Логотип exploitDog
bind:"CVE-2023-44487" OR bind:"CVE-2023-39333" OR bind:"CVE-2023-38552" OR bind:"CVE-2023-45143"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-44487" OR bind:"CVE-2023-39333" OR bind:"CVE-2023-38552" OR bind:"CVE-2023-45143"

Количество 117

Количество 117

oracle-oval логотип

ELSA-2023-13054

почти 2 года назад

ELSA-2023-13054: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-13053

почти 2 года назад

ELSA-2023-13053: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-13029

около 2 лет назад

ELSA-2023-13029: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-13028

около 2 лет назад

ELSA-2023-13028: olcne security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3094-1

больше 1 года назад

Security update for kubernetes1.26

EPSS: Низкий
oracle-oval логотип

ELSA-2023-5738

около 2 лет назад

ELSA-2023-5738: go-toolset and golang security and bug fix update (IMPORTANT)

EPSS: Низкий
github логотип

GHSA-wj24-gwh6-mgh8

больше 1 года назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-08046

больше 2 лет назад

Уязвимость модуля WebAssembly программной платформы Node.js, позволяющая нарушителю выполнить произвольные команды

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3344-1

около 1 года назад

Security update for kubernetes1.25

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3342-1

около 1 года назад

Security update for kubernetes1.24

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3098-1

больше 1 года назад

Security update for kubernetes1.27

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3097-1

больше 1 года назад

Security update for kubernetes1.28

EPSS: Низкий
redos логотип

ROS-20250619-04

6 месяцев назад

Множественные уязвимости kubernetes

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0573-1

почти 2 года назад

Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4472-1

около 2 лет назад

Security update for go1.20-openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4210-1

около 2 лет назад

Security update for jetty-minimal

EPSS: Низкий
redos логотип

ROS-20240826-01

больше 1 года назад

Множественные уязвимости packer

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20240423-01

больше 1 года назад

Множественные уязвимости varnish

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-45143

около 2 лет назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
EPSS: Низкий
redhat логотип

CVE-2023-45143

около 2 лет назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-13054

ELSA-2023-13054: conmon security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2023-13053

ELSA-2023-13053: conmon security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2023-13029

ELSA-2023-13029: olcne security update (IMPORTANT)

около 2 лет назад
oracle-oval логотип
ELSA-2023-13028

ELSA-2023-13028: olcne security update (IMPORTANT)

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:3094-1

Security update for kubernetes1.26

больше 1 года назад
oracle-oval логотип
ELSA-2023-5738

ELSA-2023-5738: go-toolset and golang security and bug fix update (IMPORTANT)

около 2 лет назад
github логотип
GHSA-wj24-gwh6-mgh8

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2023-08046

Уязвимость модуля WebAssembly программной платформы Node.js, позволяющая нарушителю выполнить произвольные команды

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:3344-1

Security update for kubernetes1.25

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3342-1

Security update for kubernetes1.24

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3098-1

Security update for kubernetes1.27

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3097-1

Security update for kubernetes1.28

больше 1 года назад
redos логотип
ROS-20250619-04

Множественные уязвимости kubernetes

CVSS3: 7.5
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:0573-1

Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:4472-1

Security update for go1.20-openssl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4210-1

Security update for jetty-minimal

около 2 лет назад
redos логотип
ROS-20240826-01

Множественные уязвимости packer

CVSS3: 7.5
больше 1 года назад
redos логотип
ROS-20240423-01

Множественные уязвимости varnish

CVSS3: 7.5
больше 1 года назад
ubuntu логотип
CVE-2023-45143

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-45143

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
0%
Низкий
около 2 лет назад

Уязвимостей на страницу