logo

CVE-2016-10578 unicode

Package

Manager: npm
Name: unicode
Vulnerable Version: >=0 <9.0.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:U/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00172 pctl0.39009

Details

Downloads Resources over HTTP in unicode Affected versions of `unicode` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 9.0.0 or later.

Metadata

Created: 2019-02-18T23:51:52Z
Modified: 2021-01-08T21:18:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/02/GHSA-qjf4-7642-c57p/GHSA-qjf4-7642-c57p.json
CWE IDs: ["CWE-311"]
Alternative ID: GHSA-qjf4-7642-c57p
Finding: F020
Auto approve: 1