|
982 | 982 | ] |
983 | 983 | }, |
984 | 984 | { |
985 | | - "below": "2.3.1", |
| 985 | + "below": "2.3.0", |
986 | 986 | "severity": "medium", |
987 | 987 | "cwe": [ |
988 | 988 | "CWE-79" |
989 | 989 | ], |
990 | 990 | "identifiers": { |
991 | | - "summary": "XSS vulnerability in actionscript/Jplayer.as in the Flash SWF component", |
| 991 | + "summary": "XSS vulnerabilities in actionscript/Jplayer.as in the Flash SWF component", |
992 | 992 | "CVE": [ |
993 | | - "CVE-2013-2023" |
| 993 | + "CVE-2013-2022" |
994 | 994 | ], |
995 | | - "release": "2.3.1" |
| 995 | + "githubID": "GHSA-3jcq-cwr7-6332" |
996 | 996 | }, |
997 | 997 | "info": [ |
998 | 998 | "http://jplayer.org/latest/release-notes/", |
999 | | - "https://nvd.nist.gov/vuln/detail/CVE-2013-2023" |
| 999 | + "https://nvd.nist.gov/vuln/detail/CVE-2013-2022" |
1000 | 1000 | ] |
1001 | 1001 | }, |
1002 | 1002 | { |
1003 | | - "below": "2.3.23", |
| 1003 | + "below": "2.3.1", |
1004 | 1004 | "severity": "medium", |
1005 | 1005 | "cwe": [ |
1006 | 1006 | "CWE-79" |
1007 | 1007 | ], |
1008 | 1008 | "identifiers": { |
1009 | | - "summary": "XSS vulnerabilities in actionscript/Jplayer.as in the Flash SWF component", |
| 1009 | + "summary": "XSS vulnerability in actionscript/Jplayer.as in the Flash SWF component", |
1010 | 1010 | "CVE": [ |
1011 | | - "CVE-2013-2022" |
| 1011 | + "CVE-2013-2023" |
1012 | 1012 | ], |
1013 | | - "release": "2.3.23" |
| 1013 | + "release": "2.3.1" |
1014 | 1014 | }, |
1015 | 1015 | "info": [ |
1016 | 1016 | "http://jplayer.org/latest/release-notes/", |
1017 | | - "https://nvd.nist.gov/vuln/detail/CVE-2013-2022" |
| 1017 | + "https://nvd.nist.gov/vuln/detail/CVE-2013-2023" |
1018 | 1018 | ] |
1019 | 1019 | } |
1020 | 1020 | ], |
|
1615 | 1615 | "https://tiny.cloud/docs/release-notes/release-notes5109/", |
1616 | 1616 | "https://tiny.cloud/docs/tinymce/6/6.7.3-release-notes/" |
1617 | 1617 | ] |
| 1618 | + }, |
| 1619 | + { |
| 1620 | + "atOrAbove": "0", |
| 1621 | + "below": "6.8.1", |
| 1622 | + "cwe": [ |
| 1623 | + "CWE-79" |
| 1624 | + ], |
| 1625 | + "severity": "medium", |
| 1626 | + "identifiers": { |
| 1627 | + "summary": "TinyMCE Cross-Site Scripting (XSS) vulnerability in handling iframes", |
| 1628 | + "CVE": [ |
| 1629 | + "CVE-2024-29203" |
| 1630 | + ], |
| 1631 | + "githubID": "GHSA-438c-3975-5x3f" |
| 1632 | + }, |
| 1633 | + "info": [ |
| 1634 | + "https://github.com/advisories/GHSA-438c-3975-5x3f", |
| 1635 | + "https://github.com/tinymce/tinymce/security/advisories/GHSA-438c-3975-5x3f", |
| 1636 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-29203", |
| 1637 | + "https://github.com/tinymce/tinymce/commit/bcdea2ad14e3c2cea40743fb48c63bba067ae6d1", |
| 1638 | + "https://github.com/tinymce/tinymce", |
