 5672 | + ], |
| 5673 | + "severity": "medium", |
| 5674 | + "identifiers": { |
| 5675 | + "summary": "Cross-site scripting (XSS) in the clipboard package", |
| 5676 | + "CVE": [ |
| 5677 | + "CVE-2024-45613" |
| 5678 | + ], |
| 5679 | + "githubID": "GHSA-rgg8-g5x8-wr9v" |
| 5680 | + }, |
| 5681 | + "info": [ |
| 5682 | + "https://github.com/advisories/GHSA-rgg8-g5x8-wr9v", |
| 5683 | + "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-rgg8-g5x8-wr9v", |
| 5684 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-45613", |
| 5685 | + "https://github.com/ckeditor/ckeditor5", |
| 5686 | + "https://github.com/ckeditor/ckeditor5/releases/tag/v43.1.1" |
| 5687 | + ] |
5616 | 5688 | } |
5617 | 5689 | ], |
5618 | 5690 | "extractors": { |
|
6697 | 6769 | "https://github.com/vercel/next.js" |
6698 | 6770 | ] |
6699 | 6771 | }, |
| 6772 | + { |
| 6773 | + "atOrAbove": "10.0.0", |
| 6774 | + "below": "14.2.7", |
| 6775 | + "cwe": [ |
| 6776 | + "CWE-674" |
| 6777 | + ], |
| 6778 | + "severity": "medium", |
| 6779 | + "identifiers": { |
| 6780 | + "summary": "Denial of Service condition in Next.js image optimization", |
| 6781 | + "CVE": [ |
| 6782 | + "CVE-2024-47831" |
| 6783 | + ], |
| 6784 | + "githubID": "GHSA-g77x-44xx-532m" |
| 6785 | + }, |
| 6786 | + "info": [ |
| 6787 | + "https://github.com/advisories/GHSA-g77x-44xx-532m", |
| 6788 | + "https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m", |
| 6789 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-47831", |
| 6790 | + "https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a", |
| 6791 | + "https://github.com/vercel/next.js" |
| 6792 | + ] |
| 6793 | + }, |
6700 | 6794 | { |
6701 | 6795 | "atOrAbove": "14.0.0", |
6702 | 6796 | "below": "14.2.10", |
|
0 commit comments