Page 2 of 31 results (0.006 seconds)

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 2

The package express-xss-sanitizer before 1.1.3 are vulnerable to Prototype Pollution via the allowedTags attribute, allowing the attacker to bypass xss sanitization. El paquete express-xss-sanitizer versiones anteriores a 1.1.3, es vulnerable a una Contaminación de Prototipos por medio del atributo allowedTags, permitiendo al atacante omitir el saneo de tipo xss. • https://github.com/AhmedAdelFahim/express-xss-sanitizer/commit/3bf8aaaf4dbb1c209dcb8d87a82711a54c1ab39a https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4 https://runkit.com/embed/w306l6zfm7tu https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

An arbitrary file write vulnerability in Express-FileUpload v1.3.1 allows attackers to upload multiple files with the same name, causing an overwrite of files in the web application server. Una vulnerabilidad de escritura de archivos arbitrarios en Express-FileUpload versión v1.3.1, permite a atacantes subir varios archivos con el mismo nombre, causando una sobreescritura de archivos en el servidor de la aplicación web • https://www.npmjs.com/package/express-fileupload https://www.youtube.com/watch?v=3ROHB3ck4tA • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

An arbitrary file upload vulnerability in the file upload module of express-fileupload 1.3.1 allows attackers to execute arbitrary code via a crafted PHP file. NOTE: the vendor's position is that the observed behavior can only occur with "intentional misusing of the API": the express-fileupload middleware is not responsible for an application's business logic (e.g., determining whether or how a file should be renamed). Una vulnerabilidad de carga de archivos arbitraria en el módulo de carga de archivos de Express-Fileupload versión v1.3.1, permite a atacantes ejecutar código arbitrario por medio de un archivo PHP diseñado • https://github.com/richardgirges/express-fileupload/issues/312#issuecomment-1134912967 https://github.com/richardgirges/express-fileupload/issues/329#issuecomment-1387288644 https://www.youtube.com/watch?v=4XpofFi84KI • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

XSS Hunter Express before 2021-09-17 does not properly enforce authentication requirements for paths. XSS Hunter Express versiones anteriores al 17-09-2021, no aplica apropiadamente los requisitos de autenticación para las rutas • https://docs.google.com/document/d/12rq4YIFZLSmZlEsq7d7hYCI1qO5xyIxA1Wrs1m4y9-4/preview https://github.com/mandatoryprogrammer/xsshunter-express/commit/56bb44ed9024849f64173f71583ecb7d873baba0 https://vuln.ryotak.me/advisories/57 • CWE-287: Improper Authentication •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross Site Request Forgery (CSRF) vulnerability in Express cart v1.1.16 allows attackers to add an administrator account, add discount code or other unspecified impacts. El paquete express-cart versiones hasta 1.1.10 para Node.js, permite un ataque de tipo CSRF. • https://github.com/mrvautin/expressCart/issues/120 • CWE-352: Cross-Site Request Forgery (CSRF) •