Show filters
50 Total Results
Displaying 11-20 of 50
Sort by:
Attacker Value
Unknown
CVE-2024-47156
Disclosure Date: December 26, 2024 (last updated January 05, 2025)
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
0
Attacker Value
Unknown
CVE-2024-47151
Disclosure Date: December 26, 2024 (last updated January 05, 2025)
Some Honor products are affected by file writing vulnerability, successful exploitation could cause code execution
0
Attacker Value
Unknown
CVE-2024-48913
Disclosure Date: October 15, 2024 (last updated October 16, 2024)
Hono, a web framework, prior to version 4.6.5 is vulnerable to bypass of cross-site request forgery (CSRF) middleware by a request without Content-Type header. Although the CSRF middleware verifies the Content-Type Header, Hono always considers a request without a Content-Type header to be safe. This can allow an attacker to bypass CSRF protection implemented with Hono CSRF middleware. Version 4.6.5 fixes this issue.
0
Attacker Value
Unknown
CVE-2024-43787
Disclosure Date: August 22, 2024 (last updated August 23, 2024)
Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8.
0
Attacker Value
Unknown
CVE-2024-32869
Disclosure Date: April 23, 2024 (last updated April 24, 2024)
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected files. Version 4.2.7 contains a patch for the issue.
0
Attacker Value
Unknown
CVE-2024-32652
Disclosure Date: April 19, 2024 (last updated April 20, 2024)
The adapter @hono/node-server allows you to run your Hono application on Node.js. Prior to 1.10.1, the application hangs when receiving a Host header with a value that `@hono/node-server` can't handle well. Invalid values are those that cannot be parsed by the `URL` as a hostname such as an empty string, slashes `/`, and other strings. The version 1.10.1 includes the fix for this issue.
0
Attacker Value
Unknown
CVE-2024-23340
Disclosure Date: January 22, 2024 (last updated January 31, 2024)
@hono/node-server is an adapter that allows users to run Hono applications on Node.js. Since v1.3.0, @hono/node-server has used its own Request object with `url` behavior that is unexpected. In the standard API, if the URL contains `..`, here called "double dots", the URL string returned by Request will be in the resolved path. However, the `url` in @hono/node-server's Request as does not resolve double dots, so `http://localhost/static/.. /foo.txt` is returned. This causes vulnerabilities when using `serveStatic`. Modern web browsers and a latest `curl` command resolve double dots on the client side, so this issue doesn't affect those using either of those tools. However, problems may occur if accessed by a client that does not resolve them. Version 1.4.1 includes the change to fix this issue. As a workaround, don't use `serveStatic`.
0
Attacker Value
Unknown
CVE-2023-6939
Disclosure Date: December 29, 2023 (last updated January 06, 2024)
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause denial of service.
0
Attacker Value
Unknown
CVE-2023-51435
Disclosure Date: December 29, 2023 (last updated January 06, 2024)
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause information leak.
0
Attacker Value
Unknown
CVE-2023-51434
Disclosure Date: December 29, 2023 (last updated January 06, 2024)
Some Honor products are affected by buffer overflow vulnerability, successful exploitation could cause code execution.
0