Количество 117
Количество 117
ELSA-2023-5928
ELSA-2023-5928: tomcat security update (IMPORTANT)
ELSA-2023-5924
ELSA-2023-5924: varnish security update (IMPORTANT)
ELSA-2023-5850
ELSA-2023-5850: nodejs:16 security update (IMPORTANT)
ELSA-2023-5838
ELSA-2023-5838: nghttp2 security update (IMPORTANT)
ELSA-2023-5837
ELSA-2023-5837: nghttp2 security update (IMPORTANT)
ELSA-2023-5765
ELSA-2023-5765: nodejs security update (IMPORTANT)
ELSA-2023-5749
ELSA-2023-5749: .NET 7.0 security update (IMPORTANT)
ELSA-2023-5713
ELSA-2023-5713: nginx:1.22 security update (MODERATE)
ELSA-2023-5712
ELSA-2023-5712: nginx:1.20 security update (MODERATE)
ELSA-2023-5711
ELSA-2023-5711: nginx security update (MODERATE)
ELSA-2023-5710
ELSA-2023-5710: dotnet6.0 security update (IMPORTANT)
ELSA-2023-5709
ELSA-2023-5709: dotnet7.0 security update (IMPORTANT)
ELSA-2023-5708
ELSA-2023-5708: dotnet6.0 security update (IMPORTANT)
BDU:2023-06559
Уязвимость реализации протокола HTTP/2, связанная с возможностью формирования потока запросов в рамках уже установленного сетевого соединения, без открытия новых сетевых соединений и без подтверждения получения пакетов, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.
CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.
CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.
CVE-2023-39333
Maliciously crafted export names in an imported WebAssembly module can ...
SUSE-SU-2025:0283-1
Security update for nginx
SUSE-SU-2025:0282-1
Security update for nginx
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2023-5928 ELSA-2023-5928: tomcat security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-5924 ELSA-2023-5924: varnish security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-5850 ELSA-2023-5850: nodejs:16 security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-5838 ELSA-2023-5838: nghttp2 security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-5837 ELSA-2023-5837: nghttp2 security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-5765 ELSA-2023-5765: nodejs security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-5749 ELSA-2023-5749: .NET 7.0 security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-5713 ELSA-2023-5713: nginx:1.22 security update (MODERATE) | около 2 лет назад | |||
ELSA-2023-5712 ELSA-2023-5712: nginx:1.20 security update (MODERATE) | около 2 лет назад | |||
ELSA-2023-5711 ELSA-2023-5711: nginx security update (MODERATE) | около 2 лет назад | |||
ELSA-2023-5710 ELSA-2023-5710: dotnet6.0 security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-5709 ELSA-2023-5709: dotnet7.0 security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-5708 ELSA-2023-5708: dotnet6.0 security update (IMPORTANT) | около 2 лет назад | |||
BDU:2023-06559 Уязвимость реализации протокола HTTP/2, связанная с возможностью формирования потока запросов в рамках уже установленного сетевого соединения, без открытия новых сетевых соединений и без подтверждения получения пакетов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 94% Критический | около 2 лет назад | |
CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option. | CVSS3: 5.3 | 0% Низкий | около 2 лет назад | |
CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2023-39333 Maliciously crafted export names in an imported WebAssembly module can ... | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2025:0283-1 Security update for nginx | 11 месяцев назад | |||
SUSE-SU-2025:0282-1 Security update for nginx | 11 месяцев назад |
Уязвимостей на страницу