Created
January 18, 2023 23:47
-
-
Save breadchris/43b40618257a50c76faf1c90ebf1161f to your computer and use it in GitHub Desktop.
CISA Javascript Known Exploited Vulnerabilities
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"data": { | |
"vulnerability_cisa_known_exploited": [ | |
{ | |
"vulnerability_name": "MongoDB mongo-express Remote Code Execution Vulnerability", | |
"vulnerability": [ | |
{ | |
"equivalents": [ | |
{ | |
"equivalent_vulnerability": { | |
"affected": [ | |
{ | |
"package": { | |
"name": "mongo-express" | |
} | |
} | |
], | |
"summary": "Remote Code Execution Vulnerability in NPM mongo-express" | |
} | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"vulnerability_name": "System Information Library for Node.JS Command Injection", | |
"vulnerability": [ | |
{ | |
"equivalents": [ | |
{ | |
"equivalent_vulnerability": { | |
"affected": [ | |
{ | |
"package": { | |
"name": "systeminformation" | |
} | |
} | |
], | |
"summary": "Command Injection Vulnerability" | |
} | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"vulnerability_name": "Google Chrome Use-After-Free Vulnerability", | |
"vulnerability": [ | |
{ | |
"equivalents": [ | |
{ | |
"equivalent_vulnerability": { | |
"affected": [ | |
{ | |
"package": { | |
"name": "puppeteer" | |
} | |
} | |
], | |
"summary": "Use-After-Free in puppeteer" | |
} | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"vulnerability_name": "Google Chromium Heap Buffer Overflow Vulnerability", | |
"vulnerability": [ | |
{ | |
"equivalents": [ | |
{ | |
"equivalent_vulnerability": { | |
"affected": [ | |
{ | |
"package": { | |
"name": "electron" | |
} | |
} | |
], | |
"summary": "Heap buffer overflow in GPU" | |
} | |
} | |
] | |
} | |
] | |
} | |
] | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment