|
3223 | 3223 | "https://github.com/advisories/GHSA-qwqh-hm9m-p5hr" |
3224 | 3224 | ] |
3225 | 3225 | }, |
| 3226 | + { |
| 3227 | + "atOrAbove": "0", |
| 3228 | + "below": "1.8.4", |
| 3229 | + "cwe": [ |
| 3230 | + "CWE-791" |
| 3231 | + ], |
| 3232 | + "severity": "low", |
| 3233 | + "identifiers": { |
| 3234 | + "summary": "AngularJS allows attackers to bypass common image source restrictions", |
| 3235 | + "CVE": [ |
| 3236 | + "CVE-2024-8373" |
| 3237 | + ], |
| 3238 | + "githubID": "GHSA-mqm9-c95h-x2p6" |
| 3239 | + }, |
| 3240 | + "info": [ |
| 3241 | + "https://github.com/advisories/GHSA-mqm9-c95h-x2p6", |
| 3242 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-8373", |
| 3243 | + "https://codepen.io/herodevs/full/bGPQgMp/8da9ce87e99403ee13a295c305ebfa0b", |
| 3244 | + "https://github.com/angular/angular.js", |
| 3245 | + "https://www.herodevs.com/vulnerability-directory/cve-2024-8373" |
| 3246 | + ] |
| 3247 | + }, |
3226 | 3248 | { |
3227 | 3249 | "atOrAbove": "1.3.0", |
3228 | 3250 | "below": "1.8.4", |
|
3247 | 3269 | "https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos" |
3248 | 3270 | ] |
3249 | 3271 | }, |
| 3272 | + { |
| 3273 | + "atOrAbove": "1.3.0-rc.4", |
| 3274 | + "below": "1.8.4", |
| 3275 | + "cwe": [ |
| 3276 | + "CWE-1289" |
| 3277 | + ], |
| 3278 | + "severity": "low", |
| 3279 | + "identifiers": { |
| 3280 | + "summary": "AngularJS allows attackers to bypass common image source restrictions", |
| 3281 | + "CVE": [ |
| 3282 | + "CVE-2024-8372" |
| 3283 | + ], |
| 3284 | + "githubID": "GHSA-m9gf-397r-hwpg" |
| 3285 | + }, |
| 3286 | + "info": [ |
| 3287 | + "https://github.com/advisories/GHSA-m9gf-397r-hwpg", |
| 3288 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-8372", |
| 3289 | + "https://codepen.io/herodevs/full/xxoQRNL/0072e627abe03e9cda373bc75b4c1017", |
| 3290 | + "https://github.com/angular/angular.js", |
| 3291 | + "https://www.herodevs.com/vulnerability-directory/cve-2024-8372" |
| 3292 | + ] |
| 3293 | + }, |
3250 | 3294 | { |
3251 | 3295 | "below": "1.999", |
3252 | 3296 | "severity": "low", |
|
4318 | 4362 | "info": [ |
4319 | 4363 | "https://github.com/cure53/DOMPurify/releases" |
4320 | 4364 | ] |
| 4365 | + }, |
| 4366 | + { |
| 4367 | + "atOrAbove": "0", |
| 4368 | + "below": "2.5.4", |
| 4369 | + "cwe": [ |
| 4370 | + "CWE-1321", |
| 4371 | + "CWE-1333" |
| 4372 | + ], |
| 4373 | + "severity": "high", |
| 4374 | + "identifiers": { |
| 4375 | + "summary": "DOMPurify allows tampering by prototype pollution", |
| 4376 | + "CVE": [ |
| 4377 | + "CVE-2024-45801" |
| 4378 | + ], |
| 4379 | + "githubID": "GHSA-mmhx-hmjr-r674" |
| 4380 | + }, |
| 4381 | + "info": [ |
| 4382 | + "https://github.com/advisories/GHSA-mmhx-hmjr-r674", |
| 4383 | + "https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674", |
| 4384 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-45801", |
| 4385 | + "https://github.com/cure53/DOMPurify/commit/1e520262bf4c66b5efda49e2316d6d1246ca7b21", |
| 4386 | + "https://github.com/cure53/DOMPurify/commit/26e1d69ca7f769f5c558619d644d90dd8bf26ebc", |
| 4387 | + "https://github.com/cure53/DOMPurify" |
| 4388 | + ] |
| 4389 | + }, |
| 4390 | + { |
| 4391 | + "atOrAbove": "3.0.0", |
| 4392 | + "below": "3.1.3", |
| 4393 | + "cwe": [ |
| 4394 | + "CWE-1321", |
| 4395 | + "CWE-1333" |
| 4396 | + ], |
| 4397 | + "severity": "high", |
| 4398 | + "identifiers": { |
| 4399 | + "summary": "DOMPurify allows tampering by prototype pollution", |
| 4400 | + "CVE": [ |
| 4401 | + "CVE-2024-45801" |
| 4402 | + ], |
| 4403 | + "githubID": "GHSA-mmhx-hmjr-r674" |
| 4404 | + }, |
| 4405 | + "info": [ |
| 4406 | + "https://github.com/advisories/GHSA-mmhx-hmjr-r674", |
| 4407 | + "https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674", |
| 4408 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-45801", |
| 4409 | + "https://github.com/cure53/DOMPurify/commit/1e520262bf4c66b5efda49e2316d6d1246ca7b21", |
| 4410 | + "https://github.com/cure53/DOMPurify/commit/26e1d69ca7f769f5c558619d644d90dd8bf26ebc", |
| 4411 | + "https://github.com/cure53/DOMPurify" |
| 4412 | + ] |
4321 | 4413 | } |
4322 | 4414 | ], |
4323 | 4415 | "extractors": { |
|
5119 | 5211 | }, |
5120 | 5212 | { |
5121 | 5213 | "atOrAbove": "4.0.0", |
5122 | | - "below": "4.6.3", |
| 5214 | + "below": "5.0.0", |
5123 | 5215 | "cwe": [ |
5124 | 5216 | "CWE-79" |
5125 | 5217 | ], |
|
5723 | 5815 | "info": [ |
5724 | 5816 | "https://github.com/sveltejs/svelte/pull/7530" |
5725 | 5817 | ] |
| 5818 | + }, |
| 5819 | + { |
| 5820 | + "below": "4.2.19", |
| 5821 | + "cwe": [ |
| 5822 | + "CWE-79" |
| 5823 | + ], |
| 5824 | + "severity": "medium", |
| 5825 | + "identifiers": { |
| 5826 | + "summary": "Svelte has a potential mXSS vulnerability due to improper HTML escaping", |
| 5827 | + "CVE": [ |
| 5828 | + "CVE-2024-45047" |
| 5829 | + ], |
| 5830 | + "githubID": "GHSA-8266-84wp-wv5c" |
| 5831 | + }, |
| 5832 | + "info": [ |
| 5833 | + "https://github.com/advisories/GHSA-8266-84wp-wv5c", |
| 5834 | + "https://github.com/sveltejs/svelte/security/advisories/GHSA-8266-84wp-wv5c", |
| 5835 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-45047", |
| 5836 | + "https://github.com/sveltejs/svelte/commit/83e96e044deb5ecbae2af361ae9e31d3e1ac43a3", |
| 5837 | + "https://github.com/sveltejs/svelte" |
| 5838 | + ] |
5726 | 5839 | } |
5727 | 5840 | ], |
5728 | 5841 | "extractors": { |
|
5734 | 5847 | ], |
5735 | 5848 | "filecontent": [ |
5736 | 5849 | "generated by Svelte v\\$\\{['\"](§§version§§)['\"]\\}", |
| 5850 | + "generated by Svelte v(§§version§§) \\*/", |
5737 | 5851 | "version: '(§§version§§)' [\\s\\S]{80,200}'SvelteDOMInsert'", |
5738 | 5852 | "VERSION = '(§§version§§)'[\\s\\S]{21,200}parse\\$[0-9][\\s\\S]{10,80}preprocess", |
5739 | 5853 | "var version\\$[0-9] = \"(§§version§§)\";[\\s\\S]{10,30}normalizeOptions\\(options\\)[\\s\\S]{80,200}'SvelteComponent.html'" |
|
6536 | 6650 | "https://github.com/vercel/next.js/compare/v13.5.0...v13.5.1" |
6537 | 6651 | ] |
6538 | 6652 | }, |
| 6653 | + { |
| 6654 | + "atOrAbove": "13.5.1", |
| 6655 | + "below": "13.5.7", |
| 6656 | + "cwe": [ |
| 6657 | + "CWE-349", |
| 6658 | + "CWE-639" |
| 6659 | + ], |
| 6660 | + "severity": "high", |
| 6661 | + "identifiers": { |
| 6662 | + "summary": "Next.js Cache Poisoning", |
| 6663 | + "CVE": [ |
| 6664 | + "CVE-2024-46982" |
| 6665 | + ], |
| 6666 | + "githubID": "GHSA-gp8f-8m3g-qvj9" |
| 6667 | + }, |
| 6668 | + "info": [ |
| 6669 | + "https://github.com/advisories/GHSA-gp8f-8m3g-qvj9", |
| 6670 | + "https://github.com/vercel/next.js/security/advisories/GHSA-gp8f-8m3g-qvj9", |
| 6671 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-46982", |
| 6672 | + "https://github.com/vercel/next.js/commit/7ed7f125e07ef0517a331009ed7e32691ba403d3", |
| 6673 | + "https://github.com/vercel/next.js/commit/bd164d53af259c05f1ab434004bcfdd3837d7cda", |
| 6674 | + "https://github.com/vercel/next.js" |
| 6675 | + ] |
| 6676 | + }, |
6539 | 6677 | { |
6540 | 6678 | "atOrAbove": "13.4.0", |
6541 | 6679 | "below": "14.1.1", |
|
6558 | 6696 | "https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085", |
6559 | 6697 | "https://github.com/vercel/next.js" |
6560 | 6698 | ] |
| 6699 | + }, |
| 6700 | + { |
| 6701 | + "atOrAbove": "14.0.0", |
| 6702 | + "below": "14.2.10", |
| 6703 | + "cwe": [ |
| 6704 | + "CWE-349", |
| 6705 | + "CWE-639" |
| 6706 | + ], |
| 6707 | + "severity": "high", |
| 6708 | + "identifiers": { |
| 6709 | + "summary": "Next.js Cache Poisoning", |
| 6710 | + "CVE": [ |
| 6711 | + "CVE-2024-46982" |
| 6712 | + ], |
| 6713 | + "githubID": "GHSA-gp8f-8m3g-qvj9" |
| 6714 | + }, |
| 6715 | + "info": [ |
| 6716 | + "https://github.com/advisories/GHSA-gp8f-8m3g-qvj9", |
| 6717 | + "https://github.com/vercel/next.js/security/advisories/GHSA-gp8f-8m3g-qvj9", |
| 6718 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-46982", |
| 6719 | + "https://github.com/vercel/next.js/commit/7ed7f125e07ef0517a331009ed7e32691ba403d3", |
| 6720 | + "https://github.com/vercel/next.js/commit/bd164d53af259c05f1ab434004bcfdd3837d7cda", |
| 6721 | + "https://github.com/vercel/next.js" |
| 6722 | + ] |
6561 | 6723 | } |
6562 | 6724 | ], |
6563 | 6725 | "extractors": { |
|
0 commit comments