CVE-2023-25813 |
Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the `replacements` and the `where` option in the same query. |
3.14.2,
5.8.10,
4.30.0,
4.29.1,
4.28.6,
4.28.5,
4.28.2,
4.25.2
, 4.22.14, 4.22.11, 4.22.10, 4.13.12, 4.15.1, 4.13.7, 4.11.6, 4.10.1, 4.4.8, 4.4.3, 4.4.0, 4.2.1, 3.33.0, 4.0.0, 3.31.2, 3.23.0, 3.20.0, 3.19.2, 3.30.2, 3.23.6, 3.28.0, 3.17.2, 3.14.1, 3.17.0, 3.13.0, 3.7.1, 3.8.0, 2.0.0-beta.1, 2.0.0-beta.3, 2.0.5, 2.0.0-dev7, 2.0.0-dev6, 2.0.0-dev3, 2.0.0-alpha3, 1.7.7, 1.7.2, 1.7.0-rc7, 1.7.0-rc6, 1.7.0-rc5, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 4.35.0, 4.35.5, 4.41.1, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 5.0.0-0, 2.0.0-rc7, 3.19.1, 2.0.0-dev5, 2.1.3, 3.24.3, 3.31.0, 3.34.0, 4.0.0-0, 4.0.0-2, 4.3.0, 4.4.7, 4.5.0, 4.11.0, 4.11.3, 4.13.9, 4.14.0, 4.16.1, 4.22.0, 4.22.7, 4.25.1, 4.28.8, 4.28.7, 4.37.6, 4.37.7, 4.43.2, 5.7.4, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 3.30.3, 4.22.2, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 4.9.0, 4.10.2, 4.10.3, 4.11.1, 4.11.2, 4.13.14, 4.13.15, 4.16.0, 4.17.2, 4.22.4, 4.22.9, 4.22.13, 4.23.0, 4.32.1, 4.32.4, 4.32.6, 4.35.2, 5.2.2, 5.7.3, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-dev1, 2.0.0-dev8, 2.0.0-dev9, 2.0.0-rc3, 2.0.0-rc8, 2.0.2, 2.0.4, 2.1.1, 2.1.0, 3.4.0, 3.0.0, 3.7.0, 3.1.1, 5.8.7, 5.8.4, 5.8.3, 5.8.0, 5.7.6, 5.7.0, 5.3.3, 5.2.9, 5.2.8, 5.2.7, 5.2.6, 5.2.0, 5.1.1, 3.11.0, 4.40.0, 4.38.1, 4.32.7, 4.31.1, 4.30.2, 3.14.0, 3.15.1, 3.17.3, 3.23.1, 3.24.0, 4.4.4, 4.4.9, 4.22.5, 4.23.3, 4.27.0, 4.28.4, 4.32.0, 4.32.3, 4.33.0, 4.41.2, 5.2.11, 5.2.1, 5.2.12, 5.2.14, 5.3.1, 5.7.5, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 2.0.0-dev10, 3.2.0, 3.10.0, 3.24.4, 3.24.5, 3.24.8, 3.25.0, 3.29.0, 3.31.1, 4.4.5, 4.4.6, 4.7.4, 4.8.3, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 3.12.2, 3.26.0, 3.30.1, 4.15.0, 4.29.0, 4.32.2, 5.3.2, 4.37.4, 5.1.0, 4.13.6, 4.13.13, 3.17.1, 3.3.0, 4.13.17, 4.17.0, 4.21.0, 3.24.1, 4.22.15, 5.4.0, 5.6.0, 1.7.0-rc3, 1.7.11, 3.18.0, 2.0.0-dev12, 2.0.0-beta.8, 3.19.3, 4.3.2, 4.11.5, 4.13.1, 3.22.0, 1.6.0-beta4, 3.23.2, 3.4.1, 0.4.2, 1.6.0-beta-3, 3.12.0, 4.18.0, 4.39.0, 3.24.2, 4.4.1, 4.23.1, 4.42.1, 5.3.4, 3.19.0, 4.11.7, 4.13.3, 4.2.0, 4.4.2, 4.7.2, 4.8.2, 4.13.2, 4.12.0, 4.13.10, 4.13.16, 4.17.1, 4.20.3, 4.22.6, 4.25.0, 4.28.1, 4.28.0, 4.30.1, 4.37.0, 4.43.0, 4.29.3, 0.4.0, 2.0.0-beta.5, 4.32.5, 4.8.4, 3.5.0, 0.4.3, 4.13.4, 4.33.3, 4.35.1, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 3.23.4, 1.6.0-alpha-1, 1.7.0-rc4, 4.22.3, 4.7.3, 1.7.0-beta.5, 1.3.0, 1.0.2, 3.16.0, 3.23.5, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 2.0.0-dev11, 2.0.3, 4.13.5, 4.19.0, 4.37.8, 4.22.12, 5.3.5, 3.30.0, 4.20.2, 1.7.0-beta.1, 4.22.8, 4.23.4, 4.13.0, 4.24.0, 4.26.0, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 2.0.0-dev2, 2.0.0-dev4, 2.0.1, 3.6.0, 3.5.1, 3.12.1, 2.0.6, 3.0.1, 3.9.0, 3.21.0, 3.23.3, 3.24.7, 3.32.1, 3.35.0, 4.0.0-1, 4.3.1, 4.4.10, 4.6.0, 4.8.0, 4.11.4, 4.13.8, 4.15.2, 4.16.2, 4.28.3, 4.29.2, 4.31.0, 4.31.2, 4.33.1, 4.34.0, 4.34.1, 4.33.2, 4.33.4, 4.36.0, 4.37.1, 4.39.1, 4.43.1, 5.2.3, 5.2.10, 5.2.15, 5.3.0, 5.5.1, 5.8.9, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 3.3.2, 3.1.0, 3.30.4, 4.35.3, 1.7.0-beta.4a, 2.1.2, 2.0.0-dev13, 4.20.0, 4.22.1, 4.38.0, 2.0.0-rc2, 3.15.0, 3.25.1, 4.7.0, 4.7.5, 4.10.0, 4.13.11, 4.20.1, 4.22.16, 4.35.4, 4.36.1, 4.37.3, 4.37.2, 4.37.10, 4.37.5, 4.37.9, 4.42.0, 4.41.0, 4.44.2, 4.44.0, 4.44.1, 5.2.5, 5.2.4, 5.2.13, 5.5.0, 5.6.1, 5.7.2, 5.7.1, 5.8.2, 5.8.1, 5.8.8, 5.8.6, 1.3.2, 4.7.1, 1.5.0-alpha, 1.1.1, 4.23.2, 5.8.5, 2.0.0-rc5, 3.3.1, 3.24.6, 3.27.0, 4.1.0, 2.0.0, 1.1.3, 4.8.1, 6.15.0, 6.16.2, 6.14.1, 6.12.5, 6.13.0, 6.18.0, 6.15.1, 6.16.3, 6.19.0, 6.17.0, 6.16.1, 6.16.0, 6.14.0, 6.5.1, 6.4.0, 6.0.0-beta.4, 5.22.1, 5.15.0, 5.21.10, 5.21.13, 5.19.4, 5.17.0, 5.16.0, 5.12.2, 5.12.1, 6.6.1, 5.21.1, 5.0.0-beta.5, 5.0.0-beta.9, 5.0.0-beta.16, 5.0.0-beta.17, 5.8.12, 5.9.5, 5.20.0, 6.1.0, 5.18.0, 4.44.3, 5.8.11, 6.2.3, 6.3.0, 6.10.0, 6.12.4, 5.0.0-beta.4, 5.0.0-beta.6, 5.0.0-beta.10, 5.0.0-beta.13, 5.9.1, 5.9.2, 5.9.4, 5.10.3, 5.11.0, 5.12.3, 5.13.1, 5.15.1, 5.15.2, 5.17.2, 5.18.3, 5.19.0, 5.19.2, 5.19.6, 5.19.8, 5.21.5, 5.21.9, 5.22.4, 6.0.0-beta.1, 6.0.0-beta.2, 6.0.0-beta.6, 6.2.0, 6.3.1, 6.3.4, 6.6.2, 6.9.0, 6.12.0-alpha.1, 6.12.0-beta.2, 6.12.0, 6.12.2, 6.12.3, 6.3.5, 5.0.0-beta.7, 5.18.2, 5.22.0, 5.18.4, 5.0.0-beta.11, 5.19.5, 3.35.1, 5.21.12, 5.10.1, 5.21.2, 6.8.0, 5.0.0-beta.3, 5.21.11, 6.2.4, 6.3.2, 5.0.0-beta.12, 5.9.3, 6.1.1, 5.19.3, 5.0.0-beta.1, 5.0.0-beta, 5.19.7, 6.0.0-beta.3, 6.2.1, 5.0.0-beta.8, 5.0.0-beta.14, 5.10.0, 5.12.0, 5.13.0, 5.17.1, 5.21.0, 5.21.3, 5.21.4, 5.21.6, 5.21.8, 5.22.2, 5.22.3, 6.0.0-beta.5, 6.0.0-beta.7, 6.2.2, 6.3.3, 6.5.0, 6.6.0, 6.6.4, 6.6.5, 6.7.0, 6.11.0, 6.12.0-beta.1, 6.12.0-beta.3, 5.18.1, 4.44.4, 5.0.0-beta.2, 5.10.2, 5.14.0, 5.19.1, 5.21.7, 5.22.5, 6.12.1, 5.9.0, 5.0.0-beta.15
