forked from 418sec/huntr
-
Notifications
You must be signed in to change notification settings - Fork 1
/
index.json
1 lines (1 loc) · 3.23 KB
/
index.json
1
[{"Registry":"maven","PackageName":"argonaut","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"Java","VulnerabilityDescription":"Denial of Service (DoS)","Severity":"4.9","AffectedVersionRange":"*","DisclosureDate":"2020-04-10","Bounty":{"Credit":490,"Cash":25}},{"Registry":"maven","PackageName":"gwtupload","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"Java","VulnerabilityDescription":"Denial of Service (DoS)","Severity":"7.5","AffectedVersionRange":"*","DisclosureDate":"2020-06-01","Bounty":{"Credit":750,"Cash":25}},{"Registry":"maven","PackageName":"openid-connect-java-spring-server","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"Java","VulnerabilityDescription":"Cross Site Scripting (XSS)","Severity":"6.1","AffectedVersionRange":"*","DisclosureDate":"2020-02-03","Bounty":{"Credit":610,"Cash":25}},{"Registry":"npm","PackageName":"express-brute","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"JavaScript","VulnerabilityDescription":"Rate Limiting Bypass","Severity":"5.6","AffectedVersionRange":"*","DisclosureDate":"2020-02-03","Bounty":{"Credit":560,"Cash":25}},{"Registry":"npm","PackageName":"node-imagickal","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"JavaScript","VulnerabilityDescription":"Command Injection","Severity":"7.2","AffectedVersionRange":"*","DisclosureDate":"2020-05-08","Bounty":{"Credit":720,"Cash":25}},{"Registry":"npm","PackageName":"node-pngdefry","PackageVulnerabilityID":"2","CodebasePrimaryLanguage":"JavaScript","VulnerabilityDescription":"Buffer Overflow","Severity":"9.4","AffectedVersionRange":"*","DisclosureDate":"2020-05-15","Bounty":{"Credit":"940","Cash":"25"}},{"Registry":"npm","PackageName":"restql","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"JavaScript","VulnerabilityDescription":"Regular Expression Denial of Service (ReDoS)","Severity":"7.5","AffectedVersionRange":"*","DisclosureDate":"2020-06-24","Bounty":{"Credit":750,"Cash":25}},{"Registry":"npm","PackageName":"safer-eval","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"JavaScript","VulnerabilityDescription":"Arbitrary Code Execution","Severity":"9.9","AffectedVersionRange":"*","DisclosureDate":"2020-02-21","Bounty":{"Credit":990,"Cash":25}},{"Registry":"packagist","PackageName":"teampass","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"PHP","VulnerabilityDescription":"Unauthorized File Access","Severity":"7.5","AffectedVersionRange":"*","DisclosureDate":"2020-04-29","Bounty":{"Credit":750,"Cash":25}},{"Registry":"rubygems","PackageName":"em-imap","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"Ruby","VulnerabilityDescription":"Man-in-the-Middle","Severity":"8.2","AffectedVersionRange":"*","DisclosureDate":"2020-05-27","Bounty":{"Credit":820,"Cash":25}},{"Registry":"rubygems","PackageName":"goliath","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"Ruby","VulnerabilityDescription":"HTTP Request Smuggling","Severity":"5.9","AffectedVersionRange":"*","DisclosureDate":"2020-06-09","Bounty":{"Credit":590,"Cash":25}},{"Registry":"rubygems","PackageName":"radiant","PackageVulnerabilityID":"1","CodebasePrimaryLanguage":"Ruby","VulnerabilityDescription":"Cross-site Scripting (XSS)","Severity":"5.4","AffectedVersionRange":"*","DisclosureDate":"2020-02-13","Bounty":{"Credit":590,"Cash":25}}]