Логотип exploitDog
bind:"CVE-2024-21896"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-21896"

Количество 10

Количество 10

ubuntu логотип

CVE-2024-21896

больше 1 года назад

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2024-21896

больше 1 года назад

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.9
EPSS: Низкий
nvd логотип

CVE-2024-21896

больше 1 года назад

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2024-21896

12 месяцев назад

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2024-21896

больше 1 года назад

The permission model protects itself against path traversal attacks by ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-3q5r-g7hx-jv3c

больше 1 года назад

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.9
EPSS: Низкий
fstec логотип

BDU:2024-02879

больше 1 года назад

Уязвимость функции path.resolve() модели разрешений программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации

CVSS3: 7.9
EPSS: Низкий
oracle-oval логотип

ELSA-2024-1688

около 1 года назад

ELSA-2024-1688: nodejs:20 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-1687

около 1 года назад

ELSA-2024-1687: nodejs:20 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0643-1

больше 1 года назад

Security update for nodejs20

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-21896

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-21896

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.9
1%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-21896

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 9.8
1%
Низкий
12 месяцев назад
debian логотип
CVE-2024-21896

The permission model protects itself against path traversal attacks by ...

CVSS3: 9.8
1%
Низкий
больше 1 года назад
github логотип
GHSA-3q5r-g7hx-jv3c

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 7.9
1%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-02879

Уязвимость функции path.resolve() модели разрешений программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность, доступность и конфиденциальность защищаемой информации

CVSS3: 7.9
1%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-1688

ELSA-2024-1688: nodejs:20 security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-1687

ELSA-2024-1687: nodejs:20 security update (IMPORTANT)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0643-1

Security update for nodejs20

больше 1 года назад

Уязвимостей на страницу