Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown
CVE-2025-24791
Disclosure Date: January 29, 2025 (last updated January 30, 2025)
snowflake-connector-nodejs is a NodeJS driver for Snowflake. Snowflake discovered and remediated a vulnerability in the Snowflake NodeJS Driver. File permissions checks of the temporary credential cache could be bypassed by an attacker with write access to the local cache directory. This vulnerability affects versions 1.12.0 through 2.0.1 on Linux. Snowflake fixed the issue in version 2.0.2.
0
Attacker Value
Unknown
CVE-2023-46809
Disclosure Date: September 07, 2024 (last updated September 08, 2024)
Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.
0
Attacker Value
Unknown
CVE-2023-40340
Disclosure Date: August 16, 2023 (last updated October 08, 2023)
Jenkins NodeJS Plugin 1.6.0 and earlier does not properly mask (i.e., replace with asterisks) credentials specified in the Npm config file in Pipeline build logs.
0
Attacker Value
Unknown
CVE-2023-26563
Disclosure Date: July 12, 2023 (last updated October 08, 2023)
The Syncfusion EJ2 Node File Provider 0102271 is vulnerable to filesystem-server.js directory traversal. As a result, an unauthenticated attacker can: - On Windows, list files in any directory, read any file, delete any file, upload any file to any directory accessible by the web server. - On Linux, read any file, download any directory, delete any file, upload any file to any directory accessible by the web server.
0
Attacker Value
Unknown
CVE-2020-7596
Disclosure Date: January 25, 2020 (last updated February 21, 2025)
Codecov npm module before 3.6.2 allows remote attackers to execute arbitrary commands via the "gcov-args" argument.
0
Attacker Value
Unknown
CVE-2017-7474
Disclosure Date: May 12, 2017 (last updated November 26, 2024)
It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.
0
Attacker Value
Unknown
CVE-2014-5256
Disclosure Date: September 05, 2014 (last updated October 05, 2023)
Node.js 0.8 before 0.8.28 and 0.10 before 0.10.30 does not consider the possibility of recursive processing that triggers V8 garbage collection in conjunction with a V8 interrupt, which allows remote attackers to cause a denial of service (memory corruption and application crash) via deep JSON objects whose parsing lets this interrupt mask an overflow of the program stack.
0
Attacker Value
Unknown
CVE-2013-4450
Disclosure Date: October 21, 2013 (last updated October 05, 2023)
The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response.
0
Attacker Value
Unknown
CVE-2012-2330
Disclosure Date: August 13, 2012 (last updated October 04, 2023)
The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.
0