Show filters
234 Total Results
Displaying 61-70 of 234
Sort by:
Attacker Value
Unknown
CVE-2023-29827
Disclosure Date: May 04, 2023 (last updated February 24, 2025)
ejs v3.1.9 is vulnerable to server-side template injection. If the ejs file is controllable, template injection can be implemented through the configuration settings of the closeDelimiter parameter. NOTE: this is disputed by the vendor because the render function is not intended to be used with untrusted input.
0
Attacker Value
Unknown
CVE-2023-23920
Disclosure Date: February 23, 2023 (last updated February 24, 2025)
An untrusted search path vulnerability exists in Node.js. <19.6.1, <18.14.1, <16.19.1, and <14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.
0
Attacker Value
Unknown
CVE-2023-23919
Disclosure Date: February 23, 2023 (last updated February 24, 2025)
A cryptographic vulnerability exists in Node.js <19.2.0, <18.14.1, <16.19.1, <14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.
0
Attacker Value
Unknown
CVE-2023-23918
Disclosure Date: February 23, 2023 (last updated February 24, 2025)
A privilege escalation vulnerability exists in Node.js <19.6.1, <18.14.1, <16.19.1 and <14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.
0
Attacker Value
Unknown
CVE-2023-25813
Disclosure Date: February 22, 2023 (last updated February 24, 2025)
Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the `replacements` and the `where` option in the same query.
0
Attacker Value
Unknown
CVE-2023-24807
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
0
Attacker Value
Unknown
CVE-2023-23936
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.
0
Attacker Value
Unknown
CVE-2023-22580
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Due to improper input filtering in the sequalize js library, can malicious queries lead to sensitive information disclosure.
0
Attacker Value
Unknown
CVE-2023-22579
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Due to improper parameter filtering in the sequalize js library, can a attacker peform injection.
0
Attacker Value
Unknown
CVE-2023-22578
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Due to improper artibute filtering in the sequalize js library, can a attacker peform SQL injections.
0