|
438 | 438 | "https://github.com/advisories/GHSA-ffmh-x56j-9rc3", |
439 | 439 | "https://github.com/jquery-validation/jquery-validation/commit/5bbd80d27fc6b607d2f7f106c89522051a9fb0dd" |
440 | 440 | ] |
| 441 | + }, |
| 442 | + { |
| 443 | + "below": "1.20.0", |
| 444 | + "severity": "medium", |
| 445 | + "cwe": [ |
| 446 | + "CWE-79" |
| 447 | + ], |
| 448 | + "identifiers": { |
| 449 | + "summary": "Potential XSS via showLabel", |
| 450 | + "PR": "2462" |
| 451 | + }, |
| 452 | + "info": [ |
| 453 | + "https://github.com/jquery-validation/jquery-validation/blob/master/changelog.md#1200--2023-10-10" |
| 454 | + ] |
441 | 455 | } |
442 | 456 | ], |
443 | 457 | "extractors": { |
|
5654 | 5668 | "https://github.com/axios/axios/releases/tag/v1.6.0", |
5655 | 5669 | "https://security.snyk.io/vuln/SNYK-JS-AXIOS-6032459" |
5656 | 5670 | ] |
| 5671 | + }, |
| 5672 | + { |
| 5673 | + "below": "1.6.8", |
| 5674 | + "severity": "medium", |
| 5675 | + "cwe": [ |
| 5676 | + "CWE-200" |
| 5677 | + ], |
| 5678 | + "identifiers": { |
| 5679 | + "summary": "Versions before 1.6.8 depends on follow-redirects before 1.15.6 which could leak the proxy authentication credentials", |
| 5680 | + "PR": "6300" |
| 5681 | + }, |
| 5682 | + "info": [ |
| 5683 | + "https://github.com/axios/axios/pull/6300" |
| 5684 | + ] |
5657 | 5685 | } |
5658 | 5686 | ], |
5659 | 5687 | "extractors": { |
|
5755 | 5783 | "https://nvd.nist.gov/vuln/detail/CVE-2022-21670", |
5756 | 5784 | "https://security.snyk.io/vuln/SNYK-JS-MARKDOWNIT-2331914" |
5757 | 5785 | ] |
| 5786 | + }, |
| 5787 | + { |
| 5788 | + "below": "13.0.2", |
| 5789 | + "severity": "medium", |
| 5790 | + "cwe": [ |
| 5791 | + "CWE-400" |
| 5792 | + ], |
| 5793 | + "identifiers": { |
| 5794 | + "summary": "Fixed crash/infinite loop caused by linkify inline rule", |
| 5795 | + "issue": "957" |
| 5796 | + }, |
| 5797 | + "info": [ |
| 5798 | + "https://github.com/markdown-it/markdown-it/issues/957", |
| 5799 | + "https://github.com/markdown-it/markdown-it/compare/13.0.1...13.0.2" |
| 5800 | + ] |
5758 | 5801 | } |
5759 | 5802 | ], |
5760 | 5803 | "extractors": { |
|
6379 | 6422 | "info": [ |
6380 | 6423 | "https://github.com/froala/wysiwyg-editor/releases/tag/v4.0.11" |
6381 | 6424 | ] |
| 6425 | + }, |
| 6426 | + { |
| 6427 | + "below": "4.1.4", |
| 6428 | + "atOrAbove": "4.0.1", |
| 6429 | + "severity": "medium", |
| 6430 | + "cwe": [ |
| 6431 | + "CWE-79" |
| 6432 | + ], |
| 6433 | + "identifiers": { |
| 6434 | + "summary": "Froala Editor v4.0.1 to v4.1.1 was discovered to contain a cross-site scripting (XSS) vulnerability.", |
| 6435 | + "CVE": [ |
| 6436 | + "CVE-2023-41592" |
| 6437 | + ], |
| 6438 | + "githubID": "GHSA-hvpq-7vcc-5hj5" |
| 6439 | + }, |
| 6440 | + "info": [ |
| 6441 | + "https://froala.com/wysiwyg-editor/changelog/#4.1.4", |
| 6442 | + "https://github.com/advisories/GHSA-hvpq-7vcc-5hj5" |
| 6443 | + ] |
6382 | 6444 | } |
6383 | 6445 | ], |
6384 | 6446 | "extractors": { |
|
7037 | 7099 | ] |
7038 | 7100 | } |
7039 | 7101 | }, |
| 7102 | + "mathjax": { |
| 7103 | + "vulnerabilities": [ |
| 7104 | + { |
| 7105 | + "atOrAbove": "0", |
| 7106 | + "below": "2.7.4", |
| 7107 | + "cwe": [ |
| 7108 | + "CWE-79" |
| 7109 | + ], |
| 7110 | + "severity": "medium", |
| 7111 | + "identifiers": { |
| 7112 | + "summary": "Macro in MathJax running untrusted Javascript within a web browser", |
| 7113 | + "CVE": [ |
| 7114 | + "CVE-2018-1999024" |
| 7115 | + ], |
| 7116 | + "githubID": "GHSA-3c48-6pcv-88rm" |
| 7117 | + }, |
| 7118 | + "info": [ |
| 7119 | + "https://github.com/advisories/GHSA-3c48-6pcv-88rm", |
| 7120 | + "https://nvd.nist.gov/vuln/detail/CVE-2018-1999024", |
| 7121 | + "https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1", |
| 7122 | + "https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html", |
| 7123 | + "https://github.com/advisories/GHSA-3c48-6pcv-88rm", |
| 7124 | + "https://github.com/mathjax/MathJax" |
| 7125 | + ] |
| 7126 | + }, |
| 7127 | + { |
| 7128 | + "atOrAbove": "0", |
| 7129 | + "below": "999", |
| 7130 | + "cwe": [ |
| 7131 | + "CWE-1333" |
| 7132 | + ], |
| 7133 | + "severity": "high", |
| 7134 | + "identifiers": { |
| 7135 | + "summary": "MathJax Regular expression Denial of Service (ReDoS)", |
| 7136 | + "CVE": [ |
| 7137 | + "CVE-2023-39663" |
| 7138 | + ], |
| 7139 | + "githubID": "GHSA-v638-q856-grg8" |
| 7140 | + }, |
| 7141 | + "info": [ |
| 7142 | + "https://github.com/advisories/GHSA-v638-q856-grg8", |
| 7143 | + "https://nvd.nist.gov/vuln/detail/CVE-2023-39663", |
| 7144 | + "https://github.com/mathjax/MathJax/issues/3074" |
| 7145 | + ] |
| 7146 | + } |
| 7147 | + ], |
| 7148 | + "extractors": { |
| 7149 | + "uri": [ |
| 7150 | + "/mathjax@(§§version§§)/", |
| 7151 | + "/mathjax/(§§version§§)/" |
| 7152 | + ], |
| 7153 | + "filecontent": [ |
| 7154 | + "\\.MathJax\\.config\\.startup;{10,100}.\\.VERSION=\"(§§version§§)\"", |
| 7155 | + "\\.MathJax=\\{version:\"(§§version§§)\"", |
| 7156 | + "MathJax.{0,100}.\\.VERSION=void 0,.\\.VERSION=\"(§§version§§)\"", |
| 7157 | + "MathJax\\.version=\"(§§version§§)\";" |
| 7158 | + ] |
| 7159 | + } |
| 7160 | + }, |
7040 | 7161 | "dont check": { |
7041 | 7162 | "vulnerabilities": [], |
7042 | 7163 | "extractors": { |
|
0 commit comments