Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 009

Количество 1 009

github логотип

GHSA-x39v-frq9-5hh8

больше 1 года назад

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-wr35-fh22-q84x

около 3 лет назад

Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier is a potential Denial of Service (DoS) attack vector. Node.js 6.17.0 introduces server.keepAliveTimeout and the 5-second default.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-wq4c-wm6x-jw44

около 3 лет назад

Withdrawn Advisory: Node.js Inspector RCE via DNS Rebinding

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-v63h-9gvh-2x49

больше 1 года назад

The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivateKey(). However, the documentation says this API call: "Generates private and public Diffie-Hellman key values". The documented behavior is very different from the actual behavior, and this difference could easily lead to security issues in applications that use these APIs as the DiffieHellman may be used as the basis for application-level security, implications are consequently broad.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-rh6c-q938-3r9q

больше 7 лет назад

Moderate severity vulnerability that affects validator

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-r934-m2c7-26gh

больше 2 лет назад

A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-r874-ffh8-2fvj

почти 2 года назад

`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-qpjp-7rp2-9c3f

больше 7 лет назад

Moderate severity vulnerability that affects validator

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-qpf8-fqrf-8p2h

около 3 лет назад

CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-q4qq-fm7q-cwp5

больше 7 лет назад

Multiple XSS Filter Bypasses in validator

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-pvxc-6v2c-cv7w

около 3 лет назад

Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availability of a parser for each HTTP socket, which allows remote attackers to cause a denial of service (uncaughtException and service outage) via a pipelined HTTP request.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-mvc4-gp8c-r52f

около 3 лет назад

Node.js before 4.8.5, 6.x before 6.11.5, and 8.x before 8.8.0 allows remote attackers to cause a denial of service (uncaught exception and crash) by leveraging a change in the zlib module 1.2.9 making 8 an invalid value for the windowBits parameter.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-mfq6-mjjx-mp7f

больше 2 лет назад

A cryptographic vulnerability exists in Node.js <19.2.0, <18.14.1, <16.19.1, <14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-mf6x-7mm4-x2g7

почти 6 лет назад

Out-of-bounds Read in stringstream

EPSS: Низкий
github логотип

GHSA-m27w-wvc9-v4mq

больше 1 года назад

The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: ``` --allow-fs-read=/home/node/.ssh/*.pub ``` will ignore `pub` and give access to everything after `.ssh/`. This misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 5
EPSS: Низкий
github логотип

GHSA-jvqw-9mq6-23h9

почти 2 года назад

A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process's stack memory to locate the permission model Permission::enabled_ in the host process's heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-jr5v-587f-389p

около 3 лет назад

Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-jjv7-qpx3-h62q

больше 7 лет назад

Denial-of-Service Memory Exhaustion in qs

EPSS: Низкий
github логотип

GHSA-jfr7-p3h5-mh28

около 3 лет назад

All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-j4wx-39fg-h554

около 3 лет назад

Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-x39v-frq9-5hh8

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-wr35-fh22-q84x

Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier is a potential Denial of Service (DoS) attack vector. Node.js 6.17.0 introduces server.keepAliveTimeout and the 5-second default.

CVSS3: 7.5
1%
Низкий
около 3 лет назад
github логотип
GHSA-wq4c-wm6x-jw44

Withdrawn Advisory: Node.js Inspector RCE via DNS Rebinding

CVSS3: 8.8
1%
Низкий
около 3 лет назад
github логотип
GHSA-v63h-9gvh-2x49

The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivateKey(). However, the documentation says this API call: "Generates private and public Diffie-Hellman key values". The documented behavior is very different from the actual behavior, and this difference could easily lead to security issues in applications that use these APIs as the DiffieHellman may be used as the basis for application-level security, implications are consequently broad.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
github логотип
GHSA-rh6c-q938-3r9q

Moderate severity vulnerability that affects validator

CVSS3: 6.1
1%
Низкий
больше 7 лет назад
github логотип
GHSA-r934-m2c7-26gh

A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.

CVSS3: 8.1
1%
Низкий
больше 2 лет назад
github логотип
GHSA-r874-ffh8-2fvj

`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-qpjp-7rp2-9c3f

Moderate severity vulnerability that affects validator

CVSS3: 6.1
1%
Низкий
больше 7 лет назад
github логотип
GHSA-qpf8-fqrf-8p2h

CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.

CVSS3: 6.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-q4qq-fm7q-cwp5

Multiple XSS Filter Bypasses in validator

CVSS3: 6.1
1%
Низкий
больше 7 лет назад
github логотип
GHSA-pvxc-6v2c-cv7w

Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availability of a parser for each HTTP socket, which allows remote attackers to cause a denial of service (uncaughtException and service outage) via a pipelined HTTP request.

CVSS3: 7.5
2%
Низкий
около 3 лет назад
github логотип
GHSA-mvc4-gp8c-r52f

Node.js before 4.8.5, 6.x before 6.11.5, and 8.x before 8.8.0 allows remote attackers to cause a denial of service (uncaught exception and crash) by leveraging a change in the zlib module 1.2.9 making 8 an invalid value for the windowBits parameter.

CVSS3: 7.5
1%
Низкий
около 3 лет назад
github логотип
GHSA-mfq6-mjjx-mp7f

A cryptographic vulnerability exists in Node.js <19.2.0, <18.14.1, <16.19.1, <14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
github логотип
GHSA-mf6x-7mm4-x2g7

Out-of-bounds Read in stringstream

0%
Низкий
почти 6 лет назад
github логотип
GHSA-m27w-wvc9-v4mq

The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: ``` --allow-fs-read=/home/node/.ssh/*.pub ``` will ignore `pub` and give access to everything after `.ssh/`. This misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 5
0%
Низкий
больше 1 года назад
github логотип
GHSA-jvqw-9mq6-23h9

A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process's stack memory to locate the permission model Permission::enabled_ in the host process's heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-jr5v-587f-389p

Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.

CVSS3: 7.5
1%
Низкий
около 3 лет назад
github логотип
GHSA-jjv7-qpx3-h62q

Denial-of-Service Memory Exhaustion in qs

1%
Низкий
больше 7 лет назад
github логотип
GHSA-jfr7-p3h5-mh28

All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.

CVSS3: 7.5
1%
Низкий
около 3 лет назад
github логотип
GHSA-j4wx-39fg-h554

Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

CVSS3: 7.5
0%
Низкий
около 3 лет назад

Уязвимостей на страницу