Filtered by vendor Feathersjs
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-37899 | 1 Feathersjs | 1 Feathers | 2024-11-21 | N/A | 7.5 HIGH |
Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. Feathers socket handler did not catch invalid string conversion errors like `const message = ${{ toString: '' }}` which would cause the NodeJS process to crash when sending an unexpected Socket.io message like `socket.emit('find', { toString: '' })`. A fix has been released in versions 5.0.8 and 4.5.18. Users are advised to upgrade. There is no known workaround for this vulnerability. | |||||
CVE-2022-2422 | 1 Feathersjs | 1 Feathers-sequelize | 2024-11-21 | N/A | 10.0 CRITICAL |
Due to improper input validation in the Feathers js library, it is possible to perform a SQL injection attack on the back-end database, in case the feathers-sequelize package is used. | |||||
CVE-2022-29823 | 1 Feathersjs | 1 Feathers-sequelize | 2024-11-21 | N/A | 10.0 CRITICAL |
Feather-Sequalize cleanQuery method uses insecure recursive logic to filter unsupported keys from the query object. This results in a Remote Code Execution (RCE) with privileges of application. | |||||
CVE-2022-29822 | 1 Feathersjs | 1 Feathers-sequelize | 2024-11-21 | N/A | 10.0 CRITICAL |
Due to improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection |