|
472 | 472 | "func": ["jQuery.mobile.version"],
|
473 | 473 | "filename": ["jquery.mobile-(§§version§§)(.min)?\\.js"],
|
474 | 474 | "uri": ["/(§§version§§)/jquery.mobile(\\.min)?\\.js"],
|
475 |
| - "filecontent": ["/\\*!?(?:\n \\*)? jQuery Mobile(?: -)? v(§§version§§)"], |
| 475 | + "filecontent": [ |
| 476 | + "/\\*!?[\\s*]*jQuery Mobile(?: -)? v?(§§version§§)", |
| 477 | + "// Version of the jQuery Mobile Framework[\\s]+version: *[\"'](§§version§§)[\"']," |
| 478 | + ], |
476 | 479 | "hashes": {}
|
477 | 480 | }
|
478 | 481 | },
|
|
1811 | 1814 | "meta\\.revision=\"Ember@(§§version§§)\"",
|
1812 | 1815 | "e\\(\"ember/version\",\\[\"exports\"\\],function\\(e\\)\\{\"use strict\";?[\\s]*e(?:\\.|\\[\")default(?:\"\\])?=\"(§§version§§)\"",
|
1813 | 1816 | "\\(\"ember/version\",\\[\"exports\"\\],function\\(e\\)\\{\"use strict\";.{1,70}\\.default=\"(§§version§§)\"",
|
1814 |
| - "/\\*![\\s]+\\* @overview Ember - JavaScript Application Framework[\\s\\S]{0,400}\\* @version (§§version§§)" |
| 1817 | + "/\\*![\\s]+\\* @overview Ember - JavaScript Application Framework[\\s\\S]{0,400}\\* @version (§§version§§)", |
| 1818 | + "// Version: (§§version§§)[\\s]+\\(function\\(\\) *\\{[\\s]*/\\*\\*[\\s]+@module ember[\\s]" |
1815 | 1819 | ],
|
1816 | 1820 | "hashes": {}
|
1817 | 1821 | }
|
|
2371 | 2375 | "filename": ["backbone(?:js)?-(§§version§§)(.min)?\\.js"],
|
2372 | 2376 | "filecontent": [
|
2373 | 2377 | "//[ ]+Backbone.js (§§version§§)",
|
2374 |
| - "a=t.Backbone=\\{\\}\\}a.VERSION=\"(§§version§§)\"" |
| 2378 | + "a=t.Backbone=\\{\\}\\}a.VERSION=\"(§§version§§)\"", |
| 2379 | + "Backbone\\.VERSION *= *[\"'](§§version§§)[\"']" |
2375 | 2380 | ],
|
2376 | 2381 | "hashes": {}
|
2377 | 2382 | }
|
|
2704 | 2709 | "Handlebars=\\{VERSION:(?:'|\")(§§version§§)(?:'|\")",
|
2705 | 2710 | "this.Handlebars=\\{\\};[\n\r \t]+\\(function\\([a-z]\\)\\{[a-z].VERSION=(?:'|\")(§§version§§)(?:'|\")",
|
2706 | 2711 | "exports.HandlebarsEnvironment=[\\s\\S]{70,120}exports.VERSION=(?:'|\")(§§version§§)(?:'|\")",
|
2707 |
| - "/\\*+![\\s]+(?:@license)?[\\s]+handlebars v(§§version§§)" |
| 2712 | + "/\\*+![\\s]+(?:@license)?[\\s]+handlebars v+(§§version§§)" |
2708 | 2713 | ],
|
2709 | 2714 | "hashes": {}
|
2710 | 2715 | }
|
|
3457 | 3462 | "\\.version=\"(§§version§§)\".{20,60}\"isBefore\".{20,60}\"isAfter\".{200,500}\\.isMoment=",
|
3458 | 3463 | "\\.version=\"(§§version§§)\".{20,300}duration.{2,100}\\.isMoment=",
|
3459 | 3464 | "\\.isMoment\\(.{50,400}_isUTC.{50,400}=\"(§§version§§)\"",
|
3460 |
| - "=\"(§§version§§)\".{300,1000}Years:31536e6.{60,80}\\.isMoment" |
| 3465 | + "=\"(§§version§§)\".{300,1000}Years:31536e6.{60,80}\\.isMoment", |
| 3466 | + "// Moment.js is freely distributable under the terms of the MIT license.[\\s]+//[\\s]+// Version (§§version§§)" |
3461 | 3467 | ]
|
3462 | 3468 | }
|
3463 | 3469 | },
|
|
3485 | 3491 | "extractors": {
|
3486 | 3492 | "uri": ["/underscore\\.js/(§§version§§)/underscore(-min)?\\.js"],
|
3487 | 3493 | "func": ["underscore.version"],
|
3488 |
| - "filecontent": ["//[\\s]*Underscore.js (§§version§§)"] |
| 3494 | + "filecontent": [ |
| 3495 | + "//[\\s]*Underscore.js (§§version§§)", |
| 3496 | + "// *Underscore\\.js[\\s\\S]{1,2500}_\\.VERSION *= *['\"](§§version§§)['\"]" |
| 3497 | + ] |
3489 | 3498 | }
|
3490 | 3499 | },
|
3491 | 3500 | "bootstrap": {
|
|
4179 | 4188 | "/ext-all-debug-(§§version§§)(\\.min)?\\.js",
|
4180 | 4189 | "/ext-base-(§§version§§)(\\.min)?\\.js"
|
4181 | 4190 | ],
|
4182 |
| - "filecontent": ["/*!\n * Ext JS Library (§§version§§)"], |
| 4191 | + "filecontent": [ |
| 4192 | + "/*!\n * Ext JS Library (§§version§§)", |
| 4193 | + "Ext = \\{[\\s]*/\\*[^/]+/[\\s]*version *: *['\"](§§version§§)['\"]", |
| 4194 | + "var version *= *['\"](§§version§§)['\"], *Version;[\\s]*Ext.Version *= *Version *= *Ext.extend" |
| 4195 | + ], |
4183 | 4196 | "func": [
|
4184 | 4197 | "Ext && Ext.versions && Ext.versions.extjs.version",
|
4185 | 4198 | "Ext && Ext.version"
|
|
5113 | 5126 | "extractors": {
|
5114 | 5127 | "filecontent": [
|
5115 | 5128 | "/\\*!(?:[\\s]+\\*)? Select2 (§§version§§)",
|
5116 |
| - "/\\*[\\s]+Copyright 20[0-9]{2} [I]gor V[a]ynberg[\\s]+Version: (§§version§§)[\\s\\S]{1,4000}(\\.attr\\(\"class\",\"select2-sizer\"|\\.data\\(document,\"select2-lastpos\"|document\\)\\.data\\(\"select2-lastpos\")" |
| 5129 | + "/\\*[\\s]+Copyright 20[0-9]{2} [I]gor V[a]ynberg[\\s]+Version: (§§version§§)[\\s\\S]{1,5000}(\\.attr\\(\"class\",\"select2-sizer\"|\\.data\\(document, *\"select2-lastpos\"|document\\)\\.data\\(\"select2-lastpos\"|SingleSelect2, *MultiSelect2|window.Select2 *!== *undefined)" |
5117 | 5130 | ],
|
5118 | 5131 | "uri": ["(§§version§§)/(js/)?select2(.min)?\\.js"]
|
5119 | 5132 | }
|
5120 | 5133 | },
|
| 5134 | + "blueimp-file-upload": { |
| 5135 | + "vulnerabilities": [ |
| 5136 | + { |
| 5137 | + "ranges": [ |
| 5138 | + { |
| 5139 | + "below": "9.22.1" |
| 5140 | + } |
| 5141 | + ], |
| 5142 | + "summary": "Unrestricted Upload of File with Dangerous Type in blueimp-file-upload", |
| 5143 | + "cwe": ["CWE-434"], |
| 5144 | + "severity": "high", |
| 5145 | + "identifiers": { |
| 5146 | + "CVE": ["CVE-2018-9206"], |
| 5147 | + "githubID": "GHSA-4cj8-g9cp-v5wr" |
| 5148 | + }, |
| 5149 | + "info": [ |
| 5150 | + "https://github.com/advisories/GHSA-4cj8-g9cp-v5wr", |
| 5151 | + "https://nvd.nist.gov/vuln/detail/CVE-2018-9206", |
| 5152 | + "https://github.com/advisories/GHSA-4cj8-g9cp-v5wr", |
| 5153 | + "https://wpvulndb.com/vulnerabilities/9136", |
| 5154 | + "https://www.exploit-db.com/exploits/45790/", |
