Skip to content

Commit 81a2c13

Browse files
authored
Sync security vulnerabilities (#1496)
1 parent 893a80e commit 81a2c13

File tree

2 files changed

+28
-0
lines changed

2 files changed

+28
-0
lines changed

vuln/core/154.json

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"cve": [
3+
"CVE-2025-27210"
4+
],
5+
"vulnerable": "20.x || 22.x || 24.x",
6+
"patched": "^20.19.4 || ^22.17.1 || ^24.4.1",
7+
"ref": "https://nodejs.org/en/blog/vulnerability/july-2025-security-releases/",
8+
"description": "Windows Device Names (CON, PRN, AUX) Bypass Path Traversal Protection in path.normalize()",
9+
"overview": "An incomplete fix has been identified for CVE-2025-23084 in Node.js, specifically affecting Windows device names like CON, PRN, and AUX. \n\nThis vulnerability affects Windows users of `path.join` API.",
10+
"affectedEnvironments": [
11+
"win32"
12+
],
13+
"severity": "high"
14+
}

vuln/core/155.json

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"cve": [
3+
"CVE-2025-27209"
4+
],
5+
"vulnerable": "24.x",
6+
"patched": "^24.4.1",
7+
"ref": "https://nodejs.org/en/blog/vulnerability/july-2025-security-releases/",
8+
"description": "HashDoS in V8",
9+
"overview": "The V8 release used in Node.js v24.0.0 has changed how string hashes are computed using rapidhash. This implementation re-introduces the HashDoS vulnerability as an attacker who can control the strings to be hashed can generate many hash collisions - an attacker can generate collisions even without knowing the hash-seed.\n\n* This vulnerability affects Node.js v24.x users.",
10+
"affectedEnvironments": [
11+
"all"
12+
],
13+
"severity": "high"
14+
}

0 commit comments

Comments
 (0)