Количество 33
Количество 33
GHSA-x56p-c8cg-q435
Open Redirect in Next.js versions
GHSA-wr66-vrwm-5g5x
Denial of Service Vulnerability in next.js
GHSA-vxf5-wxwp-m7g9
Open Redirect in Next.js
GHSA-qw96-mm2g-c8m7
Next.js has cross site scripting (XSS) vulnerability via the 404 or 500 /_error page
GHSA-m34x-wgrh-g897
Directory traversal vulnerability in Next.js
GHSA-g77x-44xx-532m
Denial of Service condition in Next.js image optimization
GHSA-fq77-7p7r-83rj
Directory Traversal in Next.js
GHSA-fmvm-x8mv-47mj
Improper CSP in Image Optimization API for Next.js versions between 10.0.0 and 12.1.0
GHSA-c59h-r6p8-q9wc
Next.js missing cache-control header may lead to CDN caching empty reply
GHSA-9gr3-7897-pp7m
XSS in Image Optimization API for Next.js
GHSA-3f5c-4qxj-vmpf
Next.js Directory Traversal Vulnerability

CVE-2024-47831
Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned.

CVE-2024-47831
Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned.

CVE-2023-46298
Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN.

CVE-2022-23646
Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default.

CVE-2022-21721
Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in i18n support. Deployments on Vercel, along with similar environments where invalid requests are filtered before reaching Next.js, are not affected. A patch has been released, `next@12.0.9`, that mitigates this issue. As a workaround, one may ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until it becomes feasible to upgrade.

CVE-2021-39178
Next.js is a React framework. Versions of Next.js between 10.0.0 and 11.0.0 contain a cross-site scripting vulnerability. In order for an instance to be affected by the vulnerability, the `next.config.js` file must have `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default or the instance is deployed on Vercel, the instance is not affected by the vulnerability. The vulnerability is patched in Next.js version 11.1.1.

CVE-2021-37699
Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when pages/_error.js was statically generated allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain. We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. The issue has been patched in release 11.1.0.

CVE-2020-5284
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.

CVE-2020-15242
Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-x56p-c8cg-q435 Open Redirect in Next.js versions | CVSS3: 4.7 | 0% Низкий | больше 4 лет назад | |
GHSA-wr66-vrwm-5g5x Denial of Service Vulnerability in next.js | CVSS3: 5.9 | 1% Низкий | больше 3 лет назад | |
GHSA-vxf5-wxwp-m7g9 Open Redirect in Next.js | CVSS3: 6.9 | 0% Низкий | почти 4 года назад | |
GHSA-qw96-mm2g-c8m7 Next.js has cross site scripting (XSS) vulnerability via the 404 or 500 /_error page | CVSS3: 6.1 | 0% Низкий | больше 6 лет назад | |
GHSA-m34x-wgrh-g897 Directory traversal vulnerability in Next.js | CVSS3: 7.5 | 50% Средний | больше 7 лет назад | |
GHSA-g77x-44xx-532m Denial of Service condition in Next.js image optimization | CVSS3: 5.9 | 0% Низкий | 8 месяцев назад | |
GHSA-fq77-7p7r-83rj Directory Traversal in Next.js | CVSS3: 4.4 | 77% Высокий | около 5 лет назад | |
GHSA-fmvm-x8mv-47mj Improper CSP in Image Optimization API for Next.js versions between 10.0.0 and 12.1.0 | CVSS3: 5.9 | 1% Низкий | больше 3 лет назад | |
GHSA-c59h-r6p8-q9wc Next.js missing cache-control header may lead to CDN caching empty reply | 0% Низкий | больше 1 года назад | ||
GHSA-9gr3-7897-pp7m XSS in Image Optimization API for Next.js | CVSS3: 7.5 | 1% Низкий | почти 4 года назад | |
GHSA-3f5c-4qxj-vmpf Next.js Directory Traversal Vulnerability | CVSS3: 7.5 | 83% Высокий | больше 7 лет назад | |
![]() | CVE-2024-47831 Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned. | CVSS3: 5.9 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-47831 Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned. | CVSS3: 5.9 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2023-46298 Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2022-23646 Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default. | CVSS3: 5.9 | 1% Низкий | больше 3 лет назад |
![]() | CVE-2022-21721 Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in i18n support. Deployments on Vercel, along with similar environments where invalid requests are filtered before reaching Next.js, are not affected. A patch has been released, `next@12.0.9`, that mitigates this issue. As a workaround, one may ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until it becomes feasible to upgrade. | CVSS3: 5.9 | 1% Низкий | больше 3 лет назад |
![]() | CVE-2021-39178 Next.js is a React framework. Versions of Next.js between 10.0.0 and 11.0.0 contain a cross-site scripting vulnerability. In order for an instance to be affected by the vulnerability, the `next.config.js` file must have `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default or the instance is deployed on Vercel, the instance is not affected by the vulnerability. The vulnerability is patched in Next.js version 11.1.1. | CVSS3: 7.5 | 1% Низкий | почти 4 года назад |
![]() | CVE-2021-37699 Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when pages/_error.js was statically generated allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain. We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. The issue has been patched in release 11.1.0. | CVSS3: 6.9 | 0% Низкий | почти 4 года назад |
![]() | CVE-2020-5284 Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2. | CVSS3: 4.4 | 77% Высокий | около 5 лет назад |
![]() | CVE-2020-15242 Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4. | CVSS3: 4.7 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу