Логотип exploitDog
product: "express"
Консоль
Логотип exploitDog

exploitDog

product: "express"
Express for Node.js

Express for Node.jsминималистичный и гибкий веб-фреймворк для приложений Node.js

Релизный цикл, информация об уязвимостях

Продукт: Express for Node.js
Вендор: openjsf

График релизов

1234520102011201220132014201520162017201820192020202120222023202420252026

Недавние уязвимости Express for Node.js

Количество 25

fstec логотип

BDU:2025-00076

6 месяцев назад

Уязвимость библиотеки просмотрщика документов в веб-версии клиента системы коммуникаций eXpress, вызванная недостаточной защитой структуры веб-страницы, позволяющая нарушителю выполнить произвольный Java Script-код

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-cm5g-3pgc-8rg4

8 месяцев назад

Express ressource injection

CVSS3: 4
EPSS: Низкий
nvd логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
EPSS: Низкий
debian логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.linksfunct ...

CVSS3: 4
EPSS: Низкий
ubuntu логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
EPSS: Низкий
redhat логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-qw6h-vgh9-j6wx

9 месяцев назад

express vulnerable to XSS via response.redirect()

CVSS3: 5
EPSS: Низкий
debian логотип

CVE-2024-43796

9 месяцев назад

Express.js minimalist web framework for node. In express < 4.20.0, pas ...

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2024-43796

9 месяцев назад

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
EPSS: Низкий
redhat логотип

CVE-2024-43796

9 месяцев назад

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
fstec логотип
BDU:2025-00076

Уязвимость библиотеки просмотрщика документов в веб-версии клиента системы коммуникаций eXpress, вызванная недостаточной защитой структуры веб-страницы, позволяющая нарушителю выполнить произвольный Java Script-код

CVSS3: 8
6 месяцев назад
github логотип
GHSA-cm5g-3pgc-8rg4

Express ressource injection

CVSS3: 4
0%
Низкий
8 месяцев назад
nvd логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
0%
Низкий
8 месяцев назад
debian логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.linksfunct ...

CVSS3: 4
0%
Низкий
8 месяцев назад
ubuntu логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
0%
Низкий
8 месяцев назад
redhat логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 5.4
0%
Низкий
8 месяцев назад
github логотип
GHSA-qw6h-vgh9-j6wx

express vulnerable to XSS via response.redirect()

CVSS3: 5
0%
Низкий
9 месяцев назад
debian логотип
CVE-2024-43796

Express.js minimalist web framework for node. In express < 4.20.0, pas ...

CVSS3: 5
0%
Низкий
9 месяцев назад
nvd логотип
CVE-2024-43796

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
0%
Низкий
9 месяцев назад
redhat логотип
CVE-2024-43796

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
0%
Низкий
9 месяцев назад

Уязвимостей на страницу


Поделиться