Show filters
37 Total Results
Displaying 11-20 of 37
Sort by:
Attacker Value
Unknown
CVE-2023-22580
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Due to improper input filtering in the sequalize js library, can malicious queries lead to sensitive information disclosure.
0
Attacker Value
Unknown
CVE-2023-22579
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Due to improper parameter filtering in the sequalize js library, can a attacker peform injection.
0
Attacker Value
Unknown
CVE-2023-22578
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Due to improper artibute filtering in the sequalize js library, can a attacker peform SQL injections.
0
Attacker Value
Unknown
CVE-2022-29823
Disclosure Date: October 25, 2022 (last updated February 24, 2025)
Feather-Sequalize cleanQuery method uses insecure recursive logic to filter unsupported keys from the query object. This results in a Remote Code Execution (RCE) with privileges of application.
0
Attacker Value
Unknown
CVE-2022-29822
Disclosure Date: October 25, 2022 (last updated February 24, 2025)
Due to improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection
0
Attacker Value
Unknown
CVE-2022-2422
Disclosure Date: October 25, 2022 (last updated February 24, 2025)
Due to improper input validation in the Feathers js library, it is possible to perform a SQL injection attack on the back-end database, in case the feathers-sequelize package is used.
0
Attacker Value
Unknown
CVE-2021-43270
Disclosure Date: November 02, 2021 (last updated February 23, 2025)
Datalust Seq.App.EmailPlus (aka seq-app-htmlemail) 3.1.0-dev-00148, 3.1.0-dev-00170, and 3.1.0-dev-00176 can use cleartext SMTP on port 25 in some cases where encryption on port 465 was intended.
0
Attacker Value
Unknown
CVE-2021-41329
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
Datalust Seq before 2021.2.6259 allows users (with view filters applied to their accounts) to see query results not constrained by their view filter. This information exposure, caused by an internal cache key collision, occurs when the user's view filter includes an array or IN clause, and when another user has recently executed an identical query differing only by the array elements.
0
Attacker Value
Unknown
CVE-2019-10749
Disclosure Date: October 29, 2019 (last updated November 27, 2024)
sequelize before version 3.35.1 allows attackers to perform a SQL Injection due to the JSON path keys not being properly sanitized in the Postgres dialect.
0
Attacker Value
Unknown
CVE-2019-10748
Disclosure Date: October 29, 2019 (last updated November 08, 2023)
Sequelize all versions prior to 3.35.1, 4.44.3, and 5.8.11 are vulnerable to SQL Injection due to JSON path keys not being properly escaped for the MySQL/MariaDB dialects.
0