4 results (0.007 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

Versions of the package glance before 3.0.9 are vulnerable to Directory Traversal that allows users to read files outside the public root directory. This is related to but distinct from the vulnerability reported in [CVE-2018-3715](https://security.snyk.io/vuln/npm:glance:20180129). • https://github.com/jarofghosts/glance/commit/8cecfe90286e0c45a5494067f1b592d0ccfeabac https://security.snyk.io/vuln/SNYK-JS-GLANCE-3318395 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

The nlpweb/glance repository through 2014-06-27 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. El repositorio nlpweb/glance versiones hasta 27-06-2014 en GitHub, permite un salto de ruta absoluto porque la función send_file de Flask es usada de forma no segura • https://github.com/github/securitylab/issues/669#issuecomment-1117265726 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

There is a Stored XSS vulnerability in the glance node module versions <= 3.0.5. File name, which contains malicious HTML (eg. embedded iframe element or javascript: pseudo-protocol handler in <a> element) allows to execute JavaScript code against any user who opens a directory listing containing such crafted file name. Existe una vulnerabilidad Cross-Site Scripting (XSS) persistente en el módulo glance node en versiones 3.0.5 y anteriores. El nombre de archivo, que contiene código HTML malicioso (por ejemplo, un elemento iframe o un manipulador de pseudoprotocolos javascript: en un elemento <a rel="nofollow">) permite que se ejecute código JavaScript contra cualquier usuario que abra un listado de directorios que contenga dicho nombre de archivo manipulado.</a> • https://hackerone.com/reports/310133 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

glance node module before 3.0.4 suffers from a Path Traversal vulnerability due to lack of validation of path passed to it, which allows a malicious user to read content of any file with known path. El módulo de node glance sufre de una vulnerabilidad de salto de directorio debido a la falta de validación de una ruta que se le pasa, que permite que un usuario malicioso lea contenido de cualquier archivo con una ruta conocida. • https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19 https://hackerone.com/reports/310106 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •