Show filters
37 Total Results
Displaying 11-20 of 37
Sort by:
Attacker Value
Unknown

CVE-2023-22580

Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Due to improper input filtering in the sequalize js library, can malicious queries lead to sensitive information disclosure.
Attacker Value
Unknown

CVE-2023-22579

Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Due to improper parameter filtering in the sequalize js library, can a attacker peform injection.
Attacker Value
Unknown

CVE-2023-22578

Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Due to improper artibute filtering in the sequalize js library, can a attacker peform SQL injections.
Attacker Value
Unknown

CVE-2022-29823

Disclosure Date: October 25, 2022 (last updated February 24, 2025)
Feather-Sequalize cleanQuery method uses insecure recursive logic to filter unsupported keys from the query object. This results in a Remote Code Execution (RCE) with privileges of application.
Attacker Value
Unknown

CVE-2022-29822

Disclosure Date: October 25, 2022 (last updated February 24, 2025)
Due to improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection
Attacker Value
Unknown

CVE-2022-2422

Disclosure Date: October 25, 2022 (last updated February 24, 2025)
Due to improper input validation in the Feathers js library, it is possible to perform a SQL injection attack on the back-end database, in case the feathers-sequelize package is used.
Attacker Value
Unknown

CVE-2021-43270

Disclosure Date: November 02, 2021 (last updated February 23, 2025)
Datalust Seq.App.EmailPlus (aka seq-app-htmlemail) 3.1.0-dev-00148, 3.1.0-dev-00170, and 3.1.0-dev-00176 can use cleartext SMTP on port 25 in some cases where encryption on port 465 was intended.
Attacker Value
Unknown

CVE-2021-41329

Disclosure Date: September 27, 2021 (last updated February 23, 2025)
Datalust Seq before 2021.2.6259 allows users (with view filters applied to their accounts) to see query results not constrained by their view filter. This information exposure, caused by an internal cache key collision, occurs when the user's view filter includes an array or IN clause, and when another user has recently executed an identical query differing only by the array elements.
Attacker Value
Unknown

CVE-2019-10749

Disclosure Date: October 29, 2019 (last updated November 27, 2024)
sequelize before version 3.35.1 allows attackers to perform a SQL Injection due to the JSON path keys not being properly sanitized in the Postgres dialect.
Attacker Value
Unknown

CVE-2019-10748

Disclosure Date: October 29, 2019 (last updated November 08, 2023)
Sequelize all versions prior to 3.35.1, 4.44.3, and 5.8.11 are vulnerable to SQL Injection due to JSON path keys not being properly escaped for the MySQL/MariaDB dialects.