Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown

CVE-2022-0639

Disclosure Date: February 17, 2022 (last updated February 23, 2025)
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.
Attacker Value
Unknown

CVE-2022-0512

Disclosure Date: February 14, 2022 (last updated February 23, 2025)
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
Attacker Value
Unknown

CVE-2021-3664

Disclosure Date: July 26, 2021 (last updated February 23, 2025)
url-parse is vulnerable to URL Redirection to Untrusted Site
Attacker Value
Unknown

CVE-2021-27515

Disclosure Date: February 22, 2021 (last updated November 28, 2024)
url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.
Attacker Value
Unknown

CVE-2020-8124

Disclosure Date: February 04, 2020 (last updated February 21, 2025)
Insufficient validation and sanitization of user input exists in url-parse npm package version 1.4.4 and earlier may allow attacker to bypass security checks.
Attacker Value
Unknown

CVE-2018-3774

Disclosure Date: August 12, 2018 (last updated November 27, 2024)
Incorrect parsing in url-parse <1.4.3 returns wrong hostname which leads to multiple vulnerabilities such as SSRF, Open Redirect, Bypass Authentication Protocol.
0
Attacker Value
Unknown

CVE-2018-6651

Disclosure Date: February 05, 2018 (last updated November 26, 2024)
In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim's computer.
0