(Show all)
|
Major → 6.29.0 |
CVE-2023-22580 |
Due to improper input filtering in the sequalize js library, can malicious queries lead to sensitive information disclosure. |
3.14.2,
5.8.10,
4.30.0,
4.29.1,
4.28.6,
4.28.5,
4.28.2,
4.25.2
, 4.22.14, 4.22.11, 4.22.10, 4.13.12, 4.15.1, 4.13.7, 4.11.6, 4.10.1, 4.4.8, 4.4.3, 4.4.0, 4.2.1, 3.33.0, 4.0.0, 3.31.2, 3.23.0, 3.20.0, 3.19.2, 3.30.2, 3.23.6, 3.28.0, 3.17.2, 3.14.1, 3.17.0, 3.13.0, 3.7.1, 3.8.0, 2.0.0-beta.1, 2.0.0-beta.3, 2.0.5, 2.0.0-dev7, 2.0.0-dev6, 2.0.0-dev3, 2.0.0-alpha3, 1.7.7, 1.7.2, 1.7.0-rc7, 1.7.0-rc6, 1.7.0-rc5, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 4.35.0, 4.35.5, 4.41.1, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 5.0.0-0, 2.0.0-rc7, 3.19.1, 2.0.0-dev5, 2.1.3, 3.24.3, 3.31.0, 3.34.0, 4.0.0-0, 4.0.0-2, 4.3.0, 4.4.7, 4.5.0, 4.11.0, 4.11.3, 4.13.9, 4.14.0, 4.16.1, 4.22.0, 4.22.7, 4.25.1, 4.28.8, 4.28.7, 4.37.6, 4.37.7, 4.43.2, 5.7.4, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 3.30.3, 4.22.2, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 4.9.0, 4.10.2, 4.10.3, 4.11.1, 4.11.2, 4.13.14, 4.13.15, 4.16.0, 4.17.2, 4.22.4, 4.22.9, 4.22.13, 4.23.0, 4.32.1, 4.32.4, 4.32.6, 4.35.2, 5.2.2, 5.7.3, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-dev1, 2.0.0-dev8, 2.0.0-dev9, 2.0.0-rc3, 2.0.0-rc8, 2.0.2, 2.0.4, 2.1.1, 2.1.0, 3.4.0, 3.0.0, 3.7.0, 3.1.1, 5.8.7, 5.8.4, 5.8.3, 5.8.0, 5.7.6, 5.7.0, 5.3.3, 5.2.9, 5.2.8, 5.2.7, 5.2.6, 5.2.0, 5.1.1, 3.11.0, 4.40.0, 4.38.1, 4.32.7, 4.31.1, 4.30.2, 3.14.0, 3.15.1, 3.17.3, 3.23.1, 3.24.0, 4.4.4, 4.4.9, 4.22.5, 4.23.3, 4.27.0, 4.28.4, 4.32.0, 4.32.3, 4.33.0, 4.41.2, 5.2.11, 5.2.1, 5.2.12, 5.2.14, 5.3.1, 5.7.5, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 2.0.0-dev10, 3.2.0, 3.10.0, 3.24.4, 3.24.5, 3.24.8, 3.25.0, 3.29.0, 3.31.1, 4.4.5, 4.4.6, 4.7.4, 4.8.3, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 3.12.2, 3.26.0, 3.30.1, 4.15.0, 4.29.0, 4.32.2, 5.3.2, 4.37.4, 5.1.0, 4.13.6, 4.13.13, 3.17.1, 3.3.0, 4.13.17, 4.17.0, 4.21.0, 3.24.1, 4.22.15, 5.4.0, 5.6.0, 1.7.0-rc3, 1.7.11, 3.18.0, 2.0.0-dev12, 2.0.0-beta.8, 3.19.3, 4.3.2, 4.11.5, 4.13.1, 3.22.0, 1.6.0-beta4, 3.23.2, 3.4.1, 0.4.2, 1.6.0-beta-3, 3.12.0, 4.18.0, 4.39.0, 3.24.2, 4.4.1, 4.23.1, 4.42.1, 5.3.4, 3.19.0, 4.11.7, 4.13.3, 4.2.0, 4.4.2, 4.7.2, 4.8.2, 4.13.2, 4.12.0, 4.13.10, 4.13.16, 4.17.1, 4.20.3, 4.22.6, 4.25.0, 4.28.1, 4.28.0, 4.30.1, 4.37.0, 4.43.0, 4.29.3, 0.4.0, 2.0.0-beta.5, 4.32.5, 4.8.4, 3.5.0, 0.4.3, 4.13.4, 4.33.3, 4.35.1, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 3.23.4, 1.6.0-alpha-1, 1.7.0-rc4, 4.22.3, 4.7.3, 1.7.0-beta.5, 1.3.0, 1.0.2, 3.16.0, 3.23.5, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 2.0.0-dev11, 2.0.3, 4.13.5, 4.19.0, 4.37.8, 4.22.12, 5.3.5, 3.30.0, 4.20.2, 1.7.0-beta.1, 4.22.8, 4.23.4, 4.13.0, 4.24.0, 4.26.0, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 2.0.0-dev2, 2.0.0-dev4, 2.0.1, 3.6.0, 3.5.1, 3.12.1, 2.0.6, 3.0.1, 3.9.0, 3.21.0, 3.23.3, 3.24.7, 3.32.1, 3.35.0, 4.0.0-1, 4.3.1, 4.4.10, 4.6.0, 4.8.0, 4.11.4, 4.13.8, 4.15.2, 4.16.2, 4.28.3, 4.29.2, 4.31.0, 4.31.2, 4.33.1, 4.34.0, 4.34.1, 4.33.2, 4.33.4, 4.36.0, 4.37.1, 4.39.1, 4.43.1, 5.2.3, 5.2.10, 5.2.15, 5.3.0, 5.5.1, 5.8.9, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 3.3.2, 3.1.0, 3.30.4, 4.35.3, 1.7.0-beta.4a, 2.1.2, 2.0.0-dev13, 4.20.0, 4.22.1, 4.38.0, 2.0.0-rc2, 3.15.0, 3.25.1, 4.7.0, 4.7.5, 4.10.0, 4.13.11, 4.20.1, 4.22.16, 4.35.4, 4.36.1, 4.37.3, 4.37.2, 4.37.10, 4.37.5, 4.37.9, 4.42.0, 4.41.0, 4.44.2, 4.44.0, 4.44.1, 5.2.5, 5.2.4, 5.2.13, 5.5.0, 5.6.1, 5.7.2, 5.7.1, 5.8.2, 5.8.1, 5.8.8, 5.8.6, 1.3.2, 4.7.1, 1.5.0-alpha, 1.1.1, 4.23.2, 5.8.5, 2.0.0-rc5, 3.3.1, 3.24.6, 3.27.0, 4.1.0, 2.0.0, 1.1.3, 4.8.1, 6.21.2, 6.21.1, 6.20.1, 6.15.0, 6.16.2, 6.14.1, 6.12.5, 6.28.0, 6.27.0, 6.25.3, 6.23.2, 6.22.1, 6.20.0, 6.21.4, 6.21.3, 6.13.0, 6.21.0, 6.23.1, 6.19.1, 6.19.2, 6.18.0, 6.15.1, 6.16.3, 6.23.0, 6.21.6, 6.19.0, 6.17.0, 6.16.1, 6.16.0, 6.14.0, 6.25.7, 6.25.0, 6.22.0, 6.21.5, 6.5.1, 6.4.0, 6.0.0-beta.4, 5.22.1, 5.15.0, 5.21.10, 5.21.13, 5.19.4, 5.17.0, 5.16.0, 5.12.2, 5.12.1, 6.25.6, 6.25.4, 6.6.1, 5.21.1, 5.0.0-beta.5, 5.0.0-beta.9, 5.0.0-beta.16, 5.0.0-beta.17, 5.8.12, 5.9.5, 5.20.0, 6.1.0, 5.18.0, 4.44.3, 5.8.11, 6.2.3, 6.3.0, 6.10.0, 6.12.4, 5.0.0-beta.4, 5.0.0-beta.6, 5.0.0-beta.10, 5.0.0-beta.13, 5.9.1, 5.9.2, 5.9.4, 5.10.3, 5.11.0, 5.12.3, 5.13.1, 5.15.1, 5.15.2, 5.17.2, 5.18.3, 5.19.0, 5.19.2, 5.19.6, 5.19.8, 5.21.5, 5.21.9, 5.22.4, 6.0.0-beta.1, 6.0.0-beta.2, 6.0.0-beta.6, 6.2.0, 6.3.1, 6.3.4, 6.6.2, 6.9.0, 6.12.0-alpha.1, 6.12.0-beta.2, 6.12.0, 6.12.2, 6.12.3, 6.25.2, 6.25.8, 6.3.5, 5.0.0-beta.7, 5.18.2, 5.22.0, 6.24.0, 6.26.0, 5.18.4, 5.0.0-beta.11, 5.19.5, 3.35.1, 5.21.12, 5.10.1, 5.21.2, 6.8.0, 5.0.0-beta.3, 5.21.11, 6.2.4, 6.3.2, 5.0.0-beta.12, 5.9.3, 6.1.1, 5.19.3, 5.0.0-beta.1, 5.0.0-beta, 5.19.7, 6.0.0-beta.3, 6.25.5, 6.2.1, 5.0.0-beta.8, 5.0.0-beta.14, 5.10.0, 5.12.0, 5.13.0, 5.17.1, 5.21.0, 5.21.3, 5.21.4, 5.21.6, 5.21.8, 5.22.2, 5.22.3, 6.0.0-beta.5, 6.0.0-beta.7, 6.2.2, 6.3.3, 6.5.0, 6.6.0, 6.6.4, 6.6.5, 6.7.0, 6.11.0, 6.12.0-beta.1, 6.12.0-beta.3, 5.18.1, 6.25.1, 4.44.4, 5.0.0-beta.2, 5.10.2, 5.14.0, 5.19.1, 5.21.7, 5.22.5, 6.12.1, 5.9.0, 5.0.0-beta.15
