Количество 25
Количество 25
GHSA-qw6h-vgh9-j6wx
express vulnerable to XSS via response.redirect()
GHSA-gpvr-g6gh-9mc2
No Charset in Content-Type Header in express
GHSA-cm5g-3pgc-8rg4
Express ressource injection
GHSA-53r2-gvmc-c45q
The EXPRESS (aka com.gpshopper.express.android) application 2.5.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2024-43796
Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVE-2024-43796
Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVE-2024-43796
Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.
CVE-2024-43796
Express.js minimalist web framework for node. In express < 4.20.0, pas ...

CVE-2024-10491
A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVE-2024-10491
A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVE-2024-10491
A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.
CVE-2024-10491
A vulnerability has been identified in the Express response.linksfunct ...

CVE-2014-6887
The EXPRESS (aka com.gpshopper.express.android) application 2.5.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6393
The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.

CVE-2014-6393
The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.

CVE-2014-6393
The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.
CVE-2014-6393
The Express web framework before 3.11 and 4.x before 4.5 for Node.js d ...

BDU:2025-00076
Уязвимость библиотеки просмотрщика документов в веб-версии клиента системы коммуникаций eXpress, вызванная недостаточной защитой структуры веб-страницы, позволяющая нарушителю выполнить произвольный Java Script-код
GHSA-hrpp-h998-j3pp
qs vulnerable to Prototype Pollution

CVE-2022-24999
qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-qw6h-vgh9-j6wx express vulnerable to XSS via response.redirect() | CVSS3: 5 | 0% Низкий | 9 месяцев назад | |
GHSA-gpvr-g6gh-9mc2 No Charset in Content-Type Header in express | CVSS3: 6.1 | 0% Низкий | больше 6 лет назад | |
GHSA-cm5g-3pgc-8rg4 Express ressource injection | CVSS3: 4 | 0% Низкий | 8 месяцев назад | |
GHSA-53r2-gvmc-c45q The EXPRESS (aka com.gpshopper.express.android) application 2.5.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | 0% Низкий | около 3 лет назад | ||
![]() | CVE-2024-43796 Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0. | CVSS3: 5 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-43796 Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0. | CVSS3: 5 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-43796 Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0. | CVSS3: 5 | 0% Низкий | 9 месяцев назад |
CVE-2024-43796 Express.js minimalist web framework for node. In express < 4.20.0, pas ... | CVSS3: 5 | 0% Низкий | 9 месяцев назад | |
![]() | CVE-2024-10491 A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters. | CVSS3: 4 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-10491 A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters. | CVSS3: 5.4 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-10491 A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters. | CVSS3: 4 | 0% Низкий | 8 месяцев назад |
CVE-2024-10491 A vulnerability has been identified in the Express response.linksfunct ... | CVSS3: 4 | 0% Низкий | 8 месяцев назад | |
![]() | CVE-2014-6887 The EXPRESS (aka com.gpshopper.express.android) application 2.5.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | CVSS2: 5.4 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2014-6393 The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding. | CVSS3: 6.1 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2014-6393 The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding. | CVSS2: 4.3 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2014-6393 The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding. | CVSS3: 6.1 | 0% Низкий | почти 8 лет назад |
CVE-2014-6393 The Express web framework before 3.11 and 4.x before 4.5 for Node.js d ... | CVSS3: 6.1 | 0% Низкий | почти 8 лет назад | |
![]() | BDU:2025-00076 Уязвимость библиотеки просмотрщика документов в веб-версии клиента системы коммуникаций eXpress, вызванная недостаточной защитой структуры веб-страницы, позволяющая нарушителю выполнить произвольный Java Script-код | CVSS3: 8 | 6 месяцев назад | |
GHSA-hrpp-h998-j3pp qs vulnerable to Prototype Pollution | CVSS3: 7.5 | 3% Низкий | больше 2 лет назад | |
![]() | CVE-2022-24999 qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable). | CVSS3: 7.5 | 3% Низкий | больше 2 лет назад |
Уязвимостей на страницу