Vulnerabilities (CVE)

Filtered by vendor Sencha Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-23331 1 Sencha 1 Connect 2021-02-08 2.1 LOW 3.3 LOW
This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version.
CVE-2007-6758 1 Sencha 1 Ext Js 2021-01-28 5.0 MEDIUM 7.5 HIGH
Server-side request forgery (SSRF) vulnerability in feed-proxy.php in extjs 5.0.0.
CVE-2013-4691 1 Sencha 1 Connect 2020-01-04 4.3 MEDIUM 6.1 MEDIUM
Sencha Labs Connect has XSS with connect.methodOverride()
CVE-2013-7370 4 Debian, Opensuse, Redhat and 1 more 4 Debian Linux, Opensuse, Openshift and 1 more 2019-12-17 4.3 MEDIUM 6.1 MEDIUM
node-connect before 2.8.1 has XSS in the Sencha Labs Connect middleware
CVE-2013-7371 2 Debian, Sencha 2 Debian Linux, Connect 2019-12-16 4.3 MEDIUM 6.1 MEDIUM
node-connects before 2.8.2 has cross site scripting in Sencha Labs Connect middleware (vulnerability due to incomplete fix for CVE-2013-7370)
CVE-2018-3717 1 Sencha 1 Connect 2019-10-09 3.5 LOW 5.4 MEDIUM
connect node module before 2.14.0 suffers from a Cross-Site Scripting (XSS) vulnerability due to a lack of validation of file in directory.js middleware.
CVE-2018-8046 1 Sencha 1 Ext Js 2018-09-04 4.3 MEDIUM 6.1 MEDIUM
The getTip() method of Action Columns of Sencha Ext JS 4 to 6 before 6.6.0 is vulnerable to XSS attacks, even when passed HTML-escaped data. This framework brings no built-in XSS protection, so the developer has to ensure that data is correctly sanitized. However, the getTip() method of Action Columns takes HTML-escaped data and un-escapes it. If the tooltip contains user-controlled data, an attacker could exploit this to create a cross-site scripting attack, even when developers took precautions and escaped data.