(Show all)
|
Major → 6.29.0 |
CVE-2023-22579 |
Due to improper parameter filtering in the sequalize js library, can a attacker peform injection. |
3.14.2,
5.8.10,
4.30.0,
4.29.1,
4.28.6,
4.28.5,
4.28.2,
4.25.2
, 4.22.14, 4.22.11, 4.22.10, 4.13.12, 4.15.1, 4.13.7, 4.11.6, 4.10.1, 4.4.8, 4.4.3, 4.4.0, 4.2.1, 3.33.0, 4.0.0, 3.31.2, 3.23.0, 3.20.0, 3.19.2, 3.30.2, 3.23.6, 3.28.0, 3.17.2, 3.14.1, 3.17.0, 3.13.0, 3.7.1, 3.8.0, 2.0.0-beta.1, 2.0.0-beta.3, 2.0.5, 2.0.0-dev7, 2.0.0-dev6, 2.0.0-dev3, 2.0.0-alpha3, 1.7.7, 1.7.2, 1.7.0-rc7, 1.7.0-rc6, 1.7.0-rc5, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 4.35.0, 4.35.5, 4.41.1, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 5.0.0-0, 2.0.0-rc7, 3.19.1, 2.0.0-dev5, 2.1.3, 3.24.3, 3.31.0, 3.34.0, 4.0.0-0, 4.0.0-2, 4.3.0, 4.4.7, 4.5.0, 4.11.0, 4.11.3, 4.13.9, 4.14.0, 4.16.1, 4.22.0, 4.22.7, 4.25.1, 4.28.8, 4.28.7, 4.37.6, 4.37.7, 4.43.2, 5.7.4, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 3.30.3, 4.22.2, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 4.9.0, 4.10.2, 4.10.3, 4.11.1, 4.11.2, 4.13.14, 4.13.15, 4.16.0, 4.17.2, 4.22.4, 4.22.9, 4.22.13, 4.23.0, 4.32.1, 4.32.4, 4.32.6, 4.35.2, 5.2.2, 5.7.3, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-dev1, 2.0.0-dev8, 2.0.0-dev9, 2.0.0-rc3, 2.0.0-rc8, 2.0.2, 2.0.4, 2.1.1, 2.1.0, 3.4.0, 3.0.0, 3.7.0, 3.1.1, 5.8.7, 5.8.4, 5.8.3, 5.8.0, 5.7.6, 5.7.0, 5.3.3, 5.2.9, 5.2.8, 5.2.7, 5.2.6, 5.2.0, 5.1.1, 3.11.0, 4.40.0, 4.38.1, 4.32.7, 4.31.1, 4.30.2, 3.14.0, 3.15.1, 3.17.3, 3.23.1, 3.24.0, 4.4.4, 4.4.9, 4.22.5, 4.23.3, 4.27.0, 4.28.4, 4.32.0, 4.32.3, 4.33.0, 4.41.2, 5.2.11, 5.2.1, 5.2.12, 5.2.14, 5.3.1, 5.7.5, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 2.0.0-dev10, 3.2.0, 3.10.0, 3.24.4, 3.24.5, 3.24.8, 3.25.0, 3.29.0, 3.31.1, 4.4.5, 4.4.6, 4.7.4, 4.8.3, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 3.12.2, 3.26.0, 3.30.1, 4.15.0, 4.29.0, 4.32.2, 5.3.2, 4.37.4, 5.1.0, 4.13.6, 4.13.13, 3.17.1, 3.3.0, 4.13.17, 4.17.0, 4.21.0, 3.24.1, 4.22.15, 5.4.0, 5.6.0, 1.7.0-rc3, 1.7.11, 3.18.0, 2.0.0-dev12, 2.0.0-beta.8, 3.19.3, 4.3.2, 4.11.5, 4.13.1, 3.22.0, 1.6.0-beta4, 3.23.2, 3.4.1, 0.4.2, 1.6.0-beta-3, 3.12.0, 4.18.0, 4.39.0, 3.24.2, 4.4.1, 4.23.1, 4.42.1, 5.3.4, 3.19.0, 4.11.7, 4.13.3, 4.2.0, 4.4.2, 4.7.2, 4.8.2, 4.13.2, 4.12.0, 4.13.10, 4.13.16, 4.17.1, 4.20.3, 4.22.6, 4.25.0, 4.28.1, 4.28.0, 4.30.1, 4.37.0, 4.43.0, 4.29.3, 0.4.0, 2.0.0-beta.5, 4.32.5, 4.8.4, 3.5.0, 0.4.3, 4.13.4, 4.33.3, 4.35.1, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 3.23.4, 1.6.0-alpha-1, 1.7.0-rc4, 4.22.3, 4.7.3, 1.7.0-beta.5, 1.3.0, 1.0.2, 3.16.0, 3.23.5, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 2.0.0-dev11, 2.0.3, 4.13.5, 4.19.0, 4.37.8, 4.22.12, 5.3.5, 3.30.0, 4.20.2, 1.7.0-beta.1, 4.22.8, 4.23.4, 4.13.0, 4.24.0, 4.26.0, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 2.0.0-dev2, 2.0.0-dev4, 2.0.1, 3.6.0, 3.5.1, 3.12.1, 2.0.6, 3.0.1, 3.9.0, 3.21.0, 3.23.3, 3.24.7, 3.32.1, 3.35.0, 4.0.0-1, 4.3.1, 4.4.10, 4.6.0, 4.8.0, 4.11.4, 4.13.8, 4.15.2, 4.16.2, 4.28.3, 4.29.2, 4.31.0, 4.31.2, 4.33.1, 4.34.0, 4.34.1, 4.33.2, 4.33.4, 4.36.0, 4.37.1, 4.39.1, 4.43.1, 5.2.3, 5.2.10, 5.2.15, 5.3.0, 5.5.1, 5.8.9, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 3.3.2, 3.1.0, 3.30.4, 4.35.3, 1.7.0-beta.4a, 2.1.2, 2.0.0-dev13, 4.20.0, 4.22.1, 4.38.0, 2.0.0-rc2, 3.15.0, 3.25.1, 4.7.0, 4.7.5, 4.10.0, 4.13.11, 4.20.1, 4.22.16, 4.35.4, 4.36.1, 4.37.3, 4.37.2, 4.37.10, 4.37.5, 4.37.9, 4.42.0, 4.41.0, 4.44.2, 4.44.0, 4.44.1, 5.2.5, 5.2.4, 5.2.13, 5.5.0, 5.6.1, 5.7.2, 5.7.1, 5.8.2, 5.8.1, 5.8.8, 5.8.6, 1.3.2, 4.7.1, 1.5.0-alpha, 1.1.1, 4.23.2, 5.8.5, 2.0.0-rc5, 3.3.1, 3.24.6, 3.27.0, 4.1.0, 2.0.0, 1.1.3, 4.8.1, 6.21.2, 6.21.1, 6.20.1, 6.15.0, 6.16.2, 6.14.1, 6.12.5, 6.28.0, 6.27.0, 6.25.3, 6.23.2, 6.22.1, 6.20.0, 6.21.4, 6.21.3, 6.13.0, 6.21.0, 6.23.1, 6.19.1, 6.19.2, 6.18.0, 6.15.1, 6.16.3, 6.23.0, 6.21.6, 6.19.0, 6.17.0, 6.16.1, 6.16.0, 6.14.0, 6.25.7, 6.25.0, 6.22.0, 6.21.5, 6.5.1, 6.4.0, 6.0.0-beta.4, 5.22.1, 5.15.0, 5.21.10, 