View Code? Open in Web Editor
NEW
This project forked from nextdoor /ndscheduler
A flexible python library for building your own cron-like system, with REST APIs and a Web UI.
License: BSD 2-Clause "Simplified" License
Python 55.58%
Makefile 0.78%
HTML 12.61%
CSS 1.40%
JavaScript 29.15%
Shell 0.13%
Dockerfile 0.36%
ndscheduler's Issues
CVE-2020-11023 - Medium Severity Vulnerability
Vulnerable Library - jquery-1.11.1.min.js
JavaScript library for DOM operations
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/jquery.js
Dependency Hierarchy:
❌ jquery-1.11.1.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Publish Date: 2020-04-29
URL: CVE-2020-11023
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440
Release Date: 2020-04-29
Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0
CVE-2018-20677 - Medium Severity Vulnerability
Vulnerable Library - bootstrap-3.3.6.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/bootstrap.js
Dependency Hierarchy:
❌ bootstrap-3.3.6.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
Publish Date: 2019-01-09
URL: CVE-2018-20677
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677
Release Date: 2019-01-09
Fix Resolution: Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0
CVE-2015-9251 - Medium Severity Vulnerability
Vulnerable Library - jquery-1.11.1.min.js
JavaScript library for DOM operations
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/jquery.js
Dependency Hierarchy:
❌ jquery-1.11.1.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
Publish Date: 2018-01-18
URL: CVE-2015-9251
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-9251
Release Date: 2018-01-18
Fix Resolution: jQuery - v3.0.0
CVE-2017-18214 - High Severity Vulnerability
Vulnerable Library - moment-2.10.6.min.js
Parse, validate, manipulate, and display dates
Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.10.6/moment.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/moment.js
Dependency Hierarchy:
❌ moment-2.10.6.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
The moment module before 2.19.3 for Node.js is prone to a regular expression denial of service via a crafted date string, a different vulnerability than CVE-2016-4055 .
Publish Date: 2018-03-04
URL: CVE-2017-18214
CVSS 3 Score Details (7.5 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: None
Scope: Unchanged
Impact Metrics:
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: High
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18214
Release Date: 2018-03-04
Fix Resolution: 2.19.3
CVE-2019-8331 - Medium Severity Vulnerability
Vulnerable Library - bootstrap-3.3.6.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/bootstrap.js
Dependency Hierarchy:
❌ bootstrap-3.3.6.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
Publish Date: 2019-02-20
URL: CVE-2019-8331
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: twbs/bootstrap#28236
Release Date: 2019-02-20
Fix Resolution: bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1
CVE-2016-4055 - Medium Severity Vulnerability
Vulnerable Library - moment-2.10.6.min.js
Parse, validate, manipulate, and display dates
Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.10.6/moment.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/moment.js
Dependency Hierarchy:
❌ moment-2.10.6.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)."
Publish Date: 2017-01-23
URL: CVE-2016-4055
CVSS 3 Score Details (6.5 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Impact Metrics:
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: High
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4055
Release Date: 2017-01-23
Fix Resolution: 2.11.2
WS-2016-0075 - Medium Severity Vulnerability
Vulnerable Library - moment-2.10.6.min.js
Parse, validate, manipulate, and display dates
Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.10.6/moment.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/moment.js
Dependency Hierarchy:
❌ moment-2.10.6.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
Regular expression denial of service vulnerability in the moment package, by using a specific 40 characters long string in the "format" method.
Publish Date: 2016-10-24
URL: WS-2016-0075
CVSS 3 Score Details (5.3 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: None
Scope: Unchanged
Impact Metrics:
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Low
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: moment/moment#3525
Release Date: 2016-10-24
Fix Resolution: 2.15.2
CVE-2020-11022 - Medium Severity Vulnerability
Vulnerable Library - jquery-1.11.1.min.js
JavaScript library for DOM operations
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/jquery.js
Dependency Hierarchy:
❌ jquery-1.11.1.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Publish Date: 2020-04-29
URL: CVE-2020-11022
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
Release Date: 2020-04-29
Fix Resolution: jQuery - 3.5.0
CVE-2019-11358 - Medium Severity Vulnerability
Vulnerable Library - jquery-1.11.1.min.js
JavaScript library for DOM operations
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/jquery.js
Dependency Hierarchy:
❌ jquery-1.11.1.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable proto property, it could extend the native Object.prototype.
