Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"
Node.js

Node.jsпрограммная платформа, основанная на движке V8 (компилирующем JavaScript в машинный код)

Релизный цикл, информация об уязвимостях

Продукт: Node.js
Вендор: nodejs

График релизов

20212223242023202420252026202720282029

Недавние уязвимости Node.js

Количество 1 012

rocky логотип

RLSA-2023:5708

почти 2 года назад

Important: dotnet6.0 security update

EPSS: Критический
rocky логотип

RLSA-2023:5749

почти 2 года назад

Important: .NET 7.0 security update

EPSS: Критический
rocky логотип

RLSA-2023:5765

почти 2 года назад

Important: nodejs security update

EPSS: Критический
rocky логотип

RLSA-2023:5924

почти 2 года назад

Important: varnish security update

EPSS: Критический
rocky логотип

RLSA-2023:5928

почти 2 года назад

Important: tomcat security update

EPSS: Критический
suse-cvrf логотип

SUSE-SU-2023:4163-1

почти 2 года назад

Security update for netty, netty-tcnative

EPSS: Критический
fstec логотип

BDU:2024-02879

почти 2 года назад

Уязвимость функции path.resolve() модели разрешений программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации

CVSS3: 7.9
EPSS: Низкий
github логотип

GHSA-7xrv-q25v-f95m

почти 2 года назад

A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-x39v-frq9-5hh8

почти 2 года назад

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-9hm3-chgj-45rm

почти 2 года назад

Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects. This is distinct from CVE-2023-32004 ([report 2038134](https://hackerone.com/reports/2038134)), which only referred to `Buffer` objects. However, the vulnerability follows the same pattern using `Uint8Array` instead of `Buffer`. Impacts: This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
rocky логотип
RLSA-2023:5708

Important: dotnet6.0 security update

94%
Критический
почти 2 года назад
rocky логотип
RLSA-2023:5749

Important: .NET 7.0 security update

94%
Критический
почти 2 года назад
rocky логотип
RLSA-2023:5765

Important: nodejs security update

94%
Критический
почти 2 года назад
rocky логотип
RLSA-2023:5924

Important: varnish security update

94%
Критический
почти 2 года назад
rocky логотип
RLSA-2023:5928

Important: tomcat security update

94%
Критический
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:4163-1

Security update for netty, netty-tcnative

94%
Критический
почти 2 года назад
fstec логотип
BDU:2024-02879

Уязвимость функции path.resolve() модели разрешений программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации

CVSS3: 7.9
1%
Низкий
почти 2 года назад
github логотип
GHSA-7xrv-q25v-f95m

A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.7
0%
Низкий
почти 2 года назад
github логотип
GHSA-x39v-frq9-5hh8

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-9hm3-chgj-45rm

Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects. This is distinct from CVE-2023-32004 ([report 2038134](https://hackerone.com/reports/2038134)), which only referred to `Buffer` objects. However, the vulnerability follows the same pattern using `Uint8Array` instead of `Buffer`. Impacts: This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 9.8
0%
Низкий
почти 2 года назад

Уязвимостей на страницу


Поделиться