Vulnerabilities (CVE)

Total 309161 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-10552 1 Infragistics 1 Igniteui 2024-11-21 5.8 MEDIUM 7.4 HIGH
igniteui 0.0.5 and earlier downloads JavaScript and CSS resources over insecure protocol.
CVE-2016-10551 1 Balderdash 1 Waterline-sequel 2024-11-21 7.5 HIGH 9.8 CRITICAL
waterline-sequel is a module that helps generate SQL statements for Waterline apps Any user input that goes into Waterline's `like`, `contains`, `startsWith`, or `endsWith` will end up in waterline-sequel with the potential for malicious code. A malicious user can input their own SQL statements in waterline-sequel 0.50 that will get executed and have full access to the database.
CVE-2016-10550 1 Sequelizejs 1 Sequelize 2024-11-21 7.5 HIGH 9.8 CRITICAL
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS If user input goes into the `limit` or `order` parameters, a malicious user can put in their own SQL statements. This affects sequelize 3.16.0 and earlier.
CVE-2016-10549 1 Sailsjs 1 Sails 2024-11-21 2.1 LOW 4.4 MEDIUM
Sails is an MVC style framework for building realtime web applications. Version 0.12.7 and lower have an issue with the CORS configuration where the value of the origin header is reflected as the value for the Access-Control-Allow-Origin header. This would allow an attacker to make AJAX requests to vulnerable hosts through cross site scripting or a malicious HTML Document, effectively bypassing the Same Origin Policy. Note that this is only an issue when `allRoutes` is set to `true` and `origin` is set to `*` or left commented out in the sails CORS config file. The problem can be compounded when the cors `credentials` setting is not provided. At that point authenticated cross domain requests are possible.
CVE-2016-10548 1 Reduce-css-calc Project 1 Reduce-css-calc 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Arbitrary code execution is possible in reduce-css-calc node module <=1.2.4 through crafted css. This makes cross sites scripting (XSS) possible on the client and arbitrary code injection possible on the server and user input is passed to the `calc` function.
CVE-2016-10547 1 Mozilla 1 Nunjucks 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Nunjucks is a full featured templating engine for JavaScript. Versions 2.4.2 and lower have a cross site scripting (XSS) vulnerability in autoescape mode. In autoescape mode, all template vars should automatically be escaped. By using an array for the keys, such as `name[]=<script>alert(1)</script>`, it is possible to bypass autoescaping and inject content into the DOM.
CVE-2016-10546 1 Pouchdb 1 Pouchdb 2024-11-21 10.0 HIGH 9.8 CRITICAL
An arbitrary code injection vector was found in PouchDB 6.0.4 and lesser via the map/reduce functions used in PouchDB temporary views and design documents. The code execution engine for this branch is not properly sandboxed and may be used to run arbitrary JavaScript as well as system commands.
CVE-2016-10544 1 Uws Project 1 Uws 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
uws is a WebSocket server library. By sending a 256mb websocket message to a uws server instance with permessage-deflate enabled, there is a possibility used compression will shrink said 256mb down to less than 16mb of websocket payload which passes the length check of 16mb payload. This data will then inflate up to 256mb and crash the node process by exceeding V8's maximum string size. This affects uws >=0.10.0 <=0.10.8.
CVE-2016-10543 1 Call Project 1 Call 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
call is an HTTP router that is primarily used by the hapi framework. There exists a bug in call versions 2.0.1-3.0.1 that does not validate empty parameters, which could result in invalid input bypassing the route validation rules.
CVE-2016-10542 1 Ws Project 1 Ws 2024-11-21 5.0 MEDIUM 7.5 HIGH
ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.
CVE-2016-10541 1 Shell-quote Project 1 Shell-quote 2024-11-21 7.5 HIGH 9.8 CRITICAL
The npm module "shell-quote" 1.6.0 and earlier cannot correctly escape ">" and "<" operator used for redirection in shell. Applications that depend on shell-quote may also be vulnerable. A malicious user could perform code injection.
CVE-2016-10540 1 Minimatch Project 1 Minimatch 2024-11-21 5.0 MEDIUM 7.5 HIGH
Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript `RegExp` objects. The primary function, `minimatch(path, pattern)` in Minimatch 3.0.1 and earlier is vulnerable to ReDoS in the `pattern` parameter.
CVE-2016-10539 1 Negotiator Project 1 Negotiator 2024-11-21 5.0 MEDIUM 7.5 HIGH
negotiator is an HTTP content negotiator for Node.js and is used by many modules and frameworks including Express and Koa. The header for "Accept-Language", when parsed by negotiator 0.6.0 and earlier is vulnerable to Regular Expression Denial of Service via a specially crafted string.
CVE-2016-10538 2 Cli Project, Debian 2 Cli, Debian Linux 2024-11-21 4.9 MEDIUM 3.5 LOW
The package `node-cli` before 1.0.0 insecurely uses the lock_file and log_file. Both of these are temporary, but it allows the starting user to overwrite any file they have access to.
CVE-2016-10537 1 Backbone Project 1 Backbone 2024-11-21 3.5 LOW 5.4 MEDIUM
backbone is a module that adds in structure to a JavaScript heavy application through key-value pairs and custom events connecting to your RESTful API through JSON There exists a potential Cross Site Scripting vulnerability in the `Model#Escape` function of backbone 0.3.3 and earlier, if a user is able to supply input. This is due to the regex that's replacing things to miss the conversion of things such as `<` to `<`.
CVE-2016-10536 1 Socket 1 Engine.io-client 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
engine.io-client is the client for engine.io, the implementation of a transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. The vulnerability is related to the way that node.js handles the `rejectUnauthorized` setting. If the value is something that evaluates to false, certificate verification will be disabled. This is problematic as engine.io-client 1.6.8 and earlier passes in an object for settings that includes the rejectUnauthorized property, whether it has been set or not. If the value has not been explicitly changed, it will be passed in as `null`, resulting in certificate verification being turned off.
CVE-2016-10535 1 Csrf-lite Project 1 Csrf-lite 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
csrf-lite is a cross-site request forgery protection library for framework-less node sites. csrf-lite uses `===`, a fail first string comparison, instead of a time constant string comparison This enables an attacker to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present.
CVE-2016-10534 1 Electron-packager Project 1 Electron-packager 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
electron-packager is a command line tool that packages Electron source code into `.app` and `.exe` packages. along with Electron. The `--strict-ssl` command line option in electron-packager >= 5.2.1 <= 6.0.0 || >=6.0.0 <= 6.0.2 defaults to false if not explicitly set to true. This could allow an attacker to perform a man in the middle attack.
CVE-2016-10533 1 Express-restify-mongoose Project 1 Express-restify-mongoose 2024-11-21 4.0 MEDIUM 8.8 HIGH
express-restify-mongoose is a module to easily create a flexible REST interface for mongoose models. express-restify-mongoose 2.4.2 and earlier and 3.0.X through 3.0.1 allows a malicious user to send a request for `GET /User?distinct=password` and get all the passwords for all the users in the database, despite the field being set to private. This can be used for other private data if the malicious user knew what was set as private for specific routes.
CVE-2016-10532 1 Console-io Project 1 Console-io 2024-11-21 10.0 HIGH 9.8 CRITICAL
console-io is a module that allows users to implement a web console in their application. A malicious user could bypass the authentication and execute any command that the user who is running the console-io application 2.2.13 and earlier is able to run. This means that if console-io was running from root, the attacker would have full access to the system. This vulnerability exists because the console-io application does not configure socket.io to require authentication, which allows a malicious user to connect via a websocket to send commands and receive the response.