| 5155 | + "https://www.exploit-db.com/exploits/46182/", |
| 5156 | + "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", |
| 5157 | + "http://www.securityfocus.com/bid/105679", |
| 5158 | + "http://www.securityfocus.com/bid/106629", |
| 5159 | + "http://www.vapidlabs.com/advisory.php?v=204" |
| 5160 | + ] |
| 5161 | + } |
| 5162 | + ], |
| 5163 | + "extractors": { |
| 5164 | + "filecontent": [ |
| 5165 | + "/\\*[\\s*]+jQuery File Upload User Interface Plugin (§§version§§)[\\s*]+https://github.com/blueimp" |
| 5166 | + ], |
| 5167 | + "uri": [ |
| 5168 | + "/blueimp-file-upload/(§§version§§)/jquery.fileupload(-ui)?(\\.min)?\\.js" |
| 5169 | + ] |
| 5170 | + } |
| 5171 | + }, |
| 5172 | + "c3": { |
| 5173 | + "vulnerabilities": [ |
| 5174 | + { |
| 5175 | + "ranges": [ |
| 5176 | + { |
| 5177 | + "below": "0.4.11" |
| 5178 | + } |
| 5179 | + ], |
| 5180 | + "summary": "Cross-Site Scripting in c3", |
| 5181 | + "cwe": ["CWE-79"], |
| 5182 | + "severity": "medium", |
| 5183 | + "identifiers": { |
| 5184 | + "CVE": ["CVE-2016-1000240"], |
| 5185 | + "githubID": "GHSA-gvg7-pp82-cff3" |
| 5186 | + }, |
| 5187 | + "info": [ |
| 5188 | + "https://github.com/advisories/GHSA-gvg7-pp82-cff3", |
| 5189 | + "https://nvd.nist.gov/vuln/detail/CVE-2016-1000240", |
| 5190 | + "https://github.com/c3js/c3/issues/1536", |
| 5191 | + "https://github.com/c3js/c3/pull/1675", |
| 5192 | + "https://github.com/c3js/c3/commit/de3864650300488a63d0541620e9828b00e94b42", |
| 5193 | + "https://github.com/c3js/c3", |
| 5194 | + "https://www.npmjs.com/advisories/138" |
| 5195 | + ] |
| 5196 | + } |
| 5197 | + ], |
| 5198 | + "extractors": { |
| 5199 | + "uri": ["/(§§version§§)/c3(\\.min)?\\.js"], |
| 5200 | + "filecontent": [ |
| 5201 | + "[\\s]+var c3 ?= ?\\{ ?version: ?['\"](§§version§§)['\"] ?\\};[\\s]+var c3_chart_fn," |
| 5202 | + ] |
| 5203 | + } |
| 5204 | + }, |
| 5205 | + "lodash": { |
| 5206 | + "vulnerabilities": [ |
| 5207 | + { |
| 5208 | + "ranges": [ |
| 5209 | + { |
| 5210 | + "below": "4.17.11" |
| 5211 | + } |
| 5212 | + ], |
| 5213 | + "summary": "Regular Expression Denial of Service (ReDoS) in lodash", |
| 5214 | + "cwe": ["CWE-400"], |
| 5215 | + "severity": "medium", |
| 5216 | + "identifiers": { |
| 5217 | + "CVE": ["CVE-2019-1010266"], |
| 5218 | + "githubID": "GHSA-x5rq-j2xg-h7qm" |
| 5219 | + }, |
| 5220 | + "info": [ |
| 5221 | + "https://github.com/advisories/GHSA-x5rq-j2xg-h7qm", |
| 5222 | + "https://nvd.nist.gov/vuln/detail/CVE-2019-1010266", |
| 5223 | + "https://github.com/lodash/lodash/issues/3359", |
| 5224 | + "https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347", |
| 5225 | + "https://github.com/lodash/lodash/wiki/Changelog", |
| 5226 | + "https://security.netapp.com/advisory/ntap-20190919-0004/", |
| 5227 | + "https://snyk.io/vuln/SNYK-JS-LODASH-73639" |
| 5228 | + ] |
| 5229 | + }, |
| 5230 | + { |
| 5231 | + "ranges": [ |
| 5232 | + { |
| 5233 | + "atOrAbove": "3.7.0", |
| 5234 | + "below": "4.17.19" |
| 5235 | + } |
| 5236 | + ], |
| 5237 | + "summary": "Prototype Pollution in lodash", |
| 5238 | + "cwe": ["CWE-1321", "CWE-770"], |
| 5239 | + "severity": "high", |
| 5240 | + "identifiers": { |
| 5241 | + "CVE": ["CVE-2020-8203"], |
| 5242 | + "githubID": "GHSA-p6mc-m468-83gw" |
| 5243 | + }, |
| 5244 | + "info": [ |
| 5245 | + "https://github.com/advisories/GHSA-p6mc-m468-83gw", |
| 5246 | + "https://nvd.nist.gov/vuln/detail/CVE-2020-8203", |
| 5247 | + "https://github.com/lodash/lodash/issues/4744", |
| 5248 | + "https://github.com/lodash/lodash/issues/4874", |
| 5249 | + "https://github.com/github/advisory-database/pull/2884", |
| 5250 | + "https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12", |
| 5251 | + "https://hackerone.com/reports/712065", |
| 5252 | + "https://hackerone.com/reports/864701", |
| 5253 | + "https://github.com/lodash/lodash", |
| 5254 | + "https://github.com/lodash/lodash/wiki/Changelog#v41719", |
| 5255 | + "https://web.archive.org/web/20210914001339/https://github.com/lodash/lodash/issues/4744" |
| 5256 | + ] |
| 5257 | + }, |
| 5258 | + { |
| 5259 | + "ranges": [ |
| 5260 | + { |
| 5261 | + "below": "4.17.12" |
| 5262 | + } |
| 5263 | + ], |
| 5264 | + "summary": "Prototype Pollution in lodash", |
| 5265 | + "cwe": ["CWE-20"], |
| 5266 | + "severity": "high", |
| 5267 | + "identifiers": { |
| 5268 | + "CVE": ["CVE-2019-10744"], |
| 5269 | + "githubID": "GHSA-jf85-cpcp-j695" |
| 5270 | + }, |
| 5271 | + "info": [ |
| 5272 | + "https://github.com/advisories/GHSA-jf85-cpcp-j695", |
| 5273 | + "https://nvd.nist.gov/vuln/detail/CVE-2019-10744", |
| 5274 | + "https://github.com/lodash/lodash/pull/4336", |
| 5275 | + "https://access.redhat.com/errata/RHSA-2019:3024", |
| 5276 | + "https://security.netapp.com/advisory/ntap-20191004-0005/", |
| 5277 | + "https://snyk.io/vuln/SNYK-JS-LODASH-450202", |
| 5278 | + "https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS", |
| 5279 | + "https://www.npmjs.com/advisories/1065", |
| 5280 | + "https://www.oracle.com/security-alerts/cpujan2021.html", |
| 5281 | + "https://www.oracle.com/security-alerts/cpuoct2020.html" |
| 5282 | + ] |
| 5283 | + }, |
| 5284 | + { |
| 5285 | + "ranges": [ |
| 5286 | + { |
| 5287 | + "below": "4.17.5" |
| 5288 | + } |
| 5289 | + ], |
| 5290 | + "summary": "Prototype Pollution in lodash", |
| 5291 | + "cwe": ["CWE-471"], |
| 5292 | + "severity": "low", |
| 5293 | + "identifiers": { |
| 5294 | + "CVE": ["CVE-2018-3721"], |
| 5295 | + "githubID": "GHSA-fvqr-27wr-82fm" |
| 5296 | + }, |
| 5297 | + "info": [ |
| 5298 | + "https://github.com/advisories/GHSA-fvqr-27wr-82fm", |
| 5299 | + "https://nvd.nist.gov/vuln/detail/CVE-2018-3721", |
| 5300 | + "https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a", |
| 5301 | + "https://hackerone.com/reports/310443", |
| 5302 | + "https://github.com/advisories/GHSA-fvqr-27wr-82fm", |
| 5303 | + "https://security.netapp.com/advisory/ntap-20190919-0004/", |
| 5304 | + "https://www.npmjs.com/advisories/577" |
| 5305 | + ] |
| 5306 | + }, |
| 5307 | + { |
| 5308 | + "ranges": [ |
| 5309 | + { |
| 5310 | + "below": "4.17.11" |
| 5311 | + } |
| 5312 | + ], |
| 5313 | + "summary": "Prototype Pollution in lodash", |
| 5314 | + "cwe": ["CWE-400"], |
| 5315 | + "severity": "high", |
| 5316 | + "identifiers": { |
| 5317 | + "CVE": ["CVE-2018-16487"], |
| 5318 | + "githubID": "GHSA-4xc9-xhrj-v574" |
| 5319 | + }, |
| 5320 | + "info": [ |
| 5321 | + "https://github.com/advisories/GHSA-4xc9-xhrj-v574", |
| 5322 | + "https://nvd.nist.gov/vuln/detail/CVE-2018-16487", |
| 5323 | + "https://github.com/lodash/lodash/commit/90e6199a161b6445b01454517b40ef65ebecd2ad", |
| 5324 | + "https://hackerone.com/reports/380873", |
| 5325 | + "https://github.com/advisories/GHSA-4xc9-xhrj-v574", |
| 5326 | + "https://security.netapp.com/advisory/ntap-20190919-0004/", |
| 5327 | + "https://www.npmjs.com/advisories/782" |
| 5328 | + ] |
| 5329 | + }, |
| 5330 | + { |
| 5331 | + "ranges": [ |
| 5332 | + { |
| 5333 | + "below": "4.17.21" |
| 5334 | + } |
| 5335 | + ], |
| 5336 | + "summary": "Command Injection in lodash", |
| 5337 | + "cwe": ["CWE-77", "CWE-94"], |
| 5338 | + "severity": "high", |
| 5339 | + "identifiers": { |
| 5340 | + "CVE": ["CVE-2021-23337"], |
| 5341 | + "githubID": "GHSA-35jh-r3h4-6jhm" |
| 5342 | + }, |
| 5343 | + "info": [ |
| 5344 | + "https://github.com/advisories/GHSA-35jh-r3h4-6jhm", |
| 5345 | + "https://nvd.nist.gov/vuln/detail/CVE-2021-23337", |
| 5346 | + "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c", |
| 5347 | + "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf", |
| 5348 | + "https://github.com/lodash/lodash", |
| 5349 | + "https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851", |
| 5350 | + "https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851", |
| 5351 | + "https://security.netapp.com/advisory/ntap-20210312-0006/", |
| 5352 | + "https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932", |
| 5353 | + "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930", |
| 5354 | + "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928", |
| 5355 | + "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931", |
| 5356 | + "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929", |
| 5357 | + "https://snyk.io/vuln/SNYK-JS-LODASH-1040724", |
| 5358 | + "https://www.oracle.com//security-alerts/cpujul2021.html", |
