Security
Headlines
HeadlinesLatestCVEs

Tag

#js

CVE-2020-28437: Snyk Vulnerability Database | Snyk

This affects all versions of package heroku-env. The injection point is located in lib/get.js which is required by index.js.

CVE
#sql#vulnerability#js#postgres
CVE-2020-7795: get-npm-package-version

The package get-npm-package-version before 1.0.7 are vulnerable to Command Injection via main function in index.js.

CVE-2020-28434: Snyk Vulnerability Database | Snyk

This affects all versions of package gitblame. The injection point is located in line 15 in lib/gitblame.js.

CVE-2020-28433: Snyk Vulnerability Database | Snyk

This affects all versions of package node-latex-pdf.

CVE-2020-28453: Snyk Vulnerability Database | Snyk

This affects all versions of package npos-tesseract. The injection point is located in line 55 in lib/ocr.js.

CVE-2020-28423: Snyk Vulnerability Database | Snyk

This affects all versions of package monorepo-build.

RHSA-2022:5866: Red Hat Security Advisory: go-toolset-1.17 and go-toolset-1.17-golang security and bug fix update

An update for go-toolset-1.17 and go-toolset-1.17-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: golang: compress/gzip:...

RHSA-2022:5804: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root