immer |
CVE-2021-23436 |
严重 |
8.0.4 |
9.0.6 |
immer: type confusion vulnerability can lead to a bypass of CVE-2020-28477
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23436
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2021-09-01 18:15 修改: 2021-09-10 13:33
|
braces |
CVE-2024-4068 |
高危 |
2.3.2 |
3.0.3 |
braces: fails to limit the number of characters it can handle
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07
|
braces |
CVE-2024-4068 |
高危 |
3.0.2 |
3.0.3 |
braces: fails to limit the number of characters it can handle
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07
|
http-proxy-middleware |
CVE-2024-21536 |
高危 |
2.0.6 |
2.0.7, 3.0.3 |
http-proxy-middleware: Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21536
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-10-19 05:15 修改: 2024-10-21 17:10
|
http-proxy-middleware |
CVE-2024-21536 |
高危 |
2.0.6 |
2.0.7, 3.0.3 |
http-proxy-middleware: Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21536
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-10-19 05:15 修改: 2024-10-21 17:10
|
axios |
CVE-2024-39338 |
高危 |
1.6.4 |
1.7.4 |
axios: axios: Server-Side Request Forgery
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39338
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-08-12 13:38 修改: 2024-08-23 18:35
|
immer |
CVE-2021-3757 |
高危 |
8.0.4 |
9.0.6 |
nodejs-immer: prototype pollution may lead to DoS or remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3757
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2021-09-02 12:15 修改: 2022-09-10 02:46
|
ip |
CVE-2024-29415 |
高危 |
2.0.0 |
|
node-ip: Incomplete fix for CVE-2023-42282
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29415
镜像层: sha256:c4d458a8d9a71bfecc09fa0221c41b27a750ec8b9f0dadba7933d4e8d6885873
发布日期: 2024-05-27 20:15 修改: 2024-08-16 14:35
|
lodash.template |
CVE-2021-23337 |
高危 |
4.5.0 |
|
nodejs-lodash: command injection via template
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23337
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2021-02-15 13:15 修改: 2022-09-13 21:25
|
node-fetch |
CVE-2022-0235 |
高危 |
1.7.3 |
3.1.1, 2.6.7 |
node-fetch: exposure of sensitive information to an unauthorized actor
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0235
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2022-01-16 17:15 修改: 2023-02-03 19:16
|
nth-check |
CVE-2021-3803 |
高危 |
1.0.2 |
2.0.1 |
nodejs-nth-check: inefficient regular expression complexity
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3803
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2021-09-17 07:15 修改: 2023-07-10 18:52
|
path-to-regexp |
CVE-2024-45296 |
高危 |
1.7.0 |
1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 |
path-to-regexp: Backtracking regular expressions cause ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45296
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-09-09 19:15 修改: 2024-09-10 12:09
|
path-to-regexp |
CVE-2024-45296 |
高危 |
1.8.0 |
1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 |
path-to-regexp: Backtracking regular expressions cause ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45296
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-09-09 19:15 修改: 2024-09-10 12:09
|
path-to-regexp |
CVE-2024-45296 |
高危 |
1.8.0 |
1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 |
path-to-regexp: Backtracking regular expressions cause ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45296
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-09-09 19:15 修改: 2024-09-10 12:09
|
path-to-regexp |
CVE-2024-45296 |
高危 |
2.4.0 |
1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 |
path-to-regexp: Backtracking regular expressions cause ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45296
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-09-09 19:15 修改: 2024-09-10 12:09
|
pdfjs-dist |
CVE-2024-4367 |
高危 |
2.16.105 |
4.2.67 |
Mozilla: Arbitrary JavaScript execution in PDF.js
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4367
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-05-14 18:15 修改: 2024-06-10 17:16
|
rollup |
CVE-2024-47068 |
高危 |
3.29.4 |
3.29.5, 4.22.4, 2.79.2 |
rollup: DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47068
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-09-23 16:15 修改: 2024-09-30 17:39
|
semver |
CVE-2022-25883 |
高危 |
7.3.8 |
7.5.2, 6.3.1, 5.7.2 |
nodejs-semver: Regular expression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2023-06-21 05:15 修改: 2023-11-07 03:44
|
semver |
CVE-2022-25883 |
高危 |
7.3.8 |
7.5.2, 6.3.1, 5.7.2 |
nodejs-semver: Regular expression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2023-06-21 05:15 修改: 2023-11-07 03:44
|
vite |
CVE-2023-34092 |
高危 |
4.3.1 |
2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, 4.3.9 |
Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34092
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2023-06-01 17:15 修改: 2023-06-09 16:03
|
vite |
CVE-2024-23331 |
高危 |
4.3.1 |
2.9.17, 3.2.8, 4.5.2, 5.0.12 |
Vite dev server option `server.fs.deny` can be bypassed when hosted on case-insensitive filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23331
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-01-19 20:15 修改: 2024-01-29 15:31
|
webpack-dev-middleware |
CVE-2024-29180 |
高危 |
6.0.1 |
7.1.0, 6.1.2, 5.3.4 |
webpack-dev-middleware: lack of URL validation may lead to file leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29180
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-03-21 17:15 修改: 2024-03-21 19:47
|
ws |
CVE-2024-37890 |
高危 |
8.12.0 |
5.2.4, 6.2.3, 7.5.10, 8.17.1 |
nodejs-ws: denial of service when handling a request with many HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44
