2 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

15 Mar 2023 — A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability. Dave McDaniel discovered that the SQLite3 bindings for Node.js were susceptible to the execution of arbitrary JavaScript code if a binding parameter is a crafted object. • https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-jqv5-7xpx-qj74 • CWE-913: Improper Control of Dynamically-Managed Code Resources CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

01 May 2022 — The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine. El paquete sqlite3 versiones anteriores a 5.0.3, es vulnerable a una Denegación de Servicio (DoS) que invocará la función toString del parámetro pasado. Si es pasado un objeto Function no válido, será lanzado y bloqueará el motor V8 • https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a •