The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Node.js Modules ~ not comprehensive

computer vulnerability bulletin 26048

Node.js getcookies: code execution via Backdoor

Synthesis of the vulnerability

An attacker can use a vulnerability via Backdoor of Node.js getcookies, in order to run code.
Impacted products: Nodejs Modules ~ not comprehensive.
Severity: 3/4.
Consequences: user access/rights.
Provenance: internet client.
Creation date: 04/05/2018.
Identifiers: VIGILANCE-VUL-26048.

Description of the vulnerability

An attacker can use a vulnerability via Backdoor of Node.js getcookies, in order to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability note 25654

Node.js electron: code execution via Integration

Synthesis of the vulnerability

An attacker can use a vulnerability via Integration of Node.js electron, in order to run code.
Impacted products: Nodejs Modules ~ not comprehensive.
Severity: 2/4.
Consequences: user access/rights.
Provenance: document.
Creation date: 26/03/2018.
Identifiers: VIGILANCE-VUL-25654.

Description of the vulnerability

An attacker can use a vulnerability via Integration of Node.js electron, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2018-3732

Node.js resolve-path: directory traversal

Synthesis of the vulnerability

An attacker can traverse directories of Node.js resolve-path, in order to read a file outside the service root path.
Impacted products: Nodejs Modules ~ not comprehensive.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 09/03/2018.
Identifiers: CVE-2018-3732, VIGILANCE-VUL-25515.

Description of the vulnerability

An attacker can traverse directories of Node.js resolve-path, in order to read a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2017-11429

Node.js saml2-js: privilege escalation via signature check bypass

Synthesis of the vulnerability

This vulnerability is the same than the one described in VIGILANCE-VUL-25384 for another product.
Impacted products: Nodejs Modules ~ not comprehensive.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights.
Provenance: document.
Creation date: 28/02/2018.
Identifiers: CVE-2017-11429, VIGILANCE-VUL-25396.

Description of the vulnerability

This vulnerability is the same than the one described in VIGILANCE-VUL-25384 for another product.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce 25317

Node.js hoek: denial of service via JSON

Synthesis of the vulnerability

An attacker can generate a fatal error via JSON of Node.js hoek, in order to trigger a denial of service.
Impacted products: Nodejs Modules ~ not comprehensive.
Severity: 1/4.
Consequences: denial of service on service, denial of service on client.
Provenance: internet client.
Creation date: 16/02/2018.
Identifiers: VIGILANCE-VUL-25317.

Description of the vulnerability

An attacker can generate a fatal error via JSON of Node.js hoek, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2018-7651

Node ssri: infinite loop via a regular expression

Synthesis of the vulnerability

An attacker can generate an endless loop in Node ssri via a regular expression, in order to trigger a denial of service.
Impacted products: Nodejs Modules ~ not comprehensive.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 15/02/2018.
Identifiers: CVE-2018-7651, VIGILANCE-VUL-25311.

Description of the vulnerability

An attacker can generate an endless loop in Node ssri via a regular expression, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-3711

Node fastify: denial of service via JSON

Synthesis of the vulnerability

An attacker can generate a fatal error via JSON of Node fastify, in order to trigger a denial of service.
Impacted products: Nodejs Modules ~ not comprehensive.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: internet client.
Creation date: 26/01/2018.
Identifiers: CVE-2018-3711, VIGILANCE-VUL-25163.

Description of the vulnerability

An attacker can generate a fatal error via JSON of Node fastify, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability 25155

Node ltt.js, yjmyjmyjm, lactate: directory traversal

Synthesis of the vulnerability

An attacker can traverse directories of Node ltt.js, yjmyjmyjm, lactate, in order to read a file outside the service root path.
Impacted products: Nodejs Modules ~ not comprehensive.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 25/01/2018.
Identifiers: VIGILANCE-VUL-25155.

Description of the vulnerability

An attacker can traverse directories of Node ltt.js, yjmyjmyjm, lactate, in order to read a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2018-1000006

Node Electron: code execution

Synthesis of the vulnerability

An attacker can use a vulnerability of Node Electron, in order to inject a command line within the chromium arguments.
Impacted products: Nodejs Modules ~ not comprehensive.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights.
Provenance: document.
Creation date: 24/01/2018.
Identifiers: CVE-2018-1000006, VIGILANCE-VUL-25145, ZDI-18-308.

Description of the vulnerability

An attacker can use a vulnerability of Node Electron, in order to inject a command line within the chromium arguments.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin 25078

Node.js mobile-icon-resizer: code execution

Synthesis of the vulnerability

An attacker can use a vulnerability of Node.js mobile-icon-resizer, in order to run code.
Impacted products: Nodejs Modules ~ not comprehensive.
Severity: 3/4.
Consequences: user access/rights.
Provenance: document.
Creation date: 16/01/2018.
Identifiers: VIGILANCE-VUL-25078.

Description of the vulnerability

An attacker can use a vulnerability of Node.js mobile-icon-resizer, in order to run code.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Node.js Modules ~ not comprehensive: