Nodejs

Node.Js

174 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.13%
  • Veröffentlicht 24.02.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:31:10

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an inje...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 24.02.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:31:10

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a m...

  • EPSS 17.58%
  • Veröffentlicht 14.12.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:36:47

Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 23.11.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:22:07

A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulner...

  • EPSS 0.35%
  • Veröffentlicht 07.10.2021 14:15:08
  • Zuletzt bearbeitet 21.11.2024 05:50:56

Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.

Exploit
  • EPSS 0.71%
  • Veröffentlicht 16.08.2021 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:50:57

Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostna...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 16.08.2021 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:50:58

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

  • EPSS 0.41%
  • Veröffentlicht 16.08.2021 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:50:58

Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.

Exploit
  • EPSS 0.41%
  • Veröffentlicht 12.07.2021 11:15:08
  • Zuletzt bearbeitet 21.11.2024 05:50:55

Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker t...

Exploit
  • EPSS 0.72%
  • Veröffentlicht 12.07.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 05:50:54

Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointe...