CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In June 2018

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1251 CVE-2017-16132 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
simple-npm-registry is a local npm package cache. simple-npm-registry is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1252 CVE-2017-16131 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
unicorn-list is a web framework. unicorn-list is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1253 CVE-2017-16130 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
exxxxxxxxxxx is an Http eX Frame Google Style JavaScript Guide. exxxxxxxxxxx is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Accessible files are restricted to those with a file extension. Files with no extension such as /etc/passwd throw an error.
1254 CVE-2017-16129 400 2018-06-07 2019-10-09
7.1
None Remote Medium Not required None None Complete
The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.
1255 CVE-2017-16128 276 2018-06-07 2019-10-09
10.0
None Remote Low Not required Complete Complete Complete
The module npm-script-demo opened a connection to a command and control server. It has been removed from the npm registry.
1256 CVE-2017-16127 276 2018-06-07 2019-10-09
10.0
None Remote Low Not required Complete Complete Complete
The module pandora-doomsday infects other modules. It's since been unpublished from the registry.
1257 CVE-2017-16126 200 +Info 2018-06-07 2018-07-31
5.0
None Remote Low Not required Partial None None
The module botbait is a tool to be used to track bot and automated tools usage with-in the npm ecosystem. botbait is known to record and track user information. The module tracks the following information. Source IP process.versions process.platform How the module was invoked (test, require, pre-install)
1258 CVE-2017-16125 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
rtcmulticonnection-client is a signaling implementation for RTCMultiConnection.js, a multi-session manager. rtcmulticonnection-client is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1259 CVE-2017-16124 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
node-server-forfront is a simple static file server. node-server-forfront is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1260 CVE-2017-16123 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
welcomyzt is a simple file server. welcomyzt is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1261 CVE-2017-16122 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
cuciuci is a simple fileserver. cuciuci is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1262 CVE-2017-16121 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
datachannel-client is a signaling implementation for DataChannel.js. datachannel-client is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1263 CVE-2017-16120 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
liyujing is a static file server. liyujing is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1264 CVE-2017-16119 400 DoS 2018-06-07 2019-10-09
5.0
None Remote Low Not required None None Partial
Fresh is a module used by the Express.js framework for HTTP response freshness testing. It is vulnerable to a regular expression denial of service when it is passed specially crafted input to parse. This causes the event loop to be blocked causing a denial of service condition.
1265 CVE-2017-16118 400 DoS 2018-06-07 2019-10-09
5.0
None Remote Low Not required None None Partial
The forwarded module is used by the Express.js framework to handle the X-Forwarded-For header. It is vulnerable to a regular expression denial of service when it's passed specially crafted input to parse. This causes the event loop to be blocked causing a denial of service condition.
1266 CVE-2017-16117 400 DoS 2018-06-07 2019-10-09
5.0
None Remote Low Not required None None Partial
slug is a module to slugify strings, even if they contain unicode. slug is vulnerable to regular expression denial of service is specially crafted untrusted input is passed as input. About 50k characters can block the event loop for 2 seconds.
1267 CVE-2017-16116 400 DoS 2018-06-07 2019-10-09
5.0
None Remote Low Not required None None Partial
The string module is a module that provides extra string operations. The string module is vulnerable to regular expression denial of service when specifically crafted untrusted user input is passed into the underscore or unescapeHTML methods.
1268 CVE-2017-16115 400 DoS 2018-06-07 2020-02-20
5.0
None Remote Low Not required None None Partial
The timespan module is vulnerable to regular expression denial of service. Given 50k characters of untrusted user input it will block the event loop for around 10 seconds.
1269 CVE-2017-16114 400 DoS 2018-06-07 2019-10-09
5.0
None Remote Low Not required None None Partial
The marked module is vulnerable to a regular expression denial of service. Based on the information published in the public issue, 1k characters can block for around 6 seconds.
1270 CVE-2017-16113 20 DoS 2018-06-07 2019-10-09
5.0
None Remote Low Not required None None Partial
The parsejson module is vulnerable to regular expression denial of service when untrusted user input is passed into it to be parsed.
