Show filters
329 Total Results
Displaying 11-20 of 329
Sort by:
Attacker Value
Unknown
CVE-2025-23084
Disclosure Date: January 28, 2025 (last updated February 27, 2025)
A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory.
On Windows, a path that does not start with the file separator is treated as relative to the current directory.
This vulnerability affects Windows users of `path.join` API.
0
Attacker Value
Unknown
CVE-2025-23090
Disclosure Date: January 22, 2025 (last updated February 27, 2025)
With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers
but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage.
This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.
0
Attacker Value
Unknown
CVE-2025-23089
Disclosure Date: January 22, 2025 (last updated March 01, 2025)
** REJECT ** This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities
0
Attacker Value
Unknown
CVE-2025-23088
Disclosure Date: January 22, 2025 (last updated March 01, 2025)
** REJECT ** This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities
0
Attacker Value
Unknown
CVE-2025-23087
Disclosure Date: January 22, 2025 (last updated March 01, 2025)
** REJECT ** This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities
0
Attacker Value
Unknown
CVE-2025-23083
Disclosure Date: January 22, 2025 (last updated February 27, 2025)
With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage.
This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.
0
Attacker Value
Unknown
CVE-2025-22150
Disclosure Date: January 21, 2025 (last updated February 27, 2025)
Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.
0
Attacker Value
Unknown
CVE-2024-37372
Disclosure Date: January 09, 2025 (last updated February 27, 2025)
The Permission Model assumes that any path starting with two backslashes \ has a four-character prefix that can be ignored, which is not always true. This subtle bug leads to vulnerable edge cases.
0
Attacker Value
Unknown
CVE-2024-27980
Disclosure Date: January 09, 2025 (last updated February 27, 2025)
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
0
Attacker Value
Unknown
CVE-2024-36138
Disclosure Date: September 07, 2024 (last updated February 26, 2025)
Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
0