| 5359 | + "https://www.oracle.com/security-alerts/cpujan2022.html", |
| 5360 | + "https://www.oracle.com/security-alerts/cpujul2022.html", |
| 5361 | + "https://www.oracle.com/security-alerts/cpuoct2021.html" |
| 5362 | + ] |
| 5363 | + }, |
| 5364 | + { |
| 5365 | + "ranges": [ |
| 5366 | + { |
| 5367 | + "below": "4.17.21" |
| 5368 | + } |
| 5369 | + ], |
| 5370 | + "summary": "Regular Expression Denial of Service (ReDoS) in lodash", |
| 5371 | + "cwe": ["CWE-1333", "CWE-400"], |
| 5372 | + "severity": "medium", |
| 5373 | + "identifiers": { |
| 5374 | + "CVE": ["CVE-2020-28500"], |
| 5375 | + "githubID": "GHSA-29mw-wpgm-hmr9" |
| 5376 | + }, |
| 5377 | + "info": [ |
| 5378 | + "https://github.com/advisories/GHSA-29mw-wpgm-hmr9", |
| 5379 | + "https://nvd.nist.gov/vuln/detail/CVE-2020-28500", |
| 5380 | + "https://github.com/lodash/lodash/pull/5065", |
| 5381 | + "https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7", |
| 5382 | + "https://github.com/lodash/lodash/commit/c4847ebe7d14540bb28a8b932a9ce1b9ecbfee1a", |
| 5383 | + "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf", |
| 5384 | + "https://github.com/lodash/lodash", |
| 5385 | + "https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8", |
| 5386 | + "https://security.netapp.com/advisory/ntap-20210312-0006/", |
| 5387 | + "https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896", |
| 5388 | + "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894", |
| 5389 | + "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892", |
| 5390 | + "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895", |
| 5391 | + "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893", |
| 5392 | + "https://snyk.io/vuln/SNYK-JS-LODASH-1018905", |
| 5393 | + "https://www.oracle.com//security-alerts/cpujul2021.html", |
| 5394 | + "https://www.oracle.com/security-alerts/cpujan2022.html", |
| 5395 | + "https://www.oracle.com/security-alerts/cpujul2022.html", |
| 5396 | + "https://www.oracle.com/security-alerts/cpuoct2021.html" |
| 5397 | + ] |
| 5398 | + } |
| 5399 | + ], |
| 5400 | + "extractors": { |
| 5401 | + "filecontent": [ |
| 5402 | + "/\\*[\\s*!]+(?:@license)?[\\s*]+(?:Lo-Dash|lodash|Lodash) v?(§§version§§)", |
| 5403 | + "=\"(§§version§§)\"[\\s\\S]{1,300}__lodash_hash_undefined__", |
| 5404 | + "/\\*[\\s*]+@license[\\s*]+(?:Lo-Dash|lodhash|Lodash)[\\s\\S]{1,500}var VERSION *= *['\"](§§version§§)['\"]", |
| 5405 | + "var VERSION=\"(§§version§§)\";var BIND_FLAG=1,BIND_KEY_FLAG=2,CURRY_BOUND_FLAG=4,CURRY_FLAG=8" |
| 5406 | + ], |
| 5407 | + "uri": ["/(§§version§§)/lodash(\\.min)?\\.js"] |
| 5408 | + } |
| 5409 | + }, |
5121 | 5410 | "dont check": {
|
5122 | 5411 | "vulnerabilities": [],
|
5123 | 5412 | "extractors": {
|
|
0 commit comments