Количество 107
Количество 107

SUSE-SU-2024:3342-1
Security update for kubernetes1.24

SUSE-SU-2024:3098-1
Security update for kubernetes1.27

SUSE-SU-2024:3097-1
Security update for kubernetes1.28

SUSE-SU-2024:0573-1
Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2

SUSE-SU-2023:4472-1
Security update for go1.20-openssl

SUSE-SU-2023:4210-1
Security update for jetty-minimal

ROS-20240826-01
Множественные уязвимости packer

ROS-20240423-01
Множественные уязвимости varnish

CVE-2023-45143
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVE-2023-45143
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVE-2023-45143
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVE-2023-45143
CVE-2023-45143
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior t ...

CVE-2023-38552
When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVE-2023-38552
When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVE-2023-38552
When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVE-2023-38552
CVE-2023-38552
When the Node.js policy feature checks the integrity of a resource aga ...

SUSE-SU-2024:3343-1
Security update for kubernetes1.24

SUSE-SU-2024:3341-1
Security update for kubernetes1.23
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2024:3342-1 Security update for kubernetes1.24 | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3098-1 Security update for kubernetes1.27 | 10 месяцев назад | ||
![]() | SUSE-SU-2024:3097-1 Security update for kubernetes1.28 | 10 месяцев назад | ||
![]() | SUSE-SU-2024:0573-1 Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 | больше 1 года назад | ||
![]() | SUSE-SU-2023:4472-1 Security update for go1.20-openssl | больше 1 года назад | ||
![]() | SUSE-SU-2023:4210-1 Security update for jetty-minimal | больше 1 года назад | ||
![]() | ROS-20240826-01 Множественные уязвимости packer | CVSS3: 7.5 | 10 месяцев назад | |
![]() | ROS-20240423-01 Множественные уязвимости varnish | CVSS3: 7.5 | около 1 года назад | |
![]() | CVE-2023-45143 Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds. | CVSS3: 3.9 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45143 Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds. | CVSS3: 3.9 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45143 Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds. | CVSS3: 3.9 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 3.5 | 0% Низкий | больше 1 года назад | |
CVE-2023-45143 Undici is an HTTP/1.1 client written from scratch for Node.js. Prior t ... | CVSS3: 3.9 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2023-38552 When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-38552 When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-38552 When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
CVE-2023-38552 When the Node.js policy feature checks the integrity of a resource aga ... | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:3343-1 Security update for kubernetes1.24 | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3341-1 Security update for kubernetes1.23 | 9 месяцев назад |
Уязвимостей на страницу