Show filters
331 Total Results
Displaying 71-80 of 331
Sort by:
Attacker Value
Unknown

CVE-2023-30586

Disclosure Date: July 01, 2023 (last updated February 25, 2025)
A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process's stack memory to locate the permission model Permission::enabled_ in the host process's heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Attacker Value
Unknown

CVE-2023-29566

Disclosure Date: April 24, 2023 (last updated February 24, 2025)
huedawn-tesseract 0.3.3 and dawnsparks-node-tesseract 0.4.0 to 0.4.1 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.
Attacker Value
Unknown

CVE-2023-26110

Disclosure Date: March 09, 2023 (last updated February 24, 2025)
All versions of the package node-bluetooth are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation.
Attacker Value
Unknown

CVE-2023-26109

Disclosure Date: March 09, 2023 (last updated February 24, 2025)
All versions of the package node-bluetooth-serial-port are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation.
Attacker Value
Unknown

CVE-2023-26111

Disclosure Date: March 06, 2023 (last updated February 24, 2025)
All versions of the package @nubosoftware/node-static; all versions of the package node-static are vulnerable to Directory Traversal due to improper file path sanitization in the startsWith() method in the servePath function.
Attacker Value
Unknown

CVE-2023-23920

Disclosure Date: February 23, 2023 (last updated February 24, 2025)
An untrusted search path vulnerability exists in Node.js. <19.6.1, <18.14.1, <16.19.1, and <14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.
Attacker Value
Unknown

CVE-2023-23919

Disclosure Date: February 23, 2023 (last updated February 24, 2025)
A cryptographic vulnerability exists in Node.js <19.2.0, <18.14.1, <16.19.1, <14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.
Attacker Value
Unknown

CVE-2023-23918

Disclosure Date: February 23, 2023 (last updated February 24, 2025)
A privilege escalation vulnerability exists in Node.js <19.6.1, <18.14.1, <16.19.1 and <14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.
Attacker Value
Unknown

CVE-2023-24807

Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
Attacker Value
Unknown

CVE-2023-23936

Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.