5.21.13, 5.19.4, 5.17.0, 5.16.0, 5.12.2, 5.12.1, 6.25.6, 6.25.4, 6.6.1, 5.21.1, 5.0.0-beta.5, 5.0.0-beta.9, 5.0.0-beta.16, 5.0.0-beta.17, 5.8.12, 5.9.5, 5.20.0, 6.1.0, 5.18.0, 4.44.3, 5.8.11, 6.2.3, 6.3.0, 6.10.0, 6.12.4, 5.0.0-beta.4, 5.0.0-beta.6, 5.0.0-beta.10, 5.0.0-beta.13, 5.9.1, 5.9.2, 5.9.4, 5.10.3, 5.11.0, 5.12.3, 5.13.1, 5.15.1, 5.15.2, 5.17.2, 5.18.3, 5.19.0, 5.19.2, 5.19.6, 5.19.8, 5.21.5, 5.21.9, 5.22.4, 6.0.0-beta.1, 6.0.0-beta.2, 6.0.0-beta.6, 6.2.0, 6.3.1, 6.3.4, 6.6.2, 6.9.0, 6.12.0-alpha.1, 6.12.0-beta.2, 6.12.0, 6.12.2, 6.12.3, 6.25.2, 6.25.8, 6.3.5, 5.0.0-beta.7, 5.18.2, 5.22.0, 6.24.0, 6.26.0, 5.18.4, 5.0.0-beta.11, 5.19.5, 3.35.1, 5.21.12, 5.10.1, 5.21.2, 6.8.0, 5.0.0-beta.3, 5.21.11, 6.2.4, 6.3.2, 5.0.0-beta.12, 5.9.3, 6.1.1, 5.19.3, 5.0.0-beta.1, 5.0.0-beta, 5.19.7, 6.0.0-beta.3, 6.25.5, 6.2.1, 5.0.0-beta.8, 5.0.0-beta.14, 5.10.0, 5.12.0, 5.13.0, 5.17.1, 5.21.0, 5.21.3, 5.21.4, 5.21.6, 5.21.8, 5.22.2, 5.22.3, 6.0.0-beta.5, 6.0.0-beta.7, 6.2.2, 6.3.3, 6.5.0, 6.6.0, 6.6.4, 6.6.5, 6.7.0, 6.11.0, 6.12.0-beta.1, 6.12.0-beta.3, 5.18.1, 6.25.1, 4.44.4, 5.0.0-beta.2, 5.10.2, 5.14.0, 5.19.1, 5.21.7, 5.22.5, 6.12.1, 5.9.0, 5.0.0-beta.15
(Show all)
|
Major → 6.29.0 |
CVE-2023-22578 |
Due to improper artibute filtering in the sequalize js library, can a attacker peform SQL injections. |
3.14.2,
5.8.10,
4.30.0,
4.29.1,
4.28.6,
4.28.5,
4.28.2,
4.25.2
, 4.22.14, 4.22.11, 4.22.10, 4.13.12, 4.15.1, 4.13.7, 4.11.6, 4.10.1, 4.4.8, 4.4.3, 4.4.0, 4.2.1, 3.33.0, 4.0.0, 3.31.2, 3.23.0, 3.20.0, 3.19.2, 3.30.2, 3.23.6, 3.28.0, 3.17.2, 3.14.1, 3.17.0, 3.13.0, 3.7.1, 3.8.0, 2.0.0-beta.1, 2.0.0-beta.3, 2.0.5, 2.0.0-dev7, 2.0.0-dev6, 2.0.0-dev3, 2.0.0-alpha3, 1.7.7, 1.7.2, 1.7.0-rc7, 1.7.0-rc6, 1.7.0-rc5, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 4.35.0, 4.35.5, 4.41.1, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 5.0.0-0, 2.0.0-rc7, 3.19.1, 2.0.0-dev5, 2.1.3, 3.24.3, 3.31.0, 3.34.0, 4.0.0-0, 4.0.0-2, 4.3.0, 4.4.7, 4.5.0, 4.11.0, 4.11.3, 4.13.9, 4.14.0, 4.16.1, 4.22.0, 4.22.7, 4.25.1, 4.28.8, 4.28.7, 4.37.6, 4.37.7, 4.43.2, 5.7.4, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 3.30.3, 4.22.2, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 4.9.0, 4.10.2, 4.10.3, 4.11.1, 4.11.2, 4.13.14, 4.13.15, 4.16.0, 4.17.2, 4.22.4, 4.22.9, 4.22.13, 4.23.0, 4.32.1, 4.32.4, 4.32.6, 4.35.2, 5.2.2, 5.7.3, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-dev1, 2.0.0-dev8, 2.0.0-dev9, 2.0.0-rc3, 2.0.0-rc8, 2.0.2, 2.0.4, 2.1.1, 2.1.0, 3.4.0, 3.0.0, 3.7.0, 3.1.1, 5.8.7, 5.8.4, 5.8.3, 5.8.0, 5.7.6, 5.7.0, 5.3.3, 5.2.9, 5.2.8, 5.2.7, 5.2.6, 5.2.0, 5.1.1, 3.11.0, 4.40.0, 4.38.1, 4.32.7, 4.31.1, 4.30.2, 3.14.0, 3.15.1, 3.17.3, 3.23.1, 3.24.0, 4.4.4, 4.4.9, 4.22.5, 4.23.3, 4.27.0, 4.28.4, 4.32.0, 4.32.3, 4.33.0, 4.41.2, 5.2.11, 5.2.1, 5.2.12, 5.2.14, 5.3.1, 5.7.5, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 2.0.0-dev10, 3.2.0, 3.10.0, 3.24.4, 3.24.5, 3.24.8, 3.25.0, 3.29.0, 3.31.1, 4.4.5, 4.4.6, 4.7.4, 4.8.3, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 3.12.2, 3.26.0, 3.30.1, 4.15.0, 4.29.0, 4.32.2, 5.3.2, 4.37.4, 5.1.0, 4.13.6, 4.13.13, 3.17.1, 3.3.0, 4.13.17, 4.17.0, 4.21.0, 3.24.1, 4.22.15, 5.4.0, 5.6.0, 1.7.0-rc3, 1.7.11, 3.18.0, 2.0.0-dev12, 2.0.0-beta.8, 3.19.3, 4.3.2, 4.11.5, 4.13.1, 3.22.0, 1.6.0-beta4, 3.23.2, 3.4.1, 0.4.2, 1.6.0-beta-3, 3.12.0, 4.18.0, 4.39.0, 3.24.2, 4.4.1, 4.23.1, 4.42.1, 5.3.4, 3.19.0, 4.11.7, 4.13.3, 4.2.0, 4.4.2, 4.7.2, 4.8.2, 4.13.2, 4.12.0, 4.13.10, 4.13.16, 4.17.1, 4.20.3, 4.22.6, 4.25.0, 4.28.1, 4.28.0, 4.30.1, 4.37.0, 4.43.0, 4.29.3, 0.4.0, 2.0.0-beta.5, 4.32.5, 4.8.4, 3.5.0, 0.4.3, 4.13.4, 4.33.3, 4.35.1, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 3.23.4, 1.6.0-alpha-1, 1.7.0-rc4, 4.22.3, 4.7.3, 1.7.0-beta.5, 1.3.0, 1.0.2, 3.16.0, 3.23.5, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 2.0.0-dev11, 2.0.3, 4.13.5, 4.19.0, 4.37.8, 4.22.12, 5.3.5, 3.30.0, 4.20.2, 1.7.0-beta.1, 4.22.8, 4.23.4, 4.13.0, 4.24.0, 4.26.0, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 2.0.0-dev2, 2.0.0-dev4, 2.0.1, 3.6.0, 3.5.1, 3.12.1, 2.0.6, 3.0.1, 3.9.0, 3.21.0, 3.23.3, 3.24.7, 3.32.1, 3.35.0, 4.0.0-1, 4.3.1, 4.4.10, 4.6.0, 4.8.0, 4.11.4, 4.13.8, 4.15.2, 4.16.2, 4.28.3, 4.29.2, 4.31.0, 4.31.2, 4.33.1, 4.34.0, 4.34.1, 4.33.2, 4.33.4, 4.36.0, 4.37.1, 4.39.1, 4.43.1, 5.2.3, 5.2.10, 5.2.15, 5.3.0, 5.5.1, 5.8.9, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 3.3.2, 3.1.0, 3.30.4, 4.35.3, 1.7.0-beta.4a, 2.1.2, 2.0.0-dev13, 4.20.0, 4.22.1, 4.38.0, 2.0.0-rc2, 3.15.0, 3.25.1, 4.7.0, 4.7.5, 4.10.0, 4.13.11, 4.20.1, 4.22.16, 4.35.4, 4.36.1, 4.37.3, 4.37.2, 4.37.10, 4.37.5, 4.37.9, 4.42.0, 4.41.0, 4.44.2, 4.44.0, 4.44.1, 5.2.5, 5.2.4, 5.2.13, 5.5.0, 5.6.1, 5.7.2, 5.7.1, 