Nodejs

Node.Js

167 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.83%
  • Veröffentlicht 10.04.2024 16:15:16
  • Zuletzt bearbeitet 25.06.2025 20:24:12

A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.

  • EPSS 0.64%
  • Veröffentlicht 19.03.2024 05:15:10
  • Zuletzt bearbeitet 21.11.2024 08:55:24

setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid(). This vuln...

  • EPSS 0.47%
  • Veröffentlicht 19.03.2024 05:15:10
  • Zuletzt bearbeitet 21.11.2024 08:55:25

A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fact that the fetch(...

  • EPSS 0.77%
  • Veröffentlicht 20.02.2024 02:15:50
  • Zuletzt bearbeitet 12.02.2025 14:59:58

The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: ``` --allow-fs-read=/home/node/.ssh/*.pub ``` will ignore `pub` and give access to everything a...

  • EPSS 0.13%
  • Veröffentlicht 20.02.2024 02:15:50
  • Zuletzt bearbeitet 28.03.2025 19:15:19

Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulne...

  • EPSS 0.25%
  • Veröffentlicht 20.02.2024 02:15:50
  • Zuletzt bearbeitet 13.03.2025 15:15:41

On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of th...

  • EPSS 0.88%
  • Veröffentlicht 20.02.2024 02:15:50
  • Zuletzt bearbeitet 02.04.2025 20:09:59

The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.r...

  • EPSS 0.11%
  • Veröffentlicht 20.02.2024 02:15:50
  • Zuletzt bearbeitet 02.04.2025 20:10:16

A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connect...

  • EPSS 0.02%
  • Veröffentlicht 28.11.2023 20:15:07
  • Zuletzt bearbeitet 21.11.2024 08:00:28

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the...

  • EPSS 0.64%
  • Veröffentlicht 28.11.2023 20:15:07
  • Zuletzt bearbeitet 21.11.2024 08:00:28

The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding publ...