Nodejs

Node.Js

174 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.44%
  • Veröffentlicht 18.10.2023 04:15:11
  • Zuletzt bearbeitet 03.11.2025 22:16:25

A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility fu...

  • EPSS 0.35%
  • Veröffentlicht 18.10.2023 04:15:11
  • Zuletzt bearbeitet 03.11.2025 22:16:25

Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer...

Warnung Medienbericht Exploit
  • EPSS 94.36%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 07.11.2025 19:00:41

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 12.09.2023 02:15:12
  • Zuletzt bearbeitet 21.11.2024 08:03:35

The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. This vulnerability affects all users using the experimental permission model in Node.js 20.x. Please note that at the time this CVE was issue...

Exploit
  • EPSS 0.74%
  • Veröffentlicht 12.09.2023 02:15:11
  • Zuletzt bearbeitet 05.05.2025 14:15:28

A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument. This flaw arises from an inadequate permission model that fails to restrict ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 24.08.2023 02:15:09
  • Zuletzt bearbeitet 04.11.2025 17:15:37

A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and ev...

  • EPSS 0.04%
  • Veröffentlicht 21.08.2023 17:15:47
  • Zuletzt bearbeitet 02.07.2025 15:15:23

The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x,...

  • EPSS 0.08%
  • Veröffentlicht 15.08.2023 16:15:11
  • Zuletzt bearbeitet 08.05.2025 16:15:23

A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of Buffers in file system APIs causing a traversal path to bypass when verifying file permissions...

  • EPSS 0.04%
  • Veröffentlicht 15.08.2023 16:15:11
  • Zuletzt bearbeitet 08.05.2025 16:15:23

The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active ...

  • EPSS 0.04%
  • Veröffentlicht 15.08.2023 16:15:10
  • Zuletzt bearbeitet 03.07.2025 14:15:24

`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary director...