5.8.2, 5.8.1, 5.8.8, 5.8.6, 1.3.2, 4.7.1, 1.5.0-alpha, 1.1.1, 4.23.2, 5.8.5, 2.0.0-rc5, 3.3.1, 3.24.6, 3.27.0, 4.1.0, 2.0.0, 1.1.3, 4.8.1, 6.21.2, 6.21.1, 6.20.1, 6.15.0, 6.16.2, 6.14.1, 6.12.5, 6.28.0, 6.27.0, 6.25.3, 6.23.2, 6.22.1, 6.20.0, 6.21.4, 6.21.3, 6.13.0, 6.21.0, 6.28.1, 6.23.1, 6.19.1, 6.19.2, 6.18.0, 6.15.1, 6.16.3, 6.23.0, 6.21.6, 6.19.0, 6.17.0, 6.16.1, 6.16.0, 6.14.0, 6.25.7, 6.25.0, 6.22.0, 6.21.5, 6.5.1, 6.4.0, 6.0.0-beta.4, 5.22.1, 5.15.0, 5.21.10, 5.21.13, 5.19.4, 5.17.0, 5.16.0, 5.12.2, 5.12.1, 6.25.6, 6.25.4, 6.6.1, 5.21.1, 5.0.0-beta.5, 5.0.0-beta.9, 5.0.0-beta.16, 5.0.0-beta.17, 5.8.12, 5.9.5, 5.20.0, 6.1.0, 5.18.0, 4.44.3, 5.8.11, 6.2.3, 6.3.0, 6.10.0, 6.12.4, 5.0.0-beta.4, 5.0.0-beta.6, 5.0.0-beta.10, 5.0.0-beta.13, 5.9.1, 5.9.2, 5.9.4, 5.10.3, 5.11.0, 5.12.3, 5.13.1, 5.15.1, 5.15.2, 5.17.2, 5.18.3, 5.19.0, 5.19.2, 5.19.6, 5.19.8, 5.21.5, 5.21.9, 5.22.4, 6.0.0-beta.1, 6.0.0-beta.2, 6.0.0-beta.6, 6.2.0, 6.3.1, 6.3.4, 6.6.2, 6.9.0, 6.12.0-alpha.1, 6.12.0-beta.2, 6.12.0, 6.12.2, 6.12.3, 6.25.2, 6.25.8, 6.3.5, 5.0.0-beta.7, 5.18.2, 5.22.0, 6.24.0, 6.26.0, 5.18.4, 5.0.0-beta.11, 5.19.5, 3.35.1, 5.21.12, 5.10.1, 5.21.2, 6.8.0, 5.0.0-beta.3, 5.21.11, 6.2.4, 6.3.2, 5.0.0-beta.12, 5.9.3, 6.1.1, 5.19.3, 6.28.2, 5.0.0-beta.1, 5.0.0-beta, 5.19.7, 6.0.0-beta.3, 6.25.5, 6.2.1, 5.0.0-beta.8, 5.0.0-beta.14, 5.10.0, 5.12.0, 5.13.0, 5.17.1, 5.21.0, 5.21.3, 5.21.4, 5.21.6, 5.21.8, 5.22.2, 5.22.3, 6.0.0-beta.5, 6.0.0-beta.7, 6.2.2, 6.3.3, 6.5.0, 6.6.0, 6.6.4, 6.6.5, 6.7.0, 6.11.0, 6.12.0-beta.1, 6.12.0-beta.3, 5.18.1, 6.25.1, 4.44.4, 5.0.0-beta.2, 5.10.2, 5.14.0, 5.19.1, 5.21.7, 5.22.5, 6.12.1, 5.9.0, 5.0.0-beta.15
(Show all)
|
Major → 6.29.0 |
CVE-2019-11069 |
Sequelize version 5 before 5.3.0 does not properly ensure that standard conforming strings are used. |
5.0.0-0,
5.2.2,
5.2.9,
5.2.8,
5.2.7,
5.2.6,
5.2.0,
5.1.1
, 5.2.11, 5.2.1, 5.2.12, 5.2.14, 5.1.0, 5.2.3, 5.2.10, 5.2.15, 5.2.5, 5.2.4, 5.2.13
(Show all)
|
Major → 6.29.0 |
CVE-2019-10752 |
Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite. |
3.14.2,
5.8.10,
4.30.0,
4.29.1,
4.28.6,
4.28.5,
4.28.2,
4.25.2
, 4.22.14, 4.22.11, 4.22.10, 4.13.12, 4.15.1, 4.13.7, 4.11.6, 4.10.1, 4.4.8, 4.4.3, 4.4.0, 4.2.1, 3.33.0, 4.0.0, 3.31.2, 3.23.0, 3.20.0, 3.19.2, 3.30.2, 3.23.6, 3.28.0, 3.17.2, 3.14.1, 3.17.0, 3.13.0, 3.7.1, 3.8.0, 2.0.0-beta.1, 2.0.0-beta.3, 2.0.5, 2.0.0-dev7, 2.0.0-dev6, 2.0.0-dev3, 2.0.0-alpha3, 1.7.7, 1.7.2, 1.7.0-rc7, 1.7.0-rc6, 1.7.0-rc5, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 4.35.0, 4.35.5, 4.41.1, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 5.0.0-0, 2.0.0-rc7, 3.19.1, 2.0.0-dev5, 2.1.3, 3.24.3, 3.31.0, 3.34.0, 4.0.0-0, 4.0.0-2, 4.3.0, 4.4.7, 4.5.0, 4.11.0, 4.11.3, 4.13.9, 4.14.0, 4.16.1, 4.22.0, 4.22.7, 4.25.1, 4.28.8, 4.28.7, 4.37.6, 4.37.7, 4.43.2, 5.7.4, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 3.30.3, 4.22.2, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 4.9.0, 4.10.2, 4.10.3, 4.11.1, 4.11.2, 4.13.14, 4.13.15, 4.16.0, 4.17.2, 4.22.4, 4.22.9, 4.22.13, 4.23.0, 4.32.1, 4.32.4, 4.32.6, 4.35.2, 5.2.2, 5.7.3, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-dev1, 2.0.0-dev8, 2.0.0-dev9, 2.0.0-rc3, 2.0.0-rc8, 2.0.2, 2.0.4, 2.1.1, 2.1.0, 3.4.0, 3.0.0, 3.7.0, 3.1.1, 5.8.7, 5.8.4, 5.8.3, 5.8.0, 5.7.6, 5.7.0, 5.3.3, 5.2.9, 5.2.8, 5.2.7, 5.2.6, 5.2.0, 5.1.1, 3.11.0, 4.40.0, 4.38.1, 4.32.7, 4.31.1, 4.30.2, 3.14.0, 3.15.1, 3.17.3, 3.23.1, 3.24.0, 4.4.4, 4.4.9, 4.22.5, 4.23.3, 4.27.0, 4.28.4, 4.32.0, 4.32.3, 4.33.0, 4.41.2, 5.2.11, 5.2.1, 5.2.12, 5.2.14, 5.3.1, 5.7.5, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 2.0.0-dev10, 3.2.0, 3.10.0, 3.24.4, 3.24.5, 3.24.8, 3.25.0, 3.29.0, 3.31.1, 4.4.5, 4.4.6, 4.7.4, 4.8.3, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 3.12.2, 3.26.0, 3.30.1, 4.15.0, 4.29.0, 4.32.2, 5.3.2, 4.37.4, 5.1.0, 4.13.6, 4.13.13, 3.17.1, 3.3.0, 4.13.17, 4.17.0, 4.21.0, 3.24.1, 4.22.15, 5.4.0, 5.6.0, 1.7.0-rc3, 1.7.11, 3.18.0, 2.0.0-dev12, 2.0.0-beta.8, 3.19.3, 4.3.2, 4.11.5, 4.13.1, 3.22.0, 1.6.0-beta4, 3.23.2, 3.4.1, 0.4.2, 1.6.0-beta-3, 3.12.0, 4.18.0, 4.39.0, 3.24.2, 4.4.1, 4.23.1, 4.42.1, 5.3.4, 3.19.0, 4.11.7, 4.13.3, 4.2.0, 4.4.2, 4.7.2, 4.8.2, 4.13.2, 4.12.0, 4.13.10, 4.13.16, 4.17.1, 4.20.3, 4.22.6, 4.25.0, 4.28.1, 4.28.0, 4.30.1, 4.37.0, 4.43.0, 4.29.3, 0.4.0, 2.0.0-beta.5, 4.32.5, 4.8.4, 3.5.0, 0.4.3, 4.13.4, 4.33.3, 4.35.1, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 3.23.4, 1.6.0-alpha-1, 1.7.0-rc4, 4.22.3, 4.7.3, 1.7.0-beta.5, 1.3.0, 1.0.2, 3.16.0, 3.23.5, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 2.0.0-dev11, 2.0.3, 4.13.5, 4.19.0, 4.37.8, 4.22.12, 5.3.5, 3.30.0, 4.20.2, 1.7.0-beta.1, 4.22.8, 4.23.4, 4.13.0, 4.24.0, 4.26.0, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 2.0.0-dev2, 2.0.0-dev4, 2.0.1, 3.6.0, 3.5.1, 3.12.1, 2.0.6, 3.0.1, 3.9.0, 3.21.0, 3.23.3, 3.24.7, 3.32.1, 3.35.0, 4.0.0-1, 4.3.1, 4.4.10, 4.6.0, 4.8.0, 4.11.4, 4.13.8, 4.15.2, 4.16.2, 4.28.3, 4.29.2, 4.31.0, 4.31.2, 4.33.1, 4.34.0, 4.34.1, 4.33.2, 4.33.4, 4.36.0, 4.37.1, 4.39.1, 4.43.1, 5.2.3, 5.2.10, 5.2.15, 5.3.0, 5.5.1, 5.8.9, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 3.3.2, 3.1.0, 3.30.4, 4.35.3, 1.7.0-beta.4a, 2.1.2, 2.0.0-dev13, 4.20.0, 4.22.1, 4.38.0, 2.0.0-rc2, 3.15.0, 3.25.1, 4.7.0, 4.7.5, 4.10.0, 4.13.11, 4.20.1, 4.22.16, 4.35.4, 4.36.1, 4.37.3, 4.37.2, 4.37.10, 4.37.5, 4.37.9, 4.42.0, 4.41.0, 4.44.2, 4.44.0, 4.44.1, 5.2.5, 5.2.4, 5.2.13, 5.5.0, 5.6.1, 5.7.2, 5.7.1, 5.8.2, 5.8.1, 5.8.8, 5.8.6, 1.3.2, 4.7.1, 1.5.0-alpha, 1.1.1, 4.23.2, 5.8.5, 2.0.0-rc5, 3.3.1, 3.24.6, 3.27.0, 4.1.0, 2.0.0, 1.1.3, 4.8.1, 5.15.0, 5.12.2, 5.12.1, 5.8.12, 5.9.5, 5.8.11, 5.9.1, 5.9.2, 5.9.4, 5.10.3, 5.11.0, 5.12.3, 5.13.1, 3.35.1, 5.10.1, 5.9.3, 5.10.0, 5.12.0, 5.13.0, 5.10.2, 5.14.0, 5.9.0
(Show all)
|
Major → 6.29.0 |
CVE-2019-10749 |
sequelize before version 3.35.1 allows attackers to perform a SQL Injection due to the JSON path keys not being properly sanitized in the Postgres dialect. |
3.14.2,
3.33.0,
3.31.2,
3.23.0,
3.20.0,
3.19.2,
3.30.2,
3.23.6
, 3.28.0, 3.17.2, 3.14.1, 3.17.0, 3.13.0, 3.7.1, 3.8.0, 2.0.0-beta.1, 2.0.0-beta.3, 2.0.5, 2.0.0-dev7, 2.0.0-dev6, 2.0.0-dev3, 2.0.0-alpha3, 1.7.7, 1.7.2, 1.7.0-rc7, 1.7.0-rc6, 1.7.0-rc5, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 2.0.0-rc7, 3.19.1, 2.0.0-dev5, 2.1.3, 3.24.3, 3.31.0, 3.34.0, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 3.30.3, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-dev1, 2.0.0-dev8, 2.0.0-dev9, 2.0.0-rc3, 2.0.0-rc8, 2.0.2, 2.0.4, 2.1.1, 2.1.0, 3.4.0, 3.0.0, 3.7.0, 3.1.1, 3.11.0, 3.14.0, 3.15.1, 3.17.3, 3.23.1, 3.24.0, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 2.0.0-dev10, 3.2.0, 3.10.0, 3.24.4, 3.24.5, 3.24.8, 3.25.0, 3.29.0, 3.31.1, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 3.12.2, 3.26.0, 3.30.1, 3.17.1, 3.3.0, 3.24.1, 1.7.0-rc3, 1.7.11, 3.18.0, 2.0.0-dev12, 2.0.0-beta.8, 3.19.3, 3.22.0, 1.6.0-beta4, 3.23.2, 3.4.1, 0.4.2, 1.6.0-beta-3, 3.12.0, 3.24.2, 3.19.0, 0.4.0, 2.0.0-beta.5, 3.5.0, 0.4.3, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 3.23.4, 1.6.0-alpha-1, 1.7.0-rc4, 1.7.0-beta.5, 1.3.0, 1.0.2, 3.16.0, 3.23.5, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 2.0.0-dev11, 2.0.3, 3.30.0, 1.7.0-beta.1, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 2.0.0-dev2, 2.0.0-dev4, 2.0.1, 3.6.0, 3.5.1, 3.12.1, 2.0.6, 3.0.1, 3.9.0, 3.21.0, 3.23.3, 3.24.7, 3.32.1, 3.35.0, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 3.3.2, 3.1.0, 3.30.4, 1.7.0-beta.4a, 2.1.2, 2.0.0-dev13, 2.0.0-rc2, 3.15.0, 3.25.1, 1.3.2, 1.5.0-alpha, 1.1.1, 2.0.0-rc5, 3.3.1, 3.24.6, 3.27.0, 2.0.0, 1.1.3
(Show all)
|
Major → 6.29.0 |
CVE-2019-10748 |
Sequelize all versions prior to 3.35.1, 4.44.3, and 5.8.11 are vulnerable to SQL Injection due to JSON path keys not being properly escaped for the MySQL/MariaDB dialects. |
3.14.2,
5.8.10,
4.30.0,
4.29.1,
4.28.6,
4.28.5,
4.28.2,
4.25.2
, 4.22.14, 4.22.11, 4.22.10, 4.13.12, 4.15.1, 4.13.7, 4.11.6, 4.10.1, 4.4.8, 4.4.3, 4.4.0, 4.2.1, 3.33.0, 4.0.0, 3.31.2, 3.23.0, 3.20.0, 3.19.2, 3.30.2, 3.23.6, 3.28.0, 3.17.2, 3.14.1, 3.17.0, 3.13.0, 3.7.1, 3.8.0, 2.0.0-beta.1, 2.0.0-beta.3, 2.0.5, 2.0.0-dev7, 2.0.0-dev6, 2.0.0-dev3, 2.0.0-alpha3, 1.7.7, 1.7.2, 1.7.0-rc7, 1.7.0-rc6, 1.7.0-rc5, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 4.35.0, 4.35.5, 4.41.1, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 5.0.0-0, 2.0.0-rc7, 3.19.1, 2.0.0-dev5, 2.1.3, 3.24.3, 3.31.0, 3.34.0, 4.0.0-0, 4.0.0-2, 4.3.0, 4.4.7, 4.5.0, 4.11.0, 4.11.3, 4.13.9, 4.14.0, 4.16.1, 4.22.0, 4.22.7, 4.25.1, 4.28.8, 4.28.7, 4.37.6, 4.37.7, 4.43.2, 5.7.4, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 3.30.3, 4.22.2, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 4.9.0, 4.10.2, 4.10.3, 4.11.1, 4.11.2, 4.13.14, 4.13.15, 4.16.0, 4.17.2, 4.22.4, 4.22.9, 4.22.13, 4.23.0, 4.32.1, 4.32.4, 4.32.6, 4.35.2, 5.2.2, 5.7.3, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-dev1, 2.0.0-dev8, 2.0.0-dev9, 2.0.0-rc3, 2.0.0-rc8, 2.0.2, 2.0.4, 2.1.1, 2.1.0, 3.4.0, 3.0.0, 3.7.0, 3.1.1, 5.8.7, 5.8.4, 5.8.3, 5.8.0, 5.7.6, 5.7.0, 5.3.3, 5.2.9, 5.2.8, 5.2.7, 5.2.6, 5.2.0, 5.1.1, 3.11.0, 4.40.0, 4.38.1, 4.32.7, 4.31.1, 4.30.2, 3.14.0, 3.15.1, 3.17.3, 3.23.1, 3.24.0, 4.4.4, 4.4.9, 4.22.5, 4.23.3, 4.27.0, 4.28.4, 4.32.0, 4.32.3, 4.33.0, 4.41.2, 5.2.11, 5.2.1, 5.2.12, 5.2.14, 5.3.1, 5.7.5, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 2.0.0-dev10, 3.2.0, 3.10.0, 3.24.4, 3.24.5, 3.24.8, 