Skip to content

Latest commit

 

History

History
411 lines (411 loc) · 47.5 KB

File metadata and controls

411 lines (411 loc) · 47.5 KB

Reports in node program:

S.No Title Bounty
1 DNS rebinding in --inspect (insufficient fix of CVE-2018-7160) $500.0
2 Malformed HTTP/2 SETTINGS frame leads to reachable assert $250.0
3 napi_get_value_string_X allow various kinds of memory corruption $250.0
4 Fastify uses allErrors: true ajv configuration by default which is susceptible to DoS $250.0
5 Potential HTTP Request Smuggling in nodejs $250.0
6 DNS Max Responses for DOS $250.0
7 Denial of Service by resource exhaustion CWE-400 due to unfinished HTTP/1.1 requests $250.0
8 Slowloris, body parsing $250.0
9 HTTP Request Smuggling due to accepting space before colon $250.0
10 HTTP Request Smuggling due to ignoring chunk extensions $250.0
11 Built-in TLS module unexpectedly treats "rejectUnauthorized: undefined" as "rejectUnauthorized: false", disabling all certificate validation $150.0
12 [serve-here] Static Web Server Directory Traversal via Crafted GET Request $0.0
13 [featurebook] Specification Server Directory Traversal via Crafted Browser Request $0.0
14 [redis-commander] Reflected SWF XSS via vulnerable "clipboard.swf" component $0.0
15 [lactate] Static Web Server Directory Traversal via Crafted GET Request $0.0
16 [augustine] Static Web Server Directory Traversal via Crafted GET Request $0.0
17 [serve] Directory index of arbitrary folder available due to lack of sanitization of %2e and %2f characters in url $0.0
18 [html-janitor] Bypassing sanitization using DOM clobbering $0.0
19 [html-janitor] Passing user-controlled data to clean() leads to XSS $0.0
20 Prototype pollution attack (lodash) $0.0
21 Prototype pollution attack (Hoek) $0.0
22 Prototype pollution attack (mixin-deep) $0.0
23 Prototype pollution attack (assign-deep) $0.0
24 Prototype pollution attack (merge-deep) $0.0
25 Prototype pollution attack (defaults-deep) $0.0
26 [public] Path Traversal allows to read content of arbitrary files $0.0
27 [crud-file-server] Stored XSS in filenames when directory index is served by crud-file-server $0.0
28 Path Traversal on Resolve-Path $0.0
29 [localhost-now] Path Traversal allows to read content of arbitrary file $0.0
30 [626] Path Traversal allows to read arbitrary file from remote server $0.0
31 [anywhere] An iframe element with url to malicious HTML file (with eg. JavaScript malware) can be used as filename and served via anywhere $0.0
32 [simplehttpserver] Stored XSS in file names leads to malicious JavaScript code execution when directory listing is output in HTML $0.0
33 [hekto] Path Traversal vulnerability allows to read content of arbitrary files $0.0
34 [uppy] Stored XSS due to crafted SVG file $0.0
35 [angular-http-server] Path Traversal in angular-http-server.js allows to read arbitrary file from the remote server $0.0
36 [simple-server] HTML with iframe element can be used as filename, which might lead to load and execute malicious JavaScript $0.0
37 [glance] Path Traversal in glance static file server allows to read content of arbitrary file $0.0
38 [stattic] Inproper path validation leads to Path Traversal and allows to read arbitrary files with any extension(s) $0.0
39 [node-srv] Path Traversal allows to read arbitrary files from remote server $0.0
40 [general-file-server] Path Traversal vulnerability allows to read content on arbitrary file on the server $0.0
41 [serve] Directory listing and File access even when they have been set to be ignored. $0.0
42 [metascraper] Stored XSS in Open Graph meta properties read by metascrapper $0.0
43 whereis concatenates unsanitized input into exec() command $0.0
44 protobufjs is vulnerable to ReDoS when parsing crafted invalid *.proto files $0.0
45 https-proxy-agent passes unsanitized options to Buffer(arg), resulting in DoS and uninitialized memory leak $0.0
46 [crud-file-server] Path Traversal allows to read arbitrary file from the server $0.0
47 sshpk is vulnerable to ReDoS when parsing crafted invalid public keys $0.0
48 http-proxy-agent passes unsanitized options to Buffer(arg), resulting in DoS and uninitialized memory leak $0.0
49 atob allocates uninitialized Buffers when number is passed in input on Node.js 4.x and below $0.0
50 [bracket-template] Reflected XSS possible when variable passed via GET parameter is used in template $0.0
51 [public] Stored XSS in filenames in directory served by public $0.0
52 [glance] Stored XSS via file name allows to run arbitrary JavaScript when directory listing is displayed in browser $0.0
53 Prototype pollution attack (deap) $0.0
54 Prototype pollution attack (deep-extend) $0.0
55 Prototype pollution attack (merge-recursive) $0.0
56 Prototype pollution attack (merge-options) $0.0
57 Prototype pollution attack (merge-objects) $0.0
58 [pdfinfojs] Command Injection on filename parameter $0.0
59 [mcstatic] Path Traversal allows to read content of arbitrary files $0.0
60 [cloudcmd] Stored XSS in the filename when directories listing $0.0
61 [angular-http-server] Server Directory Traversal $0.0
62 concat-with-sourcemaps allocates uninitialized Buffers when number is passed as a separator $0.0
63 foreman is vulnerable to ReDoS in path $0.0
64 superstatic is vulnerable to path traversal on Windows $0.0
65 stringstream allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below $0.0
66 fs-path concatenates unsanitized input into exec()/execSync() commands $0.0
67 Bypass to defective fix of Path Traversal $0.0
68 [buttle] Remote Command Execution via unsanitized PHP filename when it's run with --php-bin flag $0.0
69 command-exists concatenates unsanitized input into exec()/execSync() commands $0.0
70 macaddress concatenates unsanitized input into exec() command $0.0
71 base64url allocates uninitialized Buffers when number is passed in input on Node.js 4.x and below $0.0
72 byte allocates uninitialized buffers and reads data from them past the initialized length $0.0
73 npmconf (and npm js api) allocate and write to disk uninitialized memory content when a typed number is passed as input on Node.js 4.x $0.0
74 sql does not properly escape parameters when building SQL queries, resulting in potential SQLi $0.0
75 base64-url below 2.0 allocates uninitialized Buffers when number is passed in input $0.0
76 The react-marked-markdown module allows XSS injection in href values. $0.0
77 [query-mysql] SQL Injection due to lack of user input sanitization allows to run arbitrary SQL queries when fetching data from database $0.0
78 [html-pages] Path Traversal in html-pages module allows to read any file from the server with curl $0.0
79 [hekto] open redirect when target domain name is used as html filename on server $0.0
80 [sexstatic] HTML injection in directory name(s) leads to Stored XSS when malicious file is embed with <iframe> element used in directory name $0.0
81 Command injection in 'pdf-image' $0.0
82 [serve] Directory listing and File access even when they have been set to be ignored (using dot-slash) $0.0
83 [localhost-now] bypassing url filter which leads to read content of arbitrary file $0.0
84 [serve] Directory listing and File access even when they have been set to be ignored $0.0
85 Unrestricted file upload (RCE) $0.0
86 registry.nodejs.org Subdomain Takeover $0.0
87 [public] Stored XSS in the filename when directories listing $0.0
88 [html-pages] Stored XSS in the filename when directories listing $0.0
89 [mcstatic] Server Directory Traversal $0.0
90 put allocates uninitialized Buffers when non-round numbers are passed in input $0.0
91 utile allocates uninitialized Buffers when number is passed in input $0.0
92 [file-static-server] Path Traversal allows to read content of arbitrary file on the server $0.0
93 Remote Command Execution vulnerability in pullit $0.0
94 njwt allocates uninitialized Buffers when number is passed in base64urlEncode input $0.0
95 Insecure implementation of deserialization in funcster $0.0
96 [git-dummy-commit] Command injection on the msg parameter $0.0
97 npm packages that overlap with core node packages $0.0
98 Insecure implementation of deserialization in cryo $0.0
99 [buttle] Path traversal in mid-buttle module allows to read any file in the server. $0.0
