Browse all 3 CVE security advisories affecting jasonraimondi. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Jasonraimondi is primarily associated with web application security research, focusing on identifying vulnerabilities in open-source software and frameworks. Historically, their contributions center around remote code execution (RCE) and cross-site scripting (XSS) vulnerabilities, with a particular emphasis on authentication and session management flaws. Their security characteristics include methodical vulnerability disclosure practices and collaboration with maintainers to remediate issues. While no major public incidents are directly linked to their work, their CVE contributions demonstrate a consistent pattern of uncovering critical flaws that could lead to system compromise or unauthorized access if unpatched.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-39919 | Capture screenshot of localhost web services (unauthenticated pages) in @jmondi/url-to-png — url-to-pngCWE-200 | 3.1 | Low | 2024-07-15 |
| CVE-2024-39918 | Path Traveral in @jmondi/url-to-png — url-to-pngCWE-22 | 4.3 | Medium | 2024-07-15 |
| CVE-2024-37169 | @jmondi/url-to-png arbitrary file read via Playwright's screenshot feature exploiting file wrapper — url-to-pngCWE-22 | 5.3 | Medium | 2024-06-10 |
This page lists every published CVE security advisory associated with jasonraimondi. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.