CVE-2016-10578 – unicode
Package
Manager: npm
Name: unicode
Vulnerable Version: >=0 <9.0.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:U/RC:R
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00172 pctl0.39009
Details
Downloads Resources over HTTP in unicode Affected versions of `unicode` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 9.0.0 or later.
Metadata
Created: 2019-02-18T23:51:52Z
Modified: 2021-01-08T21:18:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/02/GHSA-qjf4-7642-c57p/GHSA-qjf4-7642-c57p.json
CWE IDs: ["CWE-311"]
Alternative ID: GHSA-qjf4-7642-c57p
Finding: F020
Auto approve: 1