Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown
CVE-2023-6293
Disclosure Date: November 24, 2023 (last updated December 01, 2023)
Prototype Pollution in GitHub repository robinbuschmann/sequelize-typescript prior to 2.1.6.
0
Attacker Value
Unknown
CVE-2023-25813
Disclosure Date: February 22, 2023 (last updated October 08, 2023)
Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the `replacements` and the `where` option in the same query.
0
Attacker Value
Unknown
CVE-2023-22580
Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Due to improper input filtering in the sequalize js library, can malicious queries lead to sensitive information disclosure.
0
Attacker Value
Unknown
CVE-2023-22579
Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Due to improper parameter filtering in the sequalize js library, can a attacker peform injection.
0
Attacker Value
Unknown
CVE-2023-22578
Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Due to improper artibute filtering in the sequalize js library, can a attacker peform SQL injections.
0
Attacker Value
Unknown
CVE-2019-10749
Disclosure Date: October 29, 2019 (last updated November 27, 2024)
sequelize before version 3.35.1 allows attackers to perform a SQL Injection due to the JSON path keys not being properly sanitized in the Postgres dialect.
0
Attacker Value
Unknown
CVE-2019-10748
Disclosure Date: October 29, 2019 (last updated November 08, 2023)
Sequelize all versions prior to 3.35.1, 4.44.3, and 5.8.11 are vulnerable to SQL Injection due to JSON path keys not being properly escaped for the MySQL/MariaDB dialects.
0
Attacker Value
Unknown
CVE-2019-10752
Disclosure Date: October 17, 2019 (last updated November 08, 2023)
Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite.
0
Attacker Value
Unknown
CVE-2019-11069
Disclosure Date: April 10, 2019 (last updated November 18, 2023)
Sequelize version 5 before 5.3.0 does not properly ensure that standard conforming strings are used.
0
Attacker Value
Unknown
CVE-2016-10554
Disclosure Date: May 31, 2018 (last updated November 26, 2024)
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. Before version 1.7.0-alpha3, sequelize defaulted SQLite to use MySQL backslash escaping, even though SQLite uses Postgres escaping.
0