CVE-2023-30587
- EPSS 0.02%
- Veröffentlicht 07.09.2024 16:15:02
- Zuletzt bearbeitet 21.11.2024 08:00:28
A vulnerability in Node.js version 20 allows for bypassing restrictions set by the --experimental-permission flag using the built-in inspector module (node:inspector). By exploiting the Worker class's ability to create an "internal worker" with the ...
CVE-2023-30584
- EPSS 0.02%
- Veröffentlicht 07.09.2024 16:15:02
- Zuletzt bearbeitet 21.11.2024 08:00:27
A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of path traversal bypass when verifying file permissions. Please note that at the time this CVE ...
CVE-2023-30582
- EPSS 0.06%
- Veröffentlicht 07.09.2024 16:15:02
- Zuletzt bearbeitet 21.11.2024 08:00:27
A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument. This flaw arises from an inadequate permission model that fails to restrict f...
CVE-2024-22018
- EPSS 0.16%
- Veröffentlicht 10.07.2024 02:15:03
- Zuletzt bearbeitet 21.11.2024 08:55:24
A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat AP...
CVE-2024-22020
- EPSS 0.11%
- Veröffentlicht 09.07.2024 02:15:09
- Zuletzt bearbeitet 14.03.2025 19:15:44
A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitig...
CVE-2024-3566
- EPSS 5.83%
- Veröffentlicht 10.04.2024 16:15:16
- Zuletzt bearbeitet 25.06.2025 20:24:12
A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.
CVE-2024-27983
- EPSS 61.68%
- Veröffentlicht 09.04.2024 01:15:49
- Zuletzt bearbeitet 14.03.2025 18:15:27
An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINU...
CVE-2024-22025
- EPSS 0.47%
- Veröffentlicht 19.03.2024 05:15:10
- Zuletzt bearbeitet 21.11.2024 08:55:25
A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fact that the fetch(...
CVE-2024-22017
- EPSS 0.64%
- Veröffentlicht 19.03.2024 05:15:10
- Zuletzt bearbeitet 21.11.2024 08:55:24
setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid(). This vuln...
CVE-2024-21896
- EPSS 0.88%
- Veröffentlicht 20.02.2024 02:15:50
- Zuletzt bearbeitet 02.04.2025 20:09:59
The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.r...