Search CVE reports


Toggle filters

41 – 50 of 191 results


CVE-2023-4807

Medium priority
Not affected

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Not affected Not affected Not affected
openssl1.0 Not in release Not in release Not in release Not affected
nodejs Not affected Not affected Not affected Not affected
edk2 Not affected Not affected Not affected Not affected
Show less packages

CVE-2023-46809

Medium priority
Vulnerable

Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1...

1 affected package

nodejs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nodejs Not affected Vulnerable Not affected Not affected
Show less packages

CVE-2023-44487

High priority

Some fixes available 29 of 42

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

13 affected packages

haproxy, tomcat10, tomcat9, trafficserver, h2o...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
haproxy Not affected Not affected Not affected Fixed
tomcat10 Not affected Not in release Not in release Ignored
tomcat9 Not affected Fixed Fixed Fixed
trafficserver Not affected Fixed Fixed Not affected
h2o Not affected Not affected Not affected Fixed
tomcat8 Not in release Not in release Not in release Fixed
dotnet6 Not in release Fixed Not in release Not in release
dotnet7 Not in release Fixed Not in release Not in release
dotnet8 Fixed Not affected Not in release Not in release
nginx Not affected Not affected Not affected Not affected
nghttp2 Not affected Fixed Fixed Fixed
nodejs Not affected Fixed Fixed Fixed
netty Not affected Fixed Fixed Not affected
Show all 13 packages Show less packages

CVE-2023-39333

Medium priority
Vulnerable

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if...

1 affected package

nodejs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nodejs Needs evaluation Vulnerable Not affected Not affected
Show less packages

CVE-2023-39332

Medium priority
Not affected

Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see...

1 affected package

nodejs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nodejs Not affected Not affected Not affected
Show less packages

CVE-2023-39331

Medium priority
Ignored

A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting...

1 affected package

nodejs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nodejs Not affected Not affected Not affected Not affected
Show less packages

CVE-2023-38552

Medium priority
Vulnerable

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus...

1 affected package

nodejs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nodejs Needs evaluation Vulnerable Not affected Not affected
Show less packages

CVE-2023-3817

Low priority

Some fixes available 6 of 16

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may...

4 affected packages

openssl1.0, nodejs, edk2, openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl1.0 Not in release Not in release Not in release Fixed
nodejs Not affected Vulnerable Not affected Not affected
edk2 Vulnerable Vulnerable Vulnerable Needs evaluation
openssl Not affected Fixed Fixed Fixed
Show less packages

CVE-2023-3446

Low priority

Some fixes available 7 of 19

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may...

4 affected packages

openssl1.0, nodejs, edk2, openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl1.0 Not in release Not in release Not in release Fixed
nodejs Not affected Vulnerable Not affected Not affected
edk2 Vulnerable Vulnerable Vulnerable Needs evaluation
openssl Not affected Fixed Fixed Fixed
Show less packages

CVE-2023-32559

Medium priority

Some fixes available 2 of 3

A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring...

1 affected package

nodejs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nodejs Not affected Fixed Not affected Not affected
Show less packages