Publish Date: 2019-04-20
URL: CVE-2019-11358
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358
Release Date: 2019-04-20
Fix Resolution: 3.4.0
CVE-2018-20676 - Medium Severity Vulnerability
Vulnerable Library - bootstrap-3.3.6.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/bootstrap.js
Dependency Hierarchy:
❌ bootstrap-3.3.6.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
Publish Date: 2019-01-09
URL: CVE-2018-20676
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676
Release Date: 2019-01-09
Fix Resolution: bootstrap - 3.4.0
CVE-2018-14040 - Medium Severity Vulnerability
Vulnerable Library - bootstrap-3.3.6.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/bootstrap.js
Dependency Hierarchy:
❌ bootstrap-3.3.6.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
Publish Date: 2018-07-13
URL: CVE-2018-14040
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: twbs/bootstrap#26630
Release Date: 2018-07-13
Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0
CVE-2018-14042 - Medium Severity Vulnerability
Vulnerable Library - bootstrap-3.3.6.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/bootstrap.js
Dependency Hierarchy:
❌ bootstrap-3.3.6.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
Publish Date: 2018-07-13
URL: CVE-2018-14042
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: twbs/bootstrap#26630
Release Date: 2018-07-13
Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0
WS-2017-0234 - Medium Severity Vulnerability
Vulnerable Library - jquery.dataTables-1.10.2.min.js
DataTables enhances HTML tables with the ability to sort, filter and page the data in the table very easily. It provides a comprehensive API and set of configuration options, allowing you to consume data from virtually any data source.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/datatables/1.10.2/js/jquery.dataTables.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/jquery.dataTables.js
Dependency Hierarchy:
❌ jquery.dataTables-1.10.2.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
Affected versions of the package are vulnerable to Cross-site Scripting (XSS).
Publish Date: 2015-11-06
URL: WS-2017-0234
CVSS 3 Score Details (6.5 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: None
Scope: Unchanged
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: DataTables/DataTables@6f67df2
Release Date: 2015-11-06
Fix Resolution: datatables - 1.10.10;org.webjars:datatables:1.10.10
CVE-2016-10735 - Medium Severity Vulnerability
Vulnerable Library - bootstrap-3.3.6.min.js
The most popular front-end framework for developing responsive, mobile first projects on the web.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js
Path to vulnerable library: ndscheduler/static/js/vendor/bootstrap.js
Dependency Hierarchy:
❌ bootstrap-3.3.6.min.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041 .
Publish Date: 2019-01-09
URL: CVE-2016-10735
CVSS 3 Score Details (6.1 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: twbs/bootstrap#20184
Release Date: 2019-01-09
Fix Resolution: 3.4.0
CVE-2021-23358 - High Severity Vulnerability
Vulnerable Library - underscore-min-1.8.3.js
JavaScript's functional programming helper library.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/underscore.js/1.8.3/underscore-min.js
Path to vulnerable library: ndscheduler/static/js/vendor/underscore.js
Dependency Hierarchy:
❌ underscore-min-1.8.3.js (Vulnerable Library)
Found in HEAD commit: d2513bf145cf7ef94e0c0673b9979f11cc93b709
Found in base branch: master
Vulnerability Details
The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
Publish Date: 2021-03-29
URL: CVE-2021-23358
CVSS 3 Score Details (7.2 )
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: High
User Interaction: None
Scope: Unchanged
Impact Metrics:
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: High
For more information on CVSS3 Scores, click here .
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358
Release Date: 2021-03-29
Fix Resolution: underscore - 1.12.1,1.13.0-2