1271 CVE-2017-16111 400 DoS 2018-06-07 2019-10-09
5.0
None Remote Low Not required None None Partial
The content module is a module to parse HTTP Content-* headers. It is used by the hapijs framework to provide this functionality. The module is vulnerable to regular expression denial of service when passed a specifically crafted Content-Type or Content-Disposition header.
1272 CVE-2017-16110 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
weather.swlyons is a simple web server for weather updates. weather.swlyons is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1273 CVE-2017-16109 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
easyquick is a simple web server. easyquick is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Access is constrained, however, to supported file types. Requesting a file such as /etc/passwd returns a "not supported" error.
1274 CVE-2017-16108 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
gaoxiaotingtingting is an HTTP server. gaoxiaotingtingting is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1275 CVE-2017-16107 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
pooledwebsocket is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1276 CVE-2017-16106 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
tmock is a static file server. tmock is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1277 CVE-2017-16105 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
serverwzl is a simple http server. serverwzl is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1278 CVE-2017-16104 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
citypredict.whauwiller is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1279 CVE-2017-16103 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
serveryztyzt is a simple http server. serveryztyzt is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1280 CVE-2017-16102 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
serverhuwenhui is a simple http server. serverhuwenhui is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1281 CVE-2017-16101 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
serverwg is a simple http server. serverwg is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1282 CVE-2017-16100 77 2018-06-07 2019-10-09
10.0
None Remote Low Not required Complete Complete Complete
dns-sync is a sync/blocking dns resolver. If untrusted user input is allowed into the resolve() method then command injection is possible.
1283 CVE-2017-16099 400 DoS 2018-06-07 2019-10-09
5.0
None Remote Low Not required None None Partial
The no-case module is vulnerable to regular expression denial of service. When malicious untrusted user input is passed into no-case it can block the event loop causing a denial of service condition.
1284 CVE-2017-16098 400 DoS 2018-06-07 2019-10-09
5.0
None Remote Low Not required None None Partial
charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low.
1285 CVE-2017-16097 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
tiny-http is a simple http server. tiny-http is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1286 CVE-2017-16096 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
serveryaozeyan is a simple HTTP server. serveryaozeyan is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1287 CVE-2017-16095 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
serverliujiayi1 is a simple http server. serverliujiayi1 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1288 CVE-2017-16094 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
iter-http is a server for static files. iter-http is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1289 CVE-2017-16093 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
cyber-js is a simple http server. A cyberjs server is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1290 CVE-2017-16092 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
Sencisho is a simple http server for local development. Sencisho is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1291 CVE-2017-16091 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
xtalk helps your browser talk to nodex, a simple web framework. xtalk is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1292 CVE-2017-16090 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
fsk-server is a simple http server. fsk-server is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1293 CVE-2017-16089 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
serverlyr is a simple http server. serverlyr is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1294 CVE-2017-16088 2018-06-07 2019-10-09
10.0
None Remote Low Not required Complete Complete Complete
The safe-eval module describes itself as a safer version of eval. By accessing the object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.
1295 CVE-2017-16086 400 DoS 2018-06-07 2019-10-09
5.0
None Remote Low Not required None None Partial
ua-parser is a port of Browserscope's user agent parser. ua-parser is vulnerable to a ReDoS (Regular Expression Denial of Service) attack when given a specially crafted UserAgent header.
1296 CVE-2017-16085 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
tinyserver2 is a webserver for static files. tinyserver2 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1297 CVE-2017-16084 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
list-n-stream is a server for static files to list and stream local videos. list-n-stream v0.0.10 or lower is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
1298 CVE-2017-16083 22 Dir. Trav. 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
node-simple-router is a minimalistic router for Node. node-simple-router is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
1299 CVE-2017-16082 94 Exec Code 2018-06-07 2019-10-09
7.5
None Remote Low Not required Partial Partial Partial
A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name. There are 2 likely scenarios in which one would likely be vulnerable. 1) Executing unsafe, user-supplied sql which contains a malicious column name. 2) Connecting to an untrusted database and executing a query which returns results where any of the column names are malicious.
1300 CVE-2017-16081 200 +Info 2018-06-07 2019-10-09
5.0
None Remote Low Not required Partial None None
cross-env.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
Total number of vulnerabilities : 1788   Page : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 (This Page)27 28 29 30 31 32 33 34 35 36
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.