Summary
Detail | |||
---|---|---|---|
Vendor | Safer-Eval Project | First view | 2019-10-15 |
Product | Safer-Eval | Last view | 2019-12-06 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:safer-eval_project:safer-eval:-:*:*:*:*:node.js:*:* | 3 |
cpe:2.3:a:safer-eval_project:safer-eval:*:*:*:*:*:*:*:* | 2 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2019-12-06 | CVE-2019-10769 | safer-eval is a npm package to sandbox the he evaluation of code used within the eval function. Affected versions of this package are vulnerable to Arbitrary Code Execution via generating a RangeError. |
9.9 | 2019-10-15 | CVE-2019-10760 | safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code. |
9.9 | 2019-10-15 | CVE-2019-10759 | safer-eval before 1.3.4 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |