Логотип exploitDog
product: "express"
Консоль
Логотип exploitDog

exploitDog

product: "express"

Количество 25

Количество 25

github логотип

GHSA-qw6h-vgh9-j6wx

9 месяцев назад

express vulnerable to XSS via response.redirect()

CVSS3: 5
EPSS: Низкий
github логотип

GHSA-gpvr-g6gh-9mc2

больше 6 лет назад

No Charset in Content-Type Header in express

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-cm5g-3pgc-8rg4

8 месяцев назад

Express ressource injection

CVSS3: 4
EPSS: Низкий
github логотип

GHSA-53r2-gvmc-c45q

около 3 лет назад

The EXPRESS (aka com.gpshopper.express.android) application 2.5.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS: Низкий
ubuntu логотип

CVE-2024-43796

9 месяцев назад

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
EPSS: Низкий
redhat логотип

CVE-2024-43796

9 месяцев назад

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2024-43796

9 месяцев назад

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
EPSS: Низкий
debian логотип

CVE-2024-43796

9 месяцев назад

Express.js minimalist web framework for node. In express < 4.20.0, pas ...

CVSS3: 5
EPSS: Низкий
ubuntu логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
EPSS: Низкий
redhat логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
EPSS: Низкий
debian логотип

CVE-2024-10491

8 месяцев назад

A vulnerability has been identified in the Express response.linksfunct ...

CVSS3: 4
EPSS: Низкий
nvd логотип

CVE-2014-6887

больше 10 лет назад

The EXPRESS (aka com.gpshopper.express.android) application 2.5.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVSS2: 5.4
EPSS: Низкий
ubuntu логотип

CVE-2014-6393

почти 8 лет назад

The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2014-6393

больше 10 лет назад

The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2014-6393

почти 8 лет назад

The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2014-6393

почти 8 лет назад

The Express web framework before 3.11 and 4.x before 4.5 for Node.js d ...

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2025-00076

6 месяцев назад

Уязвимость библиотеки просмотрщика документов в веб-версии клиента системы коммуникаций eXpress, вызванная недостаточной защитой структуры веб-страницы, позволяющая нарушителю выполнить произвольный Java Script-код

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-hrpp-h998-j3pp

больше 2 лет назад

qs vulnerable to Prototype Pollution

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-24999

больше 2 лет назад

qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-qw6h-vgh9-j6wx

express vulnerable to XSS via response.redirect()

CVSS3: 5
0%
Низкий
9 месяцев назад
github логотип
GHSA-gpvr-g6gh-9mc2

No Charset in Content-Type Header in express

CVSS3: 6.1
0%
Низкий
больше 6 лет назад
github логотип
GHSA-cm5g-3pgc-8rg4

Express ressource injection

CVSS3: 4
0%
Низкий
8 месяцев назад
github логотип
GHSA-53r2-gvmc-c45q

The EXPRESS (aka com.gpshopper.express.android) application 2.5.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2024-43796

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
0%
Низкий
9 месяцев назад
redhat логотип
CVE-2024-43796

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
0%
Низкий
9 месяцев назад
nvd логотип
CVE-2024-43796

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
0%
Низкий
9 месяцев назад
debian логотип
CVE-2024-43796

Express.js minimalist web framework for node. In express < 4.20.0, pas ...

CVSS3: 5
0%
Низкий
9 месяцев назад
ubuntu логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
0%
Низкий
8 месяцев назад
redhat логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 5.4
0%
Низкий
8 месяцев назад
nvd логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
0%
Низкий
8 месяцев назад
debian логотип
CVE-2024-10491

A vulnerability has been identified in the Express response.linksfunct ...

CVSS3: 4
0%
Низкий
8 месяцев назад
nvd логотип
CVE-2014-6887

The EXPRESS (aka com.gpshopper.express.android) application 2.5.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVSS2: 5.4
0%
Низкий
больше 10 лет назад
ubuntu логотип
CVE-2014-6393

The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.

CVSS3: 6.1
0%
Низкий
почти 8 лет назад
redhat логотип
CVE-2014-6393

The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.

CVSS2: 4.3
0%
Низкий
больше 10 лет назад
nvd логотип
CVE-2014-6393

The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.

CVSS3: 6.1
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2014-6393

The Express web framework before 3.11 and 4.x before 4.5 for Node.js d ...

CVSS3: 6.1
0%
Низкий
почти 8 лет назад
fstec логотип
BDU:2025-00076

Уязвимость библиотеки просмотрщика документов в веб-версии клиента системы коммуникаций eXpress, вызванная недостаточной защитой структуры веб-страницы, позволяющая нарушителю выполнить произвольный Java Script-код

CVSS3: 8
6 месяцев назад
github логотип
GHSA-hrpp-h998-j3pp

qs vulnerable to Prototype Pollution

CVSS3: 7.5
3%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-24999

qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).

CVSS3: 7.5
3%
Низкий
больше 2 лет назад

Уязвимостей на страницу