|
micromatch |
CVE-2024-4067 |
中危 |
3.1.10 |
4.0.8 |
micromatch: vulnerable to Regular Expression Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15
|
micromatch |
CVE-2024-4067 |
中危 |
4.0.5 |
4.0.8 |
micromatch: vulnerable to Regular Expression Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15
|
axios |
CVE-2023-45857 |
中危 |
0.27.2 |
1.6.0, 0.28.0 |
axios: exposure of confidential data stored in cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45857
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2023-11-08 21:15 修改: 2024-06-21 19:15
|
express |
CVE-2024-29041 |
中危 |
4.18.2 |
4.19.2, 5.0.0-beta.3 |
express: cause malformed URLs to be evaluated
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29041
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-03-25 21:15 修改: 2024-03-26 12:55
|
tar |
CVE-2024-28863 |
中危 |
6.1.13 |
6.2.1 |
node-tar: denial of service while parsing a tar file due to lack of folders depth validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16
|
tar |
CVE-2024-28863 |
中危 |
6.1.13 |
6.2.1 |
node-tar: denial of service while parsing a tar file due to lack of folders depth validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16
|
tar |
CVE-2024-28863 |
中危 |
6.1.15 |
6.2.1 |
node-tar: denial of service while parsing a tar file due to lack of folders depth validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863
镜像层: sha256:c4d458a8d9a71bfecc09fa0221c41b27a750ec8b9f0dadba7933d4e8d6885873
发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16
|
express |
CVE-2024-29041 |
中危 |
4.18.2 |
4.19.2, 5.0.0-beta.3 |
express: cause malformed URLs to be evaluated
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29041
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-03-25 21:15 修改: 2024-03-26 12:55
|
express |
CVE-2024-43796 |
中危 |
4.18.2 |
4.20.0, 5.0.0 |
express: Improper Input Handling in Express Redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43796
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-09-10 15:15 修改: 2024-09-20 16:07
|
vite |
CVE-2024-31207 |
中危 |
4.3.1 |
2.9.18, 3.2.10, 4.5.3, 5.0.13, 5.1.7, 5.2.6 |
vitejs: "server.fs.deny" configuration does not deny requests that include patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31207
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-04-04 16:15 修改: 2024-04-04 16:33
|
vite |
CVE-2024-45811 |
中危 |
4.3.1 |
5.4.6, 5.3.6, 5.2.14, 4.5.4, 3.2.11, 5.1.8 |
vite: server.fs.deny is bypassed when using `?import&raw`
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45811
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-09-17 20:15 修改: 2024-09-20 12:30
|
vite |
CVE-2024-45812 |
中危 |
4.3.1 |
5.4.6, 5.3.6, 5.2.14, 4.5.4, 3.2.11, 5.1.8 |
vite: XSS via DOM Clobbering gadget found in vite bundled scripts
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45812
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-09-17 20:15 修改: 2024-09-20 12:30
|
webpack |
CVE-2024-43788 |
中危 |
5.89.0 |
5.94.0 |
webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43788
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-08-27 17:15 修改: 2024-09-03 15:15
|
express |
CVE-2024-43796 |
中危 |
4.18.2 |
4.20.0, 5.0.0 |
express: Improper Input Handling in Express Redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43796
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-09-10 15:15 修改: 2024-09-20 16:07
|
follow-redirects |
CVE-2024-28849 |
中危 |
1.15.4 |
1.15.6 |
follow-redirects: Possible credential leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28849
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-03-14 17:15 修改: 2024-03-23 03:15
|
zod |
CVE-2023-4316 |
中危 |
3.20.6 |
3.22.3 |
Zod denial of service vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4316
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2023-09-28 21:15 修改: 2024-09-05 22:15
|
zod |
CVE-2023-4316 |
中危 |
3.20.6 |
3.22.3 |
Zod denial of service vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4316
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2023-09-28 21:15 修改: 2024-09-05 22:15
|
elliptic |
CVE-2024-48948 |
低危 |
6.5.4 |
|
elliptic: ECDSA signature verification error may reject legitimate transactions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48948
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-10-15 14:15 修改: 2024-10-16 16:38
|
ip |
CVE-2023-42282 |
低危 |
2.0.0 |
2.0.1, 1.1.9 |
nodejs-ip: arbitrary code execution via the isPublic() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42282
镜像层: sha256:c4d458a8d9a71bfecc09fa0221c41b27a750ec8b9f0dadba7933d4e8d6885873
发布日期: 2024-02-08 17:15 修改: 2024-10-09 15:14
|
elliptic |
CVE-2024-48949 |
低危 |
6.5.4 |
6.5.6 |
elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48949
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-10-10 01:15 修改: 2024-10-15 14:07
|
es5-ext |
CVE-2024-27088 |
低危 |
0.10.62 |
0.10.63 |
es5-ext contains ECMAScript 5 extensions. Passing functions with very ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27088
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-02-26 17:15 修改: 2024-02-26 22:10
|
elliptic |
CVE-2024-42459 |
低危 |
6.5.4 |
6.5.7 |
elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42459
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-08-02 07:16 修改: 2024-08-02 15:35
|
elliptic |
CVE-2024-42460 |
低危 |
6.5.4 |
6.5.7 |
elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42460
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-08-02 07:16 修改: 2024-08-02 16:35
|
elliptic |
CVE-2024-42461 |
低危 |
6.5.4 |
6.5.7 |
elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42461
镜像层: sha256:9224e1709653da8b8b62296ec1411fe680ed1d96a6ca4859a12eac51b728e6ef
发布日期: 2024-08-02 07:16 修改: 2024-08-16 16:51
|