| 1639 | + "https://www.tiny.cloud/docs/tinymce/6/6.8.1-release-notes/#new-convert_unsafe_embeds-option-that-controls-whether-object-and-embed-elements-will-be-converted-to-more-restrictive-alternatives-namely-img-for-image-mime-types-video-for-video-mime-types-audio-audio-mime-types-or-iframe-for-other-or-unspecified-mime-types", |
| 1640 | + "https://www.tiny.cloud/docs/tinymce/7/7.0-release-notes/#sandbox_iframes-editor-option-is-now-defaulted-to-true" |
| 1641 | + ] |
| 1642 | + }, |
| 1643 | + { |
| 1644 | + "atOrAbove": "0", |
| 1645 | + "below": "7.0.0", |
| 1646 | + "cwe": [ |
| 1647 | + "CWE-79" |
| 1648 | + ], |
| 1649 | + "severity": "medium", |
| 1650 | + "identifiers": { |
| 1651 | + "summary": "TinyMCE Cross-Site Scripting (XSS) vulnerability in handling external SVG files through Object or Embed elements", |
| 1652 | + "CVE": [ |
| 1653 | + "CVE-2024-29881" |
| 1654 | + ], |
| 1655 | + "githubID": "GHSA-5359-pvf2-pw78" |
| 1656 | + }, |
| 1657 | + "info": [ |
| 1658 | + "https://github.com/advisories/GHSA-5359-pvf2-pw78", |
| 1659 | + "https://github.com/tinymce/tinymce/security/advisories/GHSA-5359-pvf2-pw78", |
| 1660 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-29881", |
| 1661 | + "https://github.com/tinymce/tinymce/commit/bcdea2ad14e3c2cea40743fb48c63bba067ae6d1", |
| 1662 | + "https://github.com/tinymce/tinymce", |
| 1663 | + "https://www.tiny.cloud/docs/tinymce/6/6.8.1-release-notes/#new-convert_unsafe_embeds-option-that-controls-whether-object-and-embed-elements-will-be-converted-to-more-restrictive-alternatives-namely-img-for-image-mime-types-video-for-video-mime-types-audio-audio-mime-types-or-iframe-for-other-or-unspecified-mime-types", |
| 1664 | + "https://www.tiny.cloud/docs/tinymce/7/7.0-release-notes/#convert_unsafe_embeds-editor-option-is-now-defaulted-to-true" |
| 1665 | + ] |
1618 | 1666 | } |
1619 | 1667 | ], |
1620 | 1668 | "extractors": { |
|
5692 | 5740 | "axios-(§§version§§)(\\.min)?\\.js" |
5693 | 5741 | ], |
5694 | 5742 | "filecontent": [ |
5695 | | - "/\\* *axios v(§§version§§) " |
| 5743 | + "/\\* *axios v(§§version§§) ", |
| 5744 | + "// Axios v(§§version§§) C", |
| 5745 | + "return\"\\[Axios v(§§version§§)\\] Transitional", |
| 5746 | + "\\\"axios\\\",\\\"version\\\":\\\"(§§version§§)\\\"" |
5696 | 5747 | ] |
5697 | 5748 | } |
5698 | 5749 | }, |
|
6669 | 6720 | { |
6670 | 6721 | "below": "4.17.5", |
6671 | 6722 | "cwe": [ |
6672 | | - "CWE-471" |
| 6723 | + "CWE-471", |
| 6724 | + "CWE-1321" |
6673 | 6725 | ], |
6674 | | - "severity": "low", |
| 6726 | + "severity": "medium", |
6675 | 6727 | "identifiers": { |
6676 | 6728 | "summary": "Prototype Pollution in lodash", |
6677 | 6729 | "CVE": [ |
|
6738 | 6790 | { |
6739 | 6791 | "below": "4.17.12", |
6740 | 6792 | "cwe": [ |
| 6793 | + "CWE-1321", |
6741 | 6794 | "CWE-20" |
6742 | 6795 | ], |
6743 | 6796 | "severity": "high", |
|
0 commit comments