Lucene search

K

21 matches found

CVE
CVE
added 2023/10/10 2:15 p.m.4425 views

CVE-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

7.5CVSS8AI score0.94434EPSS
CVE
CVE
added 2023/08/24 2:15 a.m.3056 views

CVE-2023-32559

A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding('spawn_s...

7.5CVSS8.7AI score0.00039EPSS
CVE
CVE
added 2023/10/18 4:15 a.m.707 views

CVE-2023-39332

Various node:fs functions allow specifying paths as either strings or Uint8Array objects. In Node.js environments, the Buffer class extends the Uint8Array class. Node.js prevents path traversal through strings (see CVE-2023-30584) and Buffer objects (see CVE-2023-32004), but not through non-Buffer ...

9.8CVSS8.6AI score0.00375EPSS
CVE
CVE
added 2023/10/18 4:15 a.m.688 views

CVE-2023-39331

A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please...

7.7CVSS8.3AI score0.00428EPSS
CVE
CVE
added 2023/08/15 4:15 p.m.633 views

CVE-2023-32006

The use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x. Please note th...

8.8CVSS9.1AI score0.00053EPSS
CVE
CVE
added 2023/08/21 5:15 p.m.623 views

CVE-2023-32002

The use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note that at the time this C...

9.8CVSS9.3AI score0.00026EPSS
CVE
CVE
added 2023/08/15 4:15 p.m.586 views

CVE-2023-32004

A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of Buffers in file system APIs causing a traversal path to bypass when verifying file permissions. This vulnerability affects all users using the ...

8.8CVSS8.8AI score0.00063EPSS
CVE
CVE
added 2023/11/28 8:15 p.m.585 views

CVE-2023-30590

The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivateKey(). However, th...

7.5CVSS7.6AI score0.00637EPSS
CVE
CVE
added 2023/10/18 4:15 a.m.559 views

CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check.Impacts:This vulnerability affects all users us...

7.5CVSS7.3AI score0.00137EPSS
CVE
CVE
added 2023/08/15 4:15 p.m.557 views

CVE-2023-32003

fs.mkdtemp() and fs.mkdtempSync() can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects all users using the exp...

5.3CVSS6.9AI score0.00046EPSS
CVE
CVE
added 2023/07/01 12:15 a.m.436 views

CVE-2023-30589

The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only ...

7.5CVSS7.8AI score0.01916EPSS
CVE
CVE
added 2023/11/28 8:15 p.m.423 views

CVE-2023-30588

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key inf...

5.3CVSS6AI score0.0002EPSS
CVE
CVE
added 2023/11/23 12:15 a.m.410 views

CVE-2023-30581

The use of proto in process.mainModule.proto .require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20. Please note that at the tim...

7.5CVSS7.5AI score0.00014EPSS
CVE
CVE
added 2023/07/01 12:15 a.m.358 views

CVE-2023-30586

A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass ...

7.5CVSS7.4AI score0.00055EPSS
CVE
CVE
added 2023/11/28 2:15 a.m.349 views

CVE-2023-30585

A vulnerability has been identified in the Node.js (.msi version) installation process, specifically affecting Windows users who install Node.js using the .msi installer. This vulnerability emerges during the repair operation, where the "msiexec.exe" process, running under the NT AUTHORITY\SYSTEM c...

7.5CVSS7.3AI score0.01629EPSS
CVE
CVE
added 2023/09/12 2:15 a.m.347 views

CVE-2023-32558

The use of the deprecated API process.binding() can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issued, the permission model is an experimental feature of ...

7.5CVSS8.3AI score0.00142EPSS
CVE
CVE
added 2023/02/23 8:15 p.m.328 views

CVE-2023-23920

An untrusted search path vulnerability exists in Node.js. <19.6.1, <18.14.1, <16.19.1, and

4.2CVSS6.1AI score0.00088EPSS
CVE
CVE
added 2023/02/23 8:15 p.m.327 views

CVE-2023-23918

A privilege escalation vulnerability exists in Node.js <19.6.1, <18.14.1, <16.19.1 and

7.5CVSS8AI score0.00019EPSS
CVE
CVE
added 2023/02/23 8:15 p.m.311 views

CVE-2023-23919

A cryptographic vulnerability exists in Node.js <19.2.0, <18.14.1, <16.19.1,

7.5CVSS7AI score0.00599EPSS
CVE
CVE
added 2023/02/16 6:15 p.m.267 views

CVE-2023-23936

Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect host HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the headers.host string before passing to u...

6.5CVSS6.9AI score0.0048EPSS
CVE
CVE
added 2023/09/12 2:15 a.m.82 views

CVE-2023-32005

A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.statfs API. As a result,...

5.3CVSS6.6AI score0.00622EPSS