Логотип exploitDog
bind:"BDU:2023-08046" OR bind:"CVE-2023-39333"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-08046" OR bind:"CVE-2023-39333"

Количество 18

Количество 18

fstec логотип

BDU:2023-08046

больше 2 лет назад

Уязвимость модуля WebAssembly программной платформы Node.js, позволяющая нарушителю выполнить произвольные команды

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20240916-03

около 1 года назад

Множественные уязвимости nodejs

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-39333

больше 1 года назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-39333

около 2 лет назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-39333

больше 1 года назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-39333

больше 1 года назад

Maliciously crafted export names in an imported WebAssembly module can ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-wj24-gwh6-mgh8

больше 1 года назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4207-1

около 2 лет назад

Security update for nodejs18

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4155-1

около 2 лет назад

Security update for nodejs18

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4150-1

около 2 лет назад

Security update for nodejs18

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4133-1

около 2 лет назад

Security update for nodejs18

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4132-1

около 2 лет назад

Security update for nodejs18

EPSS: Низкий
rocky логотип

RLSA-2023:5869

9 дней назад

Important: nodejs:18 security update

EPSS: Низкий
rocky логотип

RLSA-2023:5849

9 дней назад

Important: nodejs:18 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-5869

около 2 лет назад

ELSA-2023-5869: nodejs:18 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-5849

около 2 лет назад

ELSA-2023-5849: 18 security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2023:7205

около 2 лет назад

Important: nodejs:20 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7205

около 2 лет назад

ELSA-2023-7205: nodejs:20 security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-08046

Уязвимость модуля WebAssembly программной платформы Node.js, позволяющая нарушителю выполнить произвольные команды

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20240916-03

Множественные уязвимости nodejs

CVSS3: 7.5
около 1 года назад
ubuntu логотип
CVE-2023-39333

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-39333

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-39333

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-39333

Maliciously crafted export names in an imported WebAssembly module can ...

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-wj24-gwh6-mgh8

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4207-1

Security update for nodejs18

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4155-1

Security update for nodejs18

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4150-1

Security update for nodejs18

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4133-1

Security update for nodejs18

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4132-1

Security update for nodejs18

около 2 лет назад
rocky логотип
RLSA-2023:5869

Important: nodejs:18 security update

9 дней назад
rocky логотип
RLSA-2023:5849

Important: nodejs:18 security update

9 дней назад
oracle-oval логотип
ELSA-2023-5869

ELSA-2023-5869: nodejs:18 security update (IMPORTANT)

около 2 лет назад
oracle-oval логотип
ELSA-2023-5849

ELSA-2023-5849: 18 security update (IMPORTANT)

около 2 лет назад
rocky логотип
RLSA-2023:7205

Important: nodejs:20 security update

около 2 лет назад
oracle-oval логотип
ELSA-2023-7205

ELSA-2023-7205: nodejs:20 security update (IMPORTANT)

около 2 лет назад

Уязвимостей на страницу