Skip to content

Commit 60363ee

Browse files
github-actions[bot]Create or Update Pull Request ActionRafaelGSS
authored
update core index.json (#1429)
* vuln: update core index.json * vuln: update core index.json * vuln: update core index.json * vuln: update core index.json --------- Co-authored-by: Create or Update Pull Request Action <[email protected]> Co-authored-by: Rafael Gonzaga <[email protected]>
1 parent ef64a63 commit 60363ee

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed

vuln/core/index.json

+39
Original file line numberDiff line numberDiff line change
@@ -1956,5 +1956,44 @@
19561956
"all"
19571957
],
19581958
"severity": "unknown"
1959+
},
1960+
"147": {
1961+
"cve": [
1962+
"CVE-2025-23083"
1963+
],
1964+
"vulnerable": "20.x || 22.x || 23.x",
1965+
"patched": "^20.18.2 || ^22.13.1 || ^23.6.1",
1966+
"ref": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases/",
1967+
"overview": "With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \n\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23",
1968+
"affectedEnvironments": [
1969+
"all"
1970+
],
1971+
"severity": "high"
1972+
},
1973+
"148": {
1974+
"cve": [
1975+
"CVE-2025-23084"
1976+
],
1977+
"vulnerable": "18.x || 20.x || 22.x || 23.x",
1978+
"patched": "^18.20.6 || ^20.18.2 || ^22.13.1 || ^23.6.1",
1979+
"ref": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases/",
1980+
"overview": "A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory.\n\nOn Windows, a path that does not start with the file separator is treated as relative to the current directory. \n\nThis vulnerability affects Windows users of `path.join` API",
1981+
"affectedEnvironments": [
1982+
"win32"
1983+
],
1984+
"severity": "medium"
1985+
},
1986+
"149": {
1987+
"cve": [
1988+
"CVE-2025-23085"
1989+
],
1990+
"vulnerable": "18.x || 20.x || 22.x || 23.x",
1991+
"patched": "^18.20.6 || ^20.18.2 || ^22.13.1 || ^23.6.1",
1992+
"ref": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases/",
1993+
"overview": "A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions.\n\nThis vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.",
1994+
"affectedEnvironments": [
1995+
"all"
1996+
],
1997+
"severity": "medium"
19591998
}
19601999
}

0 commit comments

Comments
 (0)