CVE Security Report - SICS Search Solr-node

CVE Security Report - SICS Search Solr-node

The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.

Name Description CWE CVSS v2.0 Severity CVSS v3.0 Severity Dependency
End-of-Life: Long term support for AngularJS has been discontinued End-of-Life: Long term support for AngularJS has been discontinued       angular-cookies.min.js
End-of-Life: Long term support for AngularJS has been discontinued End-of-Life: Long term support for AngularJS has been discontinued       angular-resource.min.js
End-of-Life: Long term support for AngularJS has been discontinued End-of-Life: Long term support for AngularJS has been discontinued       angular-route.min.js
End-of-Life: Long term support for AngularJS has been discontinued End-of-Life: Long term support for AngularJS has been discontinued       angular-sanitize.min.js
End-of-Life: Long term support for AngularJS has been discontinued End-of-Life: Long term support for AngularJS has been discontinued       angular.min.js
CVE-2023-33201 Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability. CWE-295 MEDIUM   bcprov-jdk15on-1.70.jar
CVE-2023-36479 Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2. Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2023-36479 for details CWE-149 LOW   jetty-servlets-10.0.16.jar
CVE-2021-41182 jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. CWE-79 MEDIUM MEDIUM jquery-ui.min.js
CVE-2021-41183 jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources. CWE-79 MEDIUM MEDIUM jquery-ui.min.js
CVE-2021-41184 jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources. CWE-79 MEDIUM MEDIUM jquery-ui.min.js
CVE-2022-31160 jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( 'refresh' )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`. CWE-79   MEDIUM jquery-ui.min.js

This report was generated 18.09.2023, 21:26:01 UTC, using dependency-check version: 7.4.4.