Show filters
329 Total Results
Displaying 11-20 of 329
Sort by:
Attacker Value
Unknown

CVE-2025-23084

Disclosure Date: January 28, 2025 (last updated February 27, 2025)
A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory. On Windows, a path that does not start with the file separator is treated as relative to the current directory. This vulnerability affects Windows users of `path.join` API.
0
Attacker Value
Unknown

CVE-2025-23090

Disclosure Date: January 22, 2025 (last updated February 27, 2025)
With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.
0
Attacker Value
Unknown

CVE-2025-23089

Disclosure Date: January 22, 2025 (last updated March 01, 2025)
** REJECT ** This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities
0
Attacker Value
Unknown

CVE-2025-23088

Disclosure Date: January 22, 2025 (last updated March 01, 2025)
** REJECT ** This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities
0
Attacker Value
Unknown

CVE-2025-23087

Disclosure Date: January 22, 2025 (last updated March 01, 2025)
** REJECT ** This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities
0
Attacker Value
Unknown

CVE-2025-23083

Disclosure Date: January 22, 2025 (last updated February 27, 2025)
With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.
0
Attacker Value
Unknown

CVE-2025-22150

Disclosure Date: January 21, 2025 (last updated February 27, 2025)
Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.
0
Attacker Value
Unknown

CVE-2024-37372

Disclosure Date: January 09, 2025 (last updated February 27, 2025)
The Permission Model assumes that any path starting with two backslashes \ has a four-character prefix that can be ignored, which is not always true. This subtle bug leads to vulnerable edge cases.
0
Attacker Value
Unknown

CVE-2024-27980

Disclosure Date: January 09, 2025 (last updated February 27, 2025)
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
0
Attacker Value
Unknown

CVE-2024-36138

Disclosure Date: September 07, 2024 (last updated February 26, 2025)
Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
0