|
1193 | 1193 | "summary": "The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs", |
1194 | 1194 | "githubID": "GHSA-27gm-ghr9-4v95", |
1195 | 1195 | "CVE": [ |
1196 | | - "CVE-2020-17480", |
1197 | | - "CVE-2020-23066" |
| 1196 | + "CVE-2020-17480" |
1198 | 1197 | ] |
1199 | 1198 | }, |
1200 | 1199 | "info": [ |
|
1264 | 1263 | "summary": "The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs", |
1265 | 1264 | "githubID": "GHSA-27gm-ghr9-4v95", |
1266 | 1265 | "CVE": [ |
1267 | | - "CVE-2020-17480", |
1268 | | - "CVE-2020-23066" |
| 1266 | + "CVE-2020-17480" |
1269 | 1267 | ] |
1270 | 1268 | }, |
1271 | 1269 | "info": [ |
|
6333 | 6331 | "info": [ |
6334 | 6332 | "https://github.com/advisories/GHSA-c59h-r6p8-q9wc" |
6335 | 6333 | ] |
| 6334 | + }, |
| 6335 | + { |
| 6336 | + "atOrAbove": "13.4.0", |
| 6337 | + "below": "13.5.1", |
| 6338 | + "cwe": [ |
| 6339 | + "CWE-444" |
| 6340 | + ], |
| 6341 | + "severity": "high", |
| 6342 | + "identifiers": { |
| 6343 | + "summary": "Next.js Vulnerable to HTTP Request Smuggling", |
| 6344 | + "CVE": [ |
| 6345 | + "CVE-2024-34350" |
| 6346 | + ], |
| 6347 | + "githubID": "GHSA-77r5-gw3j-2mpf" |
| 6348 | + }, |
| 6349 | + "info": [ |
| 6350 | + "https://github.com/advisories/GHSA-77r5-gw3j-2mpf", |
| 6351 | + "https://github.com/vercel/next.js/security/advisories/GHSA-77r5-gw3j-2mpf", |
| 6352 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-34350", |
| 6353 | + "https://github.com/vercel/next.js/commit/44eba020c615f0d9efe431f84ada67b81576f3f5", |
| 6354 | + "https://github.com/vercel/next.js", |
| 6355 | + "https://github.com/vercel/next.js/compare/v13.5.0...v13.5.1" |
| 6356 | + ] |
| 6357 | + }, |
| 6358 | + { |
| 6359 | + "atOrAbove": "13.4.0", |
| 6360 | + "below": "14.1.1", |
| 6361 | + "cwe": [ |
| 6362 | + "CWE-918" |
| 6363 | + ], |
| 6364 | + "severity": "high", |
| 6365 | + "identifiers": { |
| 6366 | + "summary": "Next.js Server-Side Request Forgery in Server Actions", |
| 6367 | + "CVE": [ |
| 6368 | + "CVE-2024-34351" |
| 6369 | + ], |
| 6370 | + "githubID": "GHSA-fr5h-rqp8-mj6g" |
| 6371 | + }, |
| 6372 | + "info": [ |
| 6373 | + "https://github.com/advisories/GHSA-fr5h-rqp8-mj6g", |
| 6374 | + "https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g", |
| 6375 | + "https://nvd.nist.gov/vuln/detail/CVE-2024-34351", |
| 6376 | + "https://github.com/vercel/next.js/pull/62561", |
| 6377 | + "https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085", |
| 6378 | + "https://github.com/vercel/next.js" |
| 6379 | + ] |
6336 | 6380 | } |
6337 | 6381 | ], |
6338 | 6382 | "extractors": { |
|
0 commit comments