Total
316927 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2023-39332 | 2 Fedoraproject, Nodejs | 2 Fedora, Node.js | 2025-11-03 | N/A | 9.8 CRITICAL |
| Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects. This is distinct from CVE-2023-32004 which only referred to `Buffer` objects. However, the vulnerability follows the same pattern using `Uint8Array` instead of `Buffer`. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js. | |||||
| CVE-2023-39331 | 1 Nodejs | 1 Node.js | 2025-11-03 | N/A | 7.5 HIGH |
| A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js. | |||||
| CVE-2023-38552 | 2 Fedoraproject, Nodejs | 2 Fedora, Node.js | 2025-11-03 | N/A | 7.5 HIGH |
| When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js. | |||||
| CVE-2023-38522 | 1 Apache | 1 Traffic Server | 2025-11-03 | N/A | 7.5 HIGH |
| Apache Traffic Server accepts characters that are not allowed for HTTP field names and forwards malformed requests to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue. | |||||
| CVE-2023-38473 | 2 Avahi, Redhat | 2 Avahi, Enterprise Linux | 2025-11-03 | N/A | 6.2 MEDIUM |
| A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function. | |||||
| CVE-2023-38472 | 2 Avahi, Redhat | 2 Avahi, Enterprise Linux | 2025-11-03 | N/A | 6.2 MEDIUM |
| A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function. | |||||
| CVE-2023-38471 | 2 Avahi, Redhat | 2 Avahi, Enterprise Linux | 2025-11-03 | N/A | 6.2 MEDIUM |
| A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function. | |||||
| CVE-2023-38470 | 2 Avahi, Redhat | 2 Avahi, Enterprise Linux | 2025-11-03 | N/A | 6.2 MEDIUM |
| A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function. | |||||
| CVE-2023-38469 | 2 Avahi, Redhat | 2 Avahi, Enterprise Linux | 2025-11-03 | N/A | 6.2 MEDIUM |
| A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record. | |||||
| CVE-2023-38371 | 1 Ibm | 1 Security Access Manager | 2025-11-03 | N/A | 5.9 MEDIUM |
| IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 261198. | |||||
| CVE-2023-38370 | 1 Ibm | 1 Security Access Manager | 2025-11-03 | N/A | 7.5 HIGH |
| IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1, under certain configurations, could allow a user on the network to install malicious packages. IBM X-Force ID: 261197. | |||||
| CVE-2023-38369 | 1 Ibm | 1 Security Access Manager Container | 2025-11-03 | N/A | 6.2 MEDIUM |
| IBM Security Access Manager Container 10.0.0.0 through 10.0.6.1 does not require that docker images should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 261196. | |||||
| CVE-2023-38368 | 1 Ibm | 1 Security Access Manager | 2025-11-03 | N/A | 5.5 MEDIUM |
| IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could disclose sensitive information to a local user to do improper permission controls. IBM X-Force ID: 261195. | |||||
| CVE-2023-38267 | 1 Ibm | 2 Security Verify Access, Security Verify Access Docker | 2025-11-03 | N/A | 6.2 MEDIUM |
| IBM Security Access Manager Appliance (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to possibly elevate their privileges due to sensitive configuration information being exposed. IBM X-Force ID: 260584. | |||||
| CVE-2023-37903 | 1 Vm2 Project | 1 Vm2 | 2025-11-03 | N/A | 9.8 CRITICAL |
| vm2 is an open source vm/sandbox for Node.js. In vm2 for versions up to and including 3.9.19, Node.js custom inspect function allows attackers to escape the sandbox and run arbitrary code. This may result in Remote Code Execution, assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox. There are no patches and no known workarounds. Users are advised to find an alternative software. | |||||
| CVE-2023-37466 | 1 Vm2 Project | 1 Vm2 | 2025-11-03 | N/A | 9.8 CRITICAL |
| vm2 is an advanced vm/sandbox for Node.js. The library contains critical security issues and should not be used for production. The maintenance of the project has been discontinued. In vm2 for versions up to 3.9.19, `Promise` handler sanitization can be bypassed with the `@@species` accessor property allowing attackers to escape the sandbox and run arbitrary code, potentially allowing remote code execution inside the context of vm2 sandbox. | |||||
| CVE-2023-34424 | 2025-11-03 | N/A | 4.4 MEDIUM | ||
| Improper input validation in firmware for some Intel(R) CSME may allow a privileged user to potentially enable denial of service via local access. | |||||
| CVE-2023-33865 | 1 Renderdoc | 1 Renderdoc | 2025-11-03 | N/A | 7.8 HIGH |
| RenderDoc before 1.27 allows local privilege escalation via a symlink attack. It relies on the /tmp/RenderDoc directory regardless of ownership. | |||||
| CVE-2023-33864 | 1 Renderdoc | 1 Renderdoc | 2025-11-03 | N/A | 9.8 CRITICAL |
| StreamReader::ReadFromExternal in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. It uses uint32_t(m_BufferSize-m_InputSize) even though m_InputSize can exceed m_BufferSize. | |||||
| CVE-2023-33863 | 1 Renderdoc | 1 Renderdoc | 2025-11-03 | N/A | 9.8 CRITICAL |
| SerialiseValue in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. 0xffffffff is sign-extended to 0xffffffffffffffff (SIZE_MAX) and then there is an attempt to add 1. | |||||