3.25.0, 3.29.0, 3.31.1, 4.4.5, 4.4.6, 4.7.4, 4.8.3, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 3.12.2, 3.26.0, 3.30.1, 4.15.0, 4.29.0, 4.32.2, 5.3.2, 4.37.4, 5.1.0, 4.13.6, 4.13.13, 3.17.1, 3.3.0, 4.13.17, 4.17.0, 4.21.0, 3.24.1, 4.22.15, 5.4.0, 5.6.0, 1.7.0-rc3, 1.7.11, 3.18.0, 2.0.0-dev12, 2.0.0-beta.8, 3.19.3, 4.3.2, 4.11.5, 4.13.1, 3.22.0, 1.6.0-beta4, 3.23.2, 3.4.1, 0.4.2, 1.6.0-beta-3, 3.12.0, 4.18.0, 4.39.0, 3.24.2, 4.4.1, 4.23.1, 4.42.1, 5.3.4, 3.19.0, 4.11.7, 4.13.3, 4.2.0, 4.4.2, 4.7.2, 4.8.2, 4.13.2, 4.12.0, 4.13.10, 4.13.16, 4.17.1, 4.20.3, 4.22.6, 4.25.0, 4.28.1, 4.28.0, 4.30.1, 4.37.0, 4.43.0, 4.29.3, 0.4.0, 2.0.0-beta.5, 4.32.5, 4.8.4, 3.5.0, 0.4.3, 4.13.4, 4.33.3, 4.35.1, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 3.23.4, 1.6.0-alpha-1, 1.7.0-rc4, 4.22.3, 4.7.3, 1.7.0-beta.5, 1.3.0, 1.0.2, 3.16.0, 3.23.5, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 2.0.0-dev11, 2.0.3, 4.13.5, 4.19.0, 4.37.8, 4.22.12, 5.3.5, 3.30.0, 4.20.2, 1.7.0-beta.1, 4.22.8, 4.23.4, 4.13.0, 4.24.0, 4.26.0, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 2.0.0-dev2, 2.0.0-dev4, 2.0.1, 3.6.0, 3.5.1, 3.12.1, 2.0.6, 3.0.1, 3.9.0, 3.21.0, 3.23.3, 3.24.7, 3.32.1, 3.35.0, 4.0.0-1, 4.3.1, 4.4.10, 4.6.0, 4.8.0, 4.11.4, 4.13.8, 4.15.2, 4.16.2, 4.28.3, 4.29.2, 4.31.0, 4.31.2, 4.33.1, 4.34.0, 4.34.1, 4.33.2, 4.33.4, 4.36.0, 4.37.1, 4.39.1, 4.43.1, 5.2.3, 5.2.10, 5.2.15, 5.3.0, 5.5.1, 5.8.9, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 3.3.2, 3.1.0, 3.30.4, 4.35.3, 1.7.0-beta.4a, 2.1.2, 2.0.0-dev13, 4.20.0, 4.22.1, 4.38.0, 2.0.0-rc2, 3.15.0, 3.25.1, 4.7.0, 4.7.5, 4.10.0, 4.13.11, 4.20.1, 4.22.16, 4.35.4, 4.36.1, 4.37.3, 4.37.2, 4.37.10, 4.37.5, 4.37.9, 4.42.0, 4.41.0, 4.44.2, 4.44.0, 4.44.1, 5.2.5, 5.2.4, 5.2.13, 5.5.0, 5.6.1, 5.7.2, 5.7.1, 5.8.2, 5.8.1, 5.8.8, 5.8.6, 1.3.2, 4.7.1, 1.5.0-alpha, 1.1.1, 4.23.2, 5.8.5, 2.0.0-rc5, 3.3.1, 3.24.6, 3.27.0, 4.1.0, 2.0.0, 1.1.3, 4.8.1
(Show all)
|
Major → 6.29.0 |
CVE-2016-10556 |
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped. This causes potential SQL injection in sequelize 3.19.3 and earlier, where a malicious user could put `["test", "'); DELETE TestTable WHERE Id = 1 --')"]` inside of ``` database.query('SELECT * FROM TestTable WHERE Name IN (:names)', { replacements: { names: directCopyOfUserInput } }); ``` and cause the SQL statement to become `SELECT Id FROM Table WHERE Name IN ('test', '\'); DELETE TestTable WHERE Id = 1 --')`. In Postgres, MSSQL, and SQLite, the backslash has no special meaning. This causes the the statement to delete whichever Id has a value of 1 in the TestTable table. |
3.14.2,
3.19.2,
3.17.2,
3.14.1,
3.17.0,
3.13.0,
3.7.1,
3.8.0
, 2.0.0-beta.1, 2.0.0-beta.3, 2.0.5, 2.0.0-dev7, 2.0.0-dev6, 2.0.0-dev3, 2.0.0-alpha3, 1.7.7, 1.7.2, 1.7.0-rc7, 1.7.0-rc6, 1.7.0-rc5, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 2.0.0-rc7, 3.19.1, 2.0.0-dev5, 2.1.3, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-dev1, 2.0.0-dev8, 2.0.0-dev9, 2.0.0-rc3, 2.0.0-rc8, 2.0.2, 2.0.4, 2.1.1, 2.1.0, 3.4.0, 3.0.0, 3.7.0, 3.1.1, 3.11.0, 3.14.0, 3.15.1, 3.17.3, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 2.0.0-dev10, 3.2.0, 3.10.0, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 3.12.2, 3.17.1, 3.3.0, 1.7.0-rc3, 1.7.11, 3.18.0, 2.0.0-dev12, 2.0.0-beta.8, 3.19.3, 1.6.0-beta4, 3.4.1, 0.4.2, 1.6.0-beta-3, 3.12.0, 3.19.0, 0.4.0, 2.0.0-beta.5, 3.5.0, 0.4.3, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 1.6.0-alpha-1, 1.7.0-rc4, 1.7.0-beta.5, 1.3.0, 1.0.2, 3.16.0, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 2.0.0-dev11, 2.0.3, 1.7.0-beta.1, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 2.0.0-dev2, 2.0.0-dev4, 2.0.1, 3.6.0, 3.5.1, 3.12.1, 2.0.6, 3.0.1, 3.9.0, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 3.3.2, 3.1.0, 1.7.0-beta.4a, 2.1.2, 2.0.0-dev13, 2.0.0-rc2, 3.15.0, 1.3.2, 1.5.0-alpha, 1.1.1, 2.0.0-rc5, 3.3.1, 2.0.0, 1.1.3
(Show all)
|
Major → 6.29.0 |
CVE-2016-10554 |
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. Before version 1.7.0-alpha3, sequelize defaulted SQLite to use MySQL backslash escaping, even though SQLite uses Postgres escaping. |
1.5.0-beta,
1.1.4,
1.0.0,
0.2.3,
1.6.0-alpha-3,
1.4.0,
1.5.0,
1.7.0-alpha1
, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.2.2, 0.2.4, 1.6.0-beta4, 0.4.2, 1.6.0-beta-3, 0.4.0, 0.4.3, 1.5.0-beta-2, 0.3.0, 0.2.5, 1.6.0-alpha-1, 1.3.0, 1.0.2, 1.6.0, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.3.2, 1.5.0-alpha, 1.1.1, 1.1.3
(Show all)
|
Minor → 6.29.0 |
CVE-2016-10553 |
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. A fix was pushed out that fixed potential SQL injection in sequelize 2.1.3 and earlier. |
2.0.0-beta.1,
2.0.0-beta.3,
