Количество 108
Количество 108
ELSA-2023-5749
ELSA-2023-5749: .NET 7.0 security update (IMPORTANT)
ELSA-2023-5713
ELSA-2023-5713: nginx:1.22 security update (MODERATE)
ELSA-2023-5712
ELSA-2023-5712: nginx:1.20 security update (MODERATE)
ELSA-2023-5711
ELSA-2023-5711: nginx security update (MODERATE)
ELSA-2023-5710
ELSA-2023-5710: dotnet6.0 security update (IMPORTANT)
ELSA-2023-5709
ELSA-2023-5709: dotnet7.0 security update (IMPORTANT)
ELSA-2023-5708
ELSA-2023-5708: dotnet6.0 security update (IMPORTANT)

BDU:2023-06559
Уязвимость реализации протокола HTTP/2, связанная с возможностью формирования потока запросов в рамках уже установленного сетевого соединения, без открытия новых сетевых соединений и без подтверждения получения пакетов, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.
CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can ...

SUSE-SU-2025:0283-1
Security update for nginx

SUSE-SU-2025:0282-1
Security update for nginx

SUSE-SU-2023:4129-1
Security update for tomcat

SUSE-SU-2023:4069-1
Security update for go1.21

SUSE-SU-2023:4068-1
Security update for go1.20

ROS-20250515-06
Уязвимость tomcat

ROS-20240917-09
Уязвимость netty

ROS-20240805-01
Уязвимость terraform
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2023-5749 ELSA-2023-5749: .NET 7.0 security update (IMPORTANT) | почти 2 года назад | |||
ELSA-2023-5713 ELSA-2023-5713: nginx:1.22 security update (MODERATE) | почти 2 года назад | |||
ELSA-2023-5712 ELSA-2023-5712: nginx:1.20 security update (MODERATE) | почти 2 года назад | |||
ELSA-2023-5711 ELSA-2023-5711: nginx security update (MODERATE) | почти 2 года назад | |||
ELSA-2023-5710 ELSA-2023-5710: dotnet6.0 security update (IMPORTANT) | почти 2 года назад | |||
ELSA-2023-5709 ELSA-2023-5709: dotnet7.0 security update (IMPORTANT) | почти 2 года назад | |||
ELSA-2023-5708 ELSA-2023-5708: dotnet6.0 security update (IMPORTANT) | почти 2 года назад | |||
![]() | BDU:2023-06559 Уязвимость реализации протокола HTTP/2, связанная с возможностью формирования потока запросов в рамках уже установленного сетевого соединения, без открытия новых сетевых соединений и без подтверждения получения пакетов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 94% Критический | почти 2 года назад |
![]() | CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option. | CVSS3: 5.3 | 0% Низкий | 11 месяцев назад |
![]() | CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option. | CVSS3: 5.3 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option. | CVSS3: 5.3 | 0% Низкий | 11 месяцев назад |
CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can ... | CVSS3: 5.3 | 0% Низкий | 11 месяцев назад | |
![]() | SUSE-SU-2025:0283-1 Security update for nginx | 6 месяцев назад | ||
![]() | SUSE-SU-2025:0282-1 Security update for nginx | 6 месяцев назад | ||
![]() | SUSE-SU-2023:4129-1 Security update for tomcat | почти 2 года назад | ||
![]() | SUSE-SU-2023:4069-1 Security update for go1.21 | почти 2 года назад | ||
![]() | SUSE-SU-2023:4068-1 Security update for go1.20 | почти 2 года назад | ||
![]() | ROS-20250515-06 Уязвимость tomcat | CVSS3: 7.5 | 94% Критический | 3 месяца назад |
![]() | ROS-20240917-09 Уязвимость netty | CVSS3: 7.5 | 94% Критический | 11 месяцев назад |
![]() | ROS-20240805-01 Уязвимость terraform | CVSS3: 7.5 | 94% Критический | около 1 года назад |
Уязвимостей на страницу