Логотип exploitDog
bind:"CVE-2023-44487" OR bind:"CVE-2023-39333" OR bind:"CVE-2023-38552" OR bind:"CVE-2023-45143"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-44487" OR bind:"CVE-2023-39333" OR bind:"CVE-2023-38552" OR bind:"CVE-2023-45143"

Количество 107

Количество 107

suse-cvrf логотип

SUSE-SU-2024:3342-1

9 месяцев назад

Security update for kubernetes1.24

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3098-1

10 месяцев назад

Security update for kubernetes1.27

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3097-1

10 месяцев назад

Security update for kubernetes1.28

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0573-1

больше 1 года назад

Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4472-1

больше 1 года назад

Security update for go1.20-openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4210-1

больше 1 года назад

Security update for jetty-minimal

EPSS: Низкий
redos логотип

ROS-20240826-01

10 месяцев назад

Множественные уязвимости packer

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20240423-01

около 1 года назад

Множественные уязвимости varnish

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-45143

больше 1 года назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
EPSS: Низкий
redhat логотип

CVE-2023-45143

больше 1 года назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
EPSS: Низкий
nvd логотип

CVE-2023-45143

больше 1 года назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
EPSS: Низкий
msrc логотип

CVE-2023-45143

больше 1 года назад

CVSS3: 3.5
EPSS: Низкий
debian логотип

CVE-2023-45143

больше 1 года назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior t ...

CVSS3: 3.9
EPSS: Низкий
ubuntu логотип

CVE-2023-38552

больше 1 года назад

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-38552

больше 1 года назад

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-38552

больше 1 года назад

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-38552

больше 1 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-38552

больше 1 года назад

When the Node.js policy feature checks the integrity of a resource aga ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3343-1

9 месяцев назад

Security update for kubernetes1.24

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3341-1

9 месяцев назад

Security update for kubernetes1.23

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2024:3342-1

Security update for kubernetes1.24

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3098-1

Security update for kubernetes1.27

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3097-1

Security update for kubernetes1.28

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:0573-1

Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4472-1

Security update for go1.20-openssl

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4210-1

Security update for jetty-minimal

больше 1 года назад
redos логотип
ROS-20240826-01

Множественные уязвимости packer

CVSS3: 7.5
10 месяцев назад
redos логотип
ROS-20240423-01

Множественные уязвимости varnish

CVSS3: 7.5
около 1 года назад
ubuntu логотип
CVE-2023-45143

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-45143

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-45143

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 3.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-45143

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior t ...

CVSS3: 3.9
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 7.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource aga ...

CVSS3: 7.5
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3343-1

Security update for kubernetes1.24

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3341-1

Security update for kubernetes1.23

9 месяцев назад

Уязвимостей на страницу