2.0.5,
2.0.0-dev7,
2.0.0-dev6,
2.0.0-dev3,
2.0.0-alpha3,
1.7.7
, 1.7.2, 1.7.0-rc7, 1.7.0-rc6, 1.7.0-rc5, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 2.0.0-rc7, 2.0.0-dev5, 2.1.3, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-dev1, 2.0.0-dev8, 2.0.0-dev9, 2.0.0-rc3, 2.0.0-rc8, 2.0.2, 2.0.4, 2.1.1, 2.1.0, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 2.0.0-dev10, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 1.7.0-rc3, 1.7.11, 2.0.0-dev12, 2.0.0-beta.8, 1.6.0-beta4, 0.4.2, 1.6.0-beta-3, 0.4.0, 2.0.0-beta.5, 0.4.3, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 1.6.0-alpha-1, 1.7.0-rc4, 1.7.0-beta.5, 1.3.0, 1.0.2, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 2.0.0-dev11, 2.0.3, 1.7.0-beta.1, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 2.0.0-dev2, 2.0.0-dev4, 2.0.1, 2.0.6, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 1.7.0-beta.4a, 2.1.2, 2.0.0-dev13, 2.0.0-rc2, 1.3.2, 1.5.0-alpha, 1.1.1, 2.0.0-rc5, 2.0.0, 1.1.3
(Show all)
|
Major → 6.29.0 |
CVE-2016-10550 |
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS If user input goes into the `limit` or `order` parameters, a malicious user can put in their own SQL statements. This affects sequelize 3.16.0 and earlier. |
3.14.2,
3.14.1,
3.13.0,
3.7.1,
3.8.0,
2.0.0-beta.1,
2.0.0-beta.3,
2.0.5
, 2.0.0-dev7, 2.0.0-dev6, 2.0.0-dev3, 2.0.0-alpha3, 1.7.7, 1.7.2, 1.7.0-rc7, 1.7.0-rc6, 1.7.0-rc5, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 2.0.0-rc7, 2.0.0-dev5, 2.1.3, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-dev1, 2.0.0-dev8, 2.0.0-dev9, 2.0.0-rc3, 2.0.0-rc8, 2.0.2, 2.0.4, 2.1.1, 2.1.0, 3.4.0, 3.0.0, 3.7.0, 3.1.1, 3.11.0, 3.14.0, 3.15.1, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 2.0.0-dev10, 3.2.0, 3.10.0, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 3.12.2, 3.3.0, 1.7.0-rc3, 1.7.11, 2.0.0-dev12, 2.0.0-beta.8, 1.6.0-beta4, 3.4.1, 0.4.2, 1.6.0-beta-3, 3.12.0, 0.4.0, 2.0.0-beta.5, 3.5.0, 0.4.3, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 1.6.0-alpha-1, 1.7.0-rc4, 1.7.0-beta.5, 1.3.0, 1.0.2, 3.16.0, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 2.0.0-dev11, 2.0.3, 1.7.0-beta.1, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 2.0.0-dev2, 2.0.0-dev4, 2.0.1, 3.6.0, 3.5.1, 3.12.1, 2.0.6, 3.0.1, 3.9.0, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 3.3.2, 3.1.0, 1.7.0-beta.4a, 2.1.2, 2.0.0-dev13, 2.0.0-rc2, 3.15.0, 1.3.2, 1.5.0-alpha, 1.1.1, 2.0.0-rc5, 3.3.1, 2.0.0, 1.1.3
(Show all)
|
Major → 6.29.0 |
CVE-2016-1000225 |
SequelizeJS 3.23.4 is vulnerable to SQL injection via GeoJSON documents containing a value with a single quote. This vulnerability affects postresql/postgis as well as MySQL. This vulnerability only exists within GeoJSON documents using the function `ST_GeomFromGeoJSON` for postgresql/postgis and the function `GeomFromText` for mysql. SequelizeJS's `geometry` datatype is vulnerable. If you have SequelizeJS models with a field that has a datatype of 'Geometry' and run a mysql or postgresql/postgis backend, your application is vulnerable
SequelizeJS is a popular ORM (Object Relational Mapper) for node.
GeoJSON is a format for encoding a variety of geographic data structures. |
3.14.2,
3.23.0,
3.20.0,
3.19.2,
3.17.2,
3.14.1,
3.17.0,
3.13.0
, 3.7.1, 3.8.0, 3.19.1, 3.4.0, 3.7.0, 3.11.0, 3.14.0, 3.15.1, 3.17.3, 3.23.1, 3.10.0, 3.12.2, 3.17.1, 3.18.0, 3.19.3, 3.22.0, 3.23.2, 3.4.1, 3.12.0, 3.19.0, 3.5.0, 3.23.4, 3.16.0, 3.23.5, 3.6.0, 3.5.1, 3.12.1, 3.9.0, 3.21.0, 3.23.3, 3.15.0
(Show all)
|
Major → 6.29.0 |
CVE-2015-1369 |
SQL injection vulnerability in Sequelize before 2.0.0-rc7 for Node.js allows remote attackers to execute arbitrary SQL commands via the order parameter. |
2.0.0-beta.1,
2.0.0-beta.3,
2.0.0-alpha3,
1.7.7,
1.7.2,
1.7.0-rc7,
1.7.0-rc6,
1.7.0-rc5
, 1.5.0-beta, 1.1.4, 1.0.0, 0.2.3, 1.7.0-beta8, 1.6.0-alpha-3, 1.7.0-rc2, 1.7.0-rc8, 2.0.0-alpha1, 2.0.0-rc7, 1.4.0, 1.7.9, 1.5.0, 1.7.0-alpha1, 1.7.0-beta.3b, 1.7.0-beta7, 1.7.1, 1.7.3, 1.7.5, 0.2.6, 1.6.0-alpha-2, 1.6.0-beta-2, 1.6.0-beta-1, 1.7.0-alpha2, 1.7.0-beta.2, 1.7.0-beta6, 2.0.0-alpha2, 2.0.0-beta.0, 2.0.0-rc3, 1.7.8, 2.0.0-rc4, 2.0.0-beta.7, 1.3.7, 1.3.6, 1.3.5, 1.3.4, 1.3.3, 1.2.1, 1.2.0, 1.0.1, 0.4.1, 0.0.0-development, 1.7.0-beta.0, 0.2.2, 0.2.4, 2.0.0-rc6, 1.7.0-rc3, 1.7.11, 2.0.0-beta.8, 1.6.0-beta4, 0.4.2, 1.6.0-beta-3, 0.4.0, 2.0.0-beta.5, 0.4.3, 1.5.0-beta-2, 1.7.0-alpha3, 1.7.4, 0.3.0, 0.2.5, 1.6.0-alpha-1, 1.7.0-rc4, 1.7.0-beta.5, 1.3.0, 1.0.2, 2.0.0-beta.2, 2.0.0-beta.6, 2.0.0-rc1, 1.7.0-beta.1, 1.6.0, 1.7.0-rc1, 1.7.0, 2.0.0-beta.4, 1.4.1, 1.3.1, 1.1.2, 1.1.0, 1.7.10, 1.7.0-rc9, 1.7.0-beta.4a, 2.0.0-rc2, 1.3.2, 1.5.0-alpha, 1.1.1, 2.0.0-rc5, 1.1.3
(Show all)
|
Major → 6.29.0 |