CVE-2022-4066 – davidmoreno onion Log response.c onion_response_flush allocation of resources
https://notcve.org/view.php?id=CVE-2022-4066
A vulnerability was found in davidmoreno onion. It has been rated as problematic. Affected by this issue is the function onion_response_flush of the file src/onion/response.c of the component Log Handler. The manipulation leads to allocation of resources. The name of the patch is de8ea938342b36c28024fd8393ebc27b8442a161. • https://github.com/davidmoreno/onion/commit/de8ea938342b36c28024fd8393ebc27b8442a161 https://github.com/davidmoreno/onion/pull/308 https://vuldb.com/?id.214028 • CWE-404: Improper Resource Shutdown or Release •
CVE-2021-23377 – Arbitrary Command Injection
https://notcve.org/view.php?id=CVE-2021-23377
This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Esto afecta a todas las versiones del paquete onion-oled-js. Si es proporcionada una entrada de usuario controlada por un atacante para la función scroll, es posible para un atacante ejecutar comandos arbitrarios. • https://github.com/naddeoa/onion-oled-js/blob/8a523645d2cc29130f98de661b742893773d760d/src/oled-exp.js%23L91 https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •