Логотип exploitDog
bind:"CVE-2024-36137" OR bind:"CVE-2024-22020" OR bind:"CVE-2024-22018"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-36137" OR bind:"CVE-2024-22020" OR bind:"CVE-2024-22018"

Количество 28

Количество 28

oracle-oval логотип

ELSA-2024-5815

10 месяцев назад

ELSA-2024-5815: nodejs:20 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-5814

10 месяцев назад

ELSA-2024-5814: nodejs:20 security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2574-1

11 месяцев назад

Security update for nodejs20

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2543-1

11 месяцев назад

Security update for nodejs20

EPSS: Низкий
ubuntu логотип

CVE-2024-36137

9 месяцев назад

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.

CVSS3: 3.3
EPSS: Низкий
redhat логотип

CVE-2024-36137

12 месяцев назад

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.

CVSS3: 3.9
EPSS: Низкий
nvd логотип

CVE-2024-36137

9 месяцев назад

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.

CVSS3: 3.3
EPSS: Низкий
debian логотип

CVE-2024-36137

9 месяцев назад

A vulnerability has been identified in Node.js, affecting users of the ...

CVSS3: 3.3
EPSS: Низкий
github логотип

GHSA-q793-mj5v-wh68

9 месяцев назад

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.

CVSS3: 3.3
EPSS: Низкий
fstec логотип

BDU:2024-05685

около 1 года назад

Уязвимость компонента Permission Model программной платформы Node.js, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

CVSS3: 3.9
EPSS: Низкий
ubuntu логотип

CVE-2024-22018

11 месяцев назад

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 2.9
EPSS: Низкий
redhat логотип

CVE-2024-22018

11 месяцев назад

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 2.9
EPSS: Низкий
nvd логотип

CVE-2024-22018

11 месяцев назад

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 2.9
EPSS: Низкий
debian логотип

CVE-2024-22018

11 месяцев назад

A vulnerability has been identified in Node.js, affecting users of the ...

CVSS3: 2.9
EPSS: Низкий
ubuntu логотип

CVE-2024-22020

12 месяцев назад

A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports. Exploiting this flaw can violate network import security, posing a risk to developers and servers.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2024-22020

12 месяцев назад

A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports. Exploiting this flaw can violate network import security, posing a risk to developers and servers.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-22020

12 месяцев назад

A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports. Exploiting this flaw can violate network import security, posing a risk to developers and servers.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2024-22020

4 месяца назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2024-22020

12 месяцев назад

A security flaw in Node.js allows a bypass of network import restrict ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-9xvm-xmw3-2hm2

11 месяцев назад

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 2.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2024-5815

ELSA-2024-5815: nodejs:20 security update (MODERATE)

10 месяцев назад
oracle-oval логотип
ELSA-2024-5814

ELSA-2024-5814: nodejs:20 security update (MODERATE)

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2574-1

Security update for nodejs20

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2543-1

Security update for nodejs20

11 месяцев назад
ubuntu логотип
CVE-2024-36137

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.

CVSS3: 3.3
0%
Низкий
9 месяцев назад
redhat логотип
CVE-2024-36137

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.

CVSS3: 3.9
0%
Низкий
12 месяцев назад
nvd логотип
CVE-2024-36137

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.

CVSS3: 3.3
0%
Низкий
9 месяцев назад
debian логотип
CVE-2024-36137

A vulnerability has been identified in Node.js, affecting users of the ...

CVSS3: 3.3
0%
Низкий
9 месяцев назад
github логотип
GHSA-q793-mj5v-wh68

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.

CVSS3: 3.3
0%
Низкий
9 месяцев назад
fstec логотип
BDU:2024-05685

Уязвимость компонента Permission Model программной платформы Node.js, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

CVSS3: 3.9
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-22018

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 2.9
0%
Низкий
11 месяцев назад
redhat логотип
CVE-2024-22018

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 2.9
0%
Низкий
11 месяцев назад
nvd логотип
CVE-2024-22018

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 2.9
0%
Низкий
11 месяцев назад
debian логотип
CVE-2024-22018

A vulnerability has been identified in Node.js, affecting users of the ...

CVSS3: 2.9
0%
Низкий
11 месяцев назад
ubuntu логотип
CVE-2024-22020

A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports. Exploiting this flaw can violate network import security, posing a risk to developers and servers.

CVSS3: 6.5
0%
Низкий
12 месяцев назад
redhat логотип
CVE-2024-22020

A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports. Exploiting this flaw can violate network import security, posing a risk to developers and servers.

CVSS3: 6.5
0%
Низкий
12 месяцев назад
nvd логотип
CVE-2024-22020

A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports. Exploiting this flaw can violate network import security, posing a risk to developers and servers.

CVSS3: 6.5
0%
Низкий
12 месяцев назад
msrc логотип
CVSS3: 6.5
0%
Низкий
4 месяца назад
debian логотип
CVE-2024-22020

A security flaw in Node.js allows a bypass of network import restrict ...

CVSS3: 6.5
0%
Низкий
12 месяцев назад
github логотип
GHSA-9xvm-xmw3-2hm2

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

CVSS3: 2.9
0%
Низкий
11 месяцев назад

Уязвимостей на страницу