100 memjs allocates and stores buffers on typed input, resulting in DoS and uninitialized memory usage $0.0
101 Privilage escalation with malicious .npmrc $0.0
102 [serve] Server Directory Traversal $0.0
103 [buttle] HTML Injection in filename leads to XSS when directory listing is displayed in the browser $0.0
104 [bruteser] Path Traversal allows to read content of arbitrary file $0.0
105 XSS in express-useragent through HTTP User-Agent $0.0
106 Privilege escalation allows any user to add an administrator $0.0
107 [m-server] Path Traversal allows to display content of arbitrary file(s) from the server $0.0
108 [m-server] HTML Injection in filenames displayed as directory listing in the browser allows to embed iframe with malicious JavaScript code $0.0
109 [statics-server] XSS via injected iframe in file name when statics-server displays directory index in the browser $0.0
110 Your page has 2 blocking CSS resources. This causes a delay in rendering your page. $0.0
111 [entitlements] Command injection on the 'path' parameter $0.0
112 Stored XSS in Node-Red $0.0
113 [ponse] Path traversal in ponse module allows to read any file on server $0.0
114 [markdown-pdf] Local file reading $0.0
115 stored xss in scrape-metadata when reading metadata from an html page $0.0
116 url-parse package return wrong hostname $0.0
117 Command Injection Vulnerability in win-fork/win-spawn Packages $0.0
118 Arbitrary File Write Through Archive Extraction $0.0
119 Arbitrary File Write through archive extraction $0.0
120 [flintcms] Account takeover due to blind MongoDB injection in password reset $0.0
121 [egg-scripts] Command injection $0.0
122 Prototype pollution attack (extend) $0.0
123 [simplehttpserver] List any file in the folder by using path traversal. $0.0
124 [exceljs] Possible XSS via cell value when worksheet is displayed in browser $0.0
125 [samsung-remote] Command injection $0.0
126 Command Injection is ps Package $0.0
127 [ascii-art] Command injection $0.0
128 [express-cart] Customer and admin email enumeration through MongoDB injection $0.0
129 http-live-simulator npm module is prone to path traversal attacks $0.0
130 Prototype pollution attack (defaults-deep / constructor.prototype) $0.0
131 Prototype pollution attack (merge.recursive) $0.0
132 Command Injection Vulnerability in libnmap Package $0.0
133 [apex-publish-static-files] Command Injection on connectString $0.0
134 [serve] XSS via HTML tag injection in directory lisiting page $0.0
135 [serve] Stored XSS in the filename when directories listing $0.0
136 Samlify is vulnerable to signature wrapping $0.0
137 Code Injection Vulnerability in morgan Package $0.0
138 [knightjs] Path Traversal allows to read content of arbitrary files $0.0
139 [takeapeek] Path traversal allow to expose directory and files $0.0
140 [tianma-static] Stored xss on filename $0.0
141 Prototype Pollution Vulnerability in cached-path-relative Package $0.0
142 Prototype pollution attack (mergify) $0.0
143 List any file in the folder by using path traversal $0.0
144 flatmap-stream malicious package (distributed via the popular events-stream) $0.0
145 Prototype pollution attack in just-extend $0.0
146 Prototype Pollution Vulnerability in mpath Package $0.0
147 Prototype pollution attack in node.extend $0.0
148 Prototype pollution attack (lutils-merge) $0.0
149 [http-live-simulator] Path traversal vulnerability $0.0
150 [static-resource-server] Path Traversal allows to read content of arbitrary file on the server $0.0
151 [buttle] Unsafe rendering of Markdown files $0.0
152 Command Injection Vulnerability in kill-port Package $0.0
153 [bower] Arbitrary File Write through improper validation of symlinks while package extraction $0.0
154 Prototype pollution attack (upmerge) $0.0
155 [serve] Access unlisted internal files/folders revealing sensitive information $0.0
156 Reflected XSS in the npm module express-cart. $0.0
157 [glance] Access unlisted internal files/folders revealing sensitive information $0.0
158 [typeorm] SQL Injection $0.0
159 Prototype pollution attack through jQuery $.extend $0.0
160 Code Injection Vulnerability in dot Package $0.0
161 Remote code executio in NPM package getcookies $0.0
162 Regular Expression Denial of Service (ReDoS) $0.0
163 [statics-server] Path Traversal due to lack of provided path sanitization $0.0
164 Media parsing in canvas is at least vulnerable to Denial of Service through multiple vulnerabilities $0.0
165 [servey] Path Traversal allows to retrieve content of any file with extension from remote server $0.0
166 Prototype pollution attack (smart-extend) $0.0
167 Arbitrary file overwrites in node-tar $0.0
168 useragent is vulnerable to ReDoS in user-agent string $0.0
169 typeorm does not properly escape parameters when building SQL queries, resulting in potential SQLi $0.0
170 [harp] Unsafe rendering of Markdown files $0.0
171 [harp] File access even when they have been set to be ignored. $0.0
172 [harp] Path traversal using symlink $0.0
173 A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module for decoding $0.0
174 XSS in Bootbox $0.0
175 [untitled-model] sql injection $0.0
176 [serve-here.js] List any file in the folder by using path traversal. $0.0
177 [takeapeek] XSS via HTML tag injection in directory lisiting page $0.0
178 [domokeeper] Unintended Require $0.0
179 [http-file-server] List any files and sub folders in the folder by using path traversal. $0.0
180 [min-http-server] Stored XSS in the filename when directories listing $0.0
181 [http-file-server] Stored XSS in the filename when directories listing $0.0
182 Yarn transfers npm credentials over unencrypted http connection $0.0
183 Multiple HTTP/2 DOS Issues $0.0
184 [larvitbase-api] Unintended Require $0.0
185 [statichttpserver] List any file in the folder by using path traversal. $0.0
186 [public] Path traversal using symlink $0.0
187 environment variable leakage in error reporting $0.0
188 [larvitbase-www] Unintended Require $0.0
189 gitlabhook OS Command Injection $0.0
190 [http_server] Stored XSS in the filename when directories listing $0.0
191 [https-proxy-agent] Socket returned without TLS upgrade on non-200 CONNECT response, allowing request data to be sent over unencrypted connection $0.0
192 Application level denial of service due to shutting down the server $0.0
193 Trojan:JS/CoinMiner in npm files $0.0
194 Path traversal using symlink $0.0
195 Command Injection in npm module name passed as an argument to pm2.install() function $0.0
196 Command Injection due to lack of sanitisation of tar.gz filename passed as an argument to pm2.install() function $0.0
197 [node-df] RCE via insecure command concatenation $0.0
198 indexFile option passed as an argument to node-server can lead to arbitrary file read $0.0
199 [treekill] RCE via insecure command concatenation (only Windows) $0.0
200 Lodash "difference" (possibly others) Function Denial of Service Through Unvalidated Input $0.0
201 [tree-kill] RCE via insecure command concatenation (only Windows) $0.0
202 Path traversal in https://www.npmjs.com/package/http_server via symlink $0.0
203 Prototype pollution attack (lodash / constructor.prototype) $0.0
204 Server Side JavaScript Code Injection $0.0
205 Fastify denial-of-service vulnerability with large JSON payloads $0.0
206 rgb2hex is vulnerable to ReDoS when parsing crafted invalid colors $0.0
207 [open] concatenation of unsanitized input into exec() command $0.0
208 Lack of input validation and sanitization in react-autolinker-wrapper library causes XSS $0.0
209 [fileview] Inadequate Output Encoding and Escaping $0.0
210 [webpack-bundle-analyzer] Cross-site Scripting $0.0
211 [seeftl] Stored XSS when directory listing via filename. $0.0
212 [atlasboard-atlassian-package] Cross-site Scripting (XSS) $0.0
213 [express-laravel-passport] Improper Authentication $0.0
214 Hostname spoofing $0.0
215 CRLF Injection in legacy url API (url.parse().hostname) $0.0
216 [meta-git] RCE via insecure command formatting $0.0
217 Stored XSS (Hexo-admin plugin) $0.0
218 [npm-git-publish] RCE via insecure command formatting $0.0
219 [node-red] Stored XSS within Flow's - "Name" field $0.0
220 Http request splitting $0.0
221 Use After Free in crypto.randomFill $0.0
222 url.parse() hostname spoofing via javascript: URIs $0.0
223 Http response is not ended although underlying socket is already destroyed $0.0
224 [klona] Prototype pollution $0.0
225 [url-parse] Improper Validation and Sanitization $0.0
226 Prototype pollution in dot-prop $0.0
227 Denial Of Service in Strapi Framework using argument injection $0.0
228 [file-browser] Inadequate Output Encoding and Escaping $0.0
229 [md-fileserver] Path Traversal $0.0
230 [deliver-or-else] Path Traversal $0.0
231 Command Injection vulnerability in kill-port-process package $0.0
232 [@azhou/basemodel] SQL injection $0.0
233 [listening-processes] Command Injection $0.0
234 [increments] sql injection $0.0
235 [script-manager] Unintended require $0.0
236 [jsreport] Remote Code Execution $0.0
237 Vulnerability in http-parser & embedded NULL header handling $0.0
238 HTTP/2 Denial of Service Vulnerability $0.0
239 Denial of Service: nghttp2 use of uninitialized pointer $0.0
240 Out of order TLS handshake / application data messages lead to segmentation fault $0.0
241 Pull Request #12949 - Security Implications without CVE assignment $0.0
242 Fix for CVE-2018-12122 can be bypassed via keep-alive requests $0.0
243 Filesystem Writes via yarn install via symlinks and tar transforms inside a crafted malicious package $0.0
244 [reveal.js] XSS by calling arbitrary method via postMessage $0.0
245 Several simple remote code execution in pdf-image $0.0
246 [yarn] yarn.lock integrity & hash check logic is broken $0.0
247 Prototype pollution in multipart parsing $0.0
248 Server Side Request Forgery in Uppy npm module $0.0
249 Server-Side Request Forgery (SSRF) in Ghost CMS $0.0
250 [blamer] RCE via insecure command formatting $0.0
251 [htmr] DOM-based XSS $0.0
252 [utils-extend] Prototype pollution $0.0
253 [git-promise] RCE via insecure command formatting $0.0
254 [Total.js] Path traversal vulnerability allows to read files outside public directory $0.0
255 Crash Node.js process from handlebars using a small and simple source $0.0
256 Prototype pollution attack (lodash) $0.0
257 [logkitty] RCE via insecure command formatting $0.0
258 Pixel flood attack cause the javascript heap out of memory $0.0
259 OS Command Injection on Jison [all-parser-ports] $0.0
260 [Limited bypass of #793704] Blind SSRF in Ghost CMS $0.0
261 [crypto-js] Insecure entropy source - Math.random() $0.0
262 loader.js is not secure $0.0
263 [devcert] Command Injection via insecure command formatting $0.0
264 [wappalyzer] ReDoS allows an attacker to completely break Wappalyzer $0.0
265 [sapper] Path Traversal $0.0
266 bunyan - RCE via insecure command formatting $0.0
267 [Uppy] Internal Server side request forgery (bypass of #786956) $0.0
268 Node.js HTTP/2 Large Settings Frame DoS $0.0
269 Child process environment injection via prototype pollution $0.0
270 Remotely trigger an assertion on a TLS server with a malformed certificate string $0.0
271 Node.js: TLS session reuse can lead to hostname verification bypass $0.0
272 HTTP request smuggling using malformed Transfer-Encoding header $0.0
273 HTTP header values do not have trailing OWS trimmed $0.0
274 [express-cart] Wide CSRF in application $0.0
275 [diskstats] Command Injection via insecure command concatenation $0.0
276 [xps] Command Injection via insecure command concatenation $0.0
277 SQL Injection or Denial of Service due to a Prototype Pollution $0.0
278 [is-my-json-valid] ReDoS via 'style' format $0.0
279 Arbitrary code execution via untrusted schemas in is-my-json-valid $0.0
280 [wappalyzer] ReDoS allows an attacker to completely break Wappalyzer $0.0
281 Arbitrary code execution via untrusted schemas in ajv $0.0
282 [vboxmanage.js] Command Injection via insecure command concatenation $0.0
283 [object-path-set] Prototype pollution $0.0
284 [extra-ffmpeg] Command Injection via insecure command formatting $0.0
285 [supermixer] Prototype pollution $0.0
286 Prototype Pollution lodash 4.17.15 $0.0
287 [extra-asciinema] Command Injection via insecure command formatting $0.0
288 [meemo-app] Denial of Service via LDAP Injection $0.0
289 [cloudron-surfer] Denial of Service via LDAP Injection $0.0
290 [windows-edge] RCE via insecure command formatting $0.0
291 Prototype pollution attack (lodash) $0.0
292 [json-bigint] DoS via __proto__ assignment $0.0
293 [min-http-server] List any file in the folder by using path traversal. $0.0
294 [bl] Uninitialized memory exposure via negative .consume() $0.0
295 [notevil] - Sandbox Escape Lead to RCE on Node.js and XSS in the Browser $0.0
296 [sirloin] Web Server Directory Traversal via Crafted GET Request $0.0
297 [hangersteak] Web Server Directory Traversal via Crafted GET Request $0.0
298 [static-server-gx] Path Traversal allowing to read any files on the server $0.0
299 [extend-merge] Prototype pollution $0.0
300 [keyd] Prototype pollution $0.0
301 [objtools] Prototype pollution $0.0
302 [flsaba] Stored XSS in the file and directory name when directories listing $0.0
303 [authmagic-timerange-stateless-core] Improper Authentication $0.0
304 [@knutkirkhorn/free-space] - Command Injection through Lack of Sanitization $0.0
305 property-expr - Prototype pollution $0.0
306 [git-lib] RCE via insecure command formatting $0.0
307 [hnzserver] Path Traversal allowing to read any files on the server $0.0
308 [http_server] Path Traversal allowing to read any files on the server $0.0
309 [gity] RCE via insecure command formatting $0.0
310 [commit-msg] RCE via insecure command formatting $0.0
311 [snekserve] Stored XSS via filenames HTML formatted $0.0
312 [m-server] XSS reflected because path does not escapeHtml $0.0
313 [tianma-static] Security issue with XSS. $0.0
314 [freespace] Command Injection due to Lack of Sanitization $0.0
315 [json8-merge-patch] Prototype Pollution $0.0
316 [create-git] RCE via insecure command formatting $0.0
317 [http-live-simulator] Application-level DoS $0.0
318 [nested-property] Prototype Pollution $0.0
319 [gfc] Command Injection via insecure command formatting $0.0
320 [ts-dot-prop] Prototype Pollution $0.0
321 [expressjs-ip-control] Whitelist IP bypass leads to authorization bypass and sensitive info disclosure $0.0
322 [zenn-cli] Path traversal on Windows allows the attacker to read arbitrary .md files $0.0
323 [node-downloader-helper] Path traversal via Content-Disposition header $0.0
324 [systeminformation] Command Injection via insecure command formatting $0.0
325 [@firebase/util] Prototype pollution $0.0
326 [last-commit-log] Command Injection $0.0
327 [chart.js] Prototype pollution $0.0
328 Default behavior of Fastifys versioned routes can be used for cache poisoning when Fastify is used in combination with a http cache / CDN $0.0
329 [dy-server2] - stored Cross-Site Scripting $0.0
330 [arpping] Remote Code Execution $0.0
331 [imagickal] Remote Code Execution $0.0
332 [curling] Remote Code Execution $0.0
333 [socket.io] Cross-Site Websocket Hijacking $0.0
334 Node.js: use-after-free in TLSWrap $0.0
335 [plain-object-merge] Prototype pollution $0.0
336 HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion $0.0
337 HTTP Request Smuggling due to CR-to-Hyphen conversion $0.0
338 fs.realpath.native on darwin may cause buffer overflow $0.0
339 [wireguard-wrapper] Command Injection via insecure command concatenation $0.0
340 [i18next] Prototype pollution attack $0.0
341 Unexpected input validation of octal literals in nodejs v15.12.0 and below returns defined values for all undefined octal literals. $0.0
342 Bypass of SSRF Vulnerability $0.0
343 Prototype Pollution Vulnerability in noble Package $0.0
344 Server-side Template Injection in lodash.js $0.0
345 Node Installer Local Privilege Escalation $0.0
346 OOB read in libuv $0.0
347 Improper handling of untypical characters in domain names $0.0
348 Prototype pollution via console.table properties $0.0
349 Node.js Certificate Verification Bypass via String Injection $0.0
350 HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding $0.0
351 HTTP Request Smuggling Due To Improper Delimiting of Header Fields $0.0
352 HTTP Request Smuggling Due to Flawed Parsing of Transfer-Encoding $0.0
353 Undici does not use CONNECT or otherwise validate upstream HTTPS certificates when using a proxy $0.0
354 Off-by-slash vulnerability in nodejs.org and iojs.org $0.0
355 DNS rebinding in --inspect (insufficient fix of CVE-2022-32212 affecting macOS devices) $0.0
356 HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding (improper fix for CVE-2022-32215) $0.0
357 Node 18 reads openssl.cnf from /home/iojs/build/... upon startup on MacOS $0.0
358 CVE-2022-32213 bypass via obs-fold mechanic $0.0
359 HTTP Request Smuggling Due to Incorrect Parsing of Header Fields $0.0
360 Weak randomness in WebCrypto keygen $0.0
361 DNS rebinding in --inspect via invalid octal IP address $0.0
362 Take over subdomain undici.nodejs.org.cdn.cloudflare.net $0.0
363 Multiple OpenSSL error handling issues in nodejs crypto library $0.0
364 CRLF Injection in Nodejs ‘undici’ via host $0.0
365 Insecure loading of ICU data through ICU_DATA environment variable $0.0
366 Regular Expression Denial of Service in Headers $0.0
367 Permissions policies can be bypassed via process.mainModule $0.0
368 HTTP Request Smuggling via Empty headers separated by CR $0.0
369 OpenSSL engines can be used to bypass and/or disable the permission model $0.0
370 The use of proto in process.mainModule.proto.require() bypasses the permission system in Node v19.6.1 $0.0
371 fs module's file watching is not restricted by --allow-fs-read $0.0
372 fs.openAsBlob() bypasses permission system $0.0
373 Filesystem experimental permissions policy does not handle path traversal cases. $0.0
374 Process-based permissions can be bypassed with the "inspector" module. $0.0
375 node.js process aborts when processing x509 certs with invalid public key information $0.0
376 DiffieHellman doesn't generate keys after setting a key $0.0
377 Node 18 reads openssl.cnf from /home/iojs/build/... upon startup. $0.0
378 DNS rebinding in --inspect (again) via invalid IP addresses $0.0
379 Policy-restricted modules can escalate to higher privileges by impersonating other modules in a policy list using module.constructor.createRequire() $0.0
380 Permission model bypass by specifying a path traversal sequence in a buffer, $0.0
381 fs.mkdtemp() and fs.mkdtempSync() are missing getValidatedPath() checks. $0.0
382 Renaming/aliasing relative symbolic links potentially redirects them to supposedly inaccessible locations $0.0
383 Permissions policies can be bypassed via Module._load. $0.0
384 Dependency Policy Bypass via process.binding $0.0
385 fs.statfs bypasses Permission Model $0.0
386 process.binding() can bypass the permission model through path traversal $0.0
387 Integrity checks according to policies can be circumvented $0.0
388 Permission model improperly protects against path traversal $0.0
389 Path traversal through path stored in Uint8Array $0.0
390 Multiple permission model bypasses due to improper path traversal sequence sanitization $0.0
391 http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks $0.0
392 Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) $0.0
393 Code injection and privilege escalation through Linux capabilities $0.0
394 Improper handling of wildcards in --allow-fs-read and --allow-fs-write $0.0
395 Path traversal by monkey-patching Buffer internals $0.0
396 Proxy-Authorization header is not cleared in cross-domain redirect in undici $0.0
397 setuid() does not drop all privileges due to io_uring $0.0
398 Denial of Service by resource exhaustion in fetch() brotli decoding $0.0
399 "Assertion failed" in node::http2::Http2Session::~Http2Session() leads to HTTP/2 server crash $0.0
400 HTTP Request Smuggling via Content Length Obfuscation $0.0
401 Proxy-Authorization header not cleared on cross-origin redirect in undici.request $0.0
402 fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect $0.0
403 Bypass network import restriction via data URL $0.0
404 fs.fchown/fchmod bypasses permission model $0.0
405 Bypass incomplete fix of CVE-2024-27980 $0.0
406 fs.lstat bypasses permission model $0.0
407 Permission model improperly processes UNC paths $0.0
408 Permissions can be bypassed via arbitrary code execution through abusing libuv signal pipes $0.0