Количество 15
Количество 15

CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.
CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can ...
GHSA-wj24-gwh6-mgh8
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

BDU:2023-08046
Уязвимость модуля WebAssembly программной платформы Node.js, позволяющая нарушителю выполнить произвольные команды

SUSE-SU-2023:4207-1
Security update for nodejs18

SUSE-SU-2023:4155-1
Security update for nodejs18

SUSE-SU-2023:4150-1
Security update for nodejs18

SUSE-SU-2023:4133-1
Security update for nodejs18

SUSE-SU-2023:4132-1
Security update for nodejs18
ELSA-2023-5869
ELSA-2023-5869: nodejs:18 security update (IMPORTANT)
ELSA-2023-5849
ELSA-2023-5849: 18 security update (IMPORTANT)
ELSA-2023-7205
ELSA-2023-7205: nodejs:20 security update (IMPORTANT)

ROS-20240916-03
Множественные уязвимости nodejs
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option. | CVSS3: 5.3 | 0% Низкий | 10 месяцев назад |
![]() | CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option. | CVSS3: 5.3 | 0% Низкий | 10 месяцев назад |
CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can ... | CVSS3: 5.3 | 0% Низкий | 10 месяцев назад | |
GHSA-wj24-gwh6-mgh8 Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option. | CVSS3: 5.3 | 0% Низкий | 9 месяцев назад | |
![]() | BDU:2023-08046 Уязвимость модуля WebAssembly программной платформы Node.js, позволяющая нарушителю выполнить произвольные команды | CVSS3: 5.3 | 0% Низкий | почти 2 года назад |
![]() | SUSE-SU-2023:4207-1 Security update for nodejs18 | больше 1 года назад | ||
![]() | SUSE-SU-2023:4155-1 Security update for nodejs18 | больше 1 года назад | ||
![]() | SUSE-SU-2023:4150-1 Security update for nodejs18 | больше 1 года назад | ||
![]() | SUSE-SU-2023:4133-1 Security update for nodejs18 | больше 1 года назад | ||
![]() | SUSE-SU-2023:4132-1 Security update for nodejs18 | больше 1 года назад | ||
ELSA-2023-5869 ELSA-2023-5869: nodejs:18 security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-5849 ELSA-2023-5849: 18 security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-7205 ELSA-2023-7205: nodejs:20 security update (IMPORTANT) | больше 1 года назад | |||
![]() | ROS-20240916-03 Множественные уязвимости nodejs | CVSS3: 7.5 | 9 месяцев назад |
Уязвимостей на страницу