We found results for “”
WS-2019-0541
Good to know:
Date: August 20, 2019
Arbitrary File Read vulnerability was found in macaddress before 0.4.3.
Language: JS
Severity Score
Severity Score
Weakness Type (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-22Top Fix
Upgrade Version
Upgrade to version chrisbraybrooke/laravel-ecommerce - 0.0.17;chrisbraybrooke/laravel-ecommerce - 0.0.2;chrisbraybrooke/laravel-ecommerce - 0.0.56;chrisbraybrooke/laravel-ecommerce - dev-form-field-key;Fable.Template.Elmish.React - 0.1.6;oburatongoi/productivity - 0.0.13;oburatongoi/productivity - no_fix;oburatongoi/productivity - 0.0.1;dotnetng.template - 1.0.0.4;NorDroN.AngularTemplate - 0.1.6;MIDIator.WebClient - 1.0.105;Sheeler.AngularTemplate - no_fix;macaddress - 0.4.3;kayrules/solatjakim-api-site - dev-version-1.0;VueTemplate - no_fix;Sheelersoft.AngularTemplate - no_fix;ilhanet/erpnet-widget-resource - no_fix;org.webjars.npm:macaddress:0.5.2;org.webjars.npm:node-macaddress:no_fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


