Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-05-29 CVE-2016-10556 SQL Injection vulnerability in Sequelizejs Sequelize
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped.
network
low complexity
sequelizejs CWE-89
7.5
2018-05-29 CVE-2015-9242 Improper Input Validation vulnerability in Ecstatic Project Ecstatic
Certain input strings when passed to new Date() or Date.parse() in ecstatic node module before 1.4.0 will cause v8 to raise an exception.
network
low complexity
ecstatic-project CWE-20
7.5
2018-05-29 CVE-2015-9241 Improper Input Validation vulnerability in Hapijs Hapi
Certain input passed into the If-Modified-Since or Last-Modified headers will cause an 'illegal access' exception to be raised.
network
low complexity
hapijs CWE-20
7.5
2018-05-29 CVE-2015-9240 Credentials Management vulnerability in Keystonejs Keystone
Due to a bug in the the default sign in functionality in the keystone node module before 0.3.16, incomplete email addresses could be matched.
network
low complexity
keystonejs CWE-255
7.5
2018-05-29 CVE-2014-10068 Path Traversal vulnerability in Hapi Inert 1.0.0/1.1.0
The inert directory handler in inert node module before 1.1.1 always allows files in hidden directories to be served, even when `showHidden` is false.
network
low complexity
hapi CWE-22
7.5
2018-05-29 CVE-2018-1241 Information Exposure Through Log Files vulnerability in EMC Recoverpoint and Recoverpoint for Virtual Machines
Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to 5.1.1.3, under certain conditions, may leak LDAP password in plain-text into the RecoverPoint log file.
network
low complexity
emc CWE-532
8.8
2018-05-29 CVE-2018-1375 Session Fixation vulnerability in IBM Security Guardium BIG Data Intelligence 3.1
IBM Security Guardium Big Data Intelligence (SonarG) 3.1 does not renew a session variable after a successful authentication which could lead to session fixation/hijacking vulnerability.
network
low complexity
ibm CWE-384
7.5
2018-05-29 CVE-2016-7076 Command Injection vulnerability in Sudo Project Sudo
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument.
local
low complexity
sudo-project CWE-77
7.8
2018-05-29 CVE-2018-11527 Cross-Site Request Forgery (CSRF) vulnerability in Cscms Project Cscms 4.1
An issue was discovered in CScms v4.1.
network
low complexity
cscms-project CWE-352
8.8
2018-05-29 CVE-2018-11488 Allocation of Resources Without Limits or Throttling vulnerability in Dtsearch 7.66.7936/7.90.8538.1
A stack exhaustion vulnerability in the search function of dtSearch 7.90.8538.1 and prior allows remote attackers to cause a denial of service condition by sending a specially crafted HTTP request.
network
low complexity
dtsearch CWE-770
7.5