Логотип exploitDog
bind:CVE-2023-32558
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-32558

Количество 6

Количество 6

ubuntu логотип

CVE-2023-32558

почти 2 года назад

The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-32558

почти 2 года назад

The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-32558

почти 2 года назад

The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-32558

почти 2 года назад

The use of the deprecated API `process.binding()` can bypass the permi ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-h9p4-9jqg-j34h

почти 2 года назад

The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2024-08724

почти 2 года назад

Уязвимость функции process.binding() программной платформы Node.js, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-32558

The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-32558

The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-32558

The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-32558

The use of the deprecated API `process.binding()` can bypass the permi ...

CVSS3: 7.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-h9p4-9jqg-j34h

The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-08724

Уязвимость функции process.binding() программной платформы Node.js, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
0%
Низкий
почти 2 года назад

Уязвимостей на страницу