Skip to content
This repository was archived by the owner on Sep 21, 2025. It is now read-only.

Commit 36b3a45

Browse files
committed
Automatic github actions updates. Changes found @lightswitch05
1 parent 8e80e63 commit 36b3a45

3 files changed

Lines changed: 5 additions & 201 deletions

File tree

docs/rules-v1.json

Lines changed: 2 additions & 198 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
2-
"lastUpdatedDate": "2025-04-13T03:47:21.678Z",
2+
"lastUpdatedDate": "2025-04-13T13:33:13.114Z",
33
"name": "Node Version Audit",
44
"website": "https://github.com/lightswitch05/node-version-audit",
55
"license": "https://github.com/lightswitch05/node-version-audit/blob/master/LICENSE",
66
"source": "https://www.github.developerdan.com/node-version-audit/rules-v1.json",
77
"releasesCount": 655,
8-
"cveCount": 172,
8+
"cveCount": 144,
99
"supportVersionsCount": 21,
1010
"latestVersion": "23.11.0",
1111
"latestVersions": {
@@ -4388,216 +4388,20 @@
43884388
}
43894389
},
43904390
"cves": {
4391-
"CVE-2013-6668": {
4392-
"id": "CVE-2013-6668",
4393-
"baseScore": 7.5,
4394-
"publishedDate": "2014-03-05T05:11:00.000Z",
4395-
"lastModifiedDate": "2024-11-21T01:59:00.000Z",
4396-
"description": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
4397-
},
4398-
"CVE-2014-224": {
4399-
"id": "CVE-2014-224",
4400-
"baseScore": 7.4,
4401-
"publishedDate": "2014-06-05T21:55:00.000Z",
4402-
"lastModifiedDate": "2024-11-21T02:01:00.000Z",
4403-
"description": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability."
4404-
},
44054391
"CVE-2014-9748": {
44064392
"id": "CVE-2014-9748",
44074393
"baseScore": 8.1,
44084394
"publishedDate": "2020-02-11T17:15:00.000Z",
44094395
"lastModifiedDate": "2024-11-21T02:21:00.000Z",
44104396
"description": "The uv_rwlock_t fallback implementation for Windows XP and Server 2003 in libuv before 1.7.4 does not properly prevent threads from releasing the locks of other threads, which allows attackers to cause a denial of service (deadlock) or possibly have unspecified other impact by leveraging a race condition."
44114397
},
4412-
"CVE-2015-278": {
4413-
"id": "CVE-2015-278",
4414-
"baseScore": 10,
4415-
"publishedDate": "2015-05-18T15:59:00.000Z",
4416-
"lastModifiedDate": "2024-11-21T02:22:00.000Z",
4417-
"description": "libuv before 0.10.34 does not properly drop group privileges, which allows context-dependent attackers to gain privileges via unspecified vectors."
4418-
},
4419-
"CVE-2015-1788": {
4420-
"id": "CVE-2015-1788",
4421-
"baseScore": 4.3,
4422-
"publishedDate": "2015-06-12T19:59:00.000Z",
4423-
"lastModifiedDate": "2024-11-21T02:26:00.000Z",
4424-
"description": "The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication."
4425-
},
4426-
"CVE-2015-1793": {
4427-
"id": "CVE-2015-1793",
4428-
"baseScore": 6.5,
4429-
"publishedDate": "2015-07-09T19:17:00.000Z",
4430-
"lastModifiedDate": "2024-11-21T02:26:00.000Z",
4431-
"description": "The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate."
4432-
},
4433-
"CVE-2015-3193": {
4434-
"id": "CVE-2015-3193",
4435-
"baseScore": 7.5,
4436-
"publishedDate": "2015-12-06T20:59:00.000Z",
4437-
"lastModifiedDate": "2024-11-21T02:28:00.000Z",
4438-
"description": "The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite."
4439-
},
4440-
"CVE-2015-3194": {
4441-
"id": "CVE-2015-3194",
4442-
"baseScore": 7.5,
4443-
"publishedDate": "2015-12-06T20:59:00.000Z",
4444-
"lastModifiedDate": "2024-11-21T02:28:00.000Z",
4445-
"description": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter."
4446-
},
4447-
"CVE-2015-6764": {
4448-
"id": "CVE-2015-6764",
4449-
"baseScore": 9.8,
4450-
"publishedDate": "2015-12-06T01:59:00.000Z",
4451-
"lastModifiedDate": "2024-11-21T02:35:00.000Z",
4452-
"description": "The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code."
4453-
},
44544398
"CVE-2015-7384": {
44554399
"id": "CVE-2015-7384",
44564400
"baseScore": 7.5,
44574401
"publishedDate": "2017-10-10T16:29:00.000Z",
44584402
"lastModifiedDate": "2024-11-21T02:36:00.000Z",
44594403
"description": "Node.js 4.0.0, 4.1.0, and 4.1.1 allows remote attackers to cause a denial of service."
44604404
},
4461-
"CVE-2015-8027": {
4462-
"id": "CVE-2015-8027",
4463-
"baseScore": 7.5,
4464-
"publishedDate": "2016-01-02T21:59:00.000Z",
4465-
"lastModifiedDate": "2024-11-21T02:37:00.000Z",
4466-
"description": "Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availability of a parser for each HTTP socket, which allows remote attackers to cause a denial of service (uncaughtException and service outage) via a pipelined HTTP request."
4467-
},
4468-
"CVE-2016-702": {
4469-
"id": "CVE-2016-702",
4470-
"baseScore": 5.1,
4471-
"publishedDate": "2016-03-03T20:59:00.000Z",
4472-
"lastModifiedDate": "2024-11-21T02:42:00.000Z",
4473-
"description": "The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a \"CacheBleed\" attack."
4474-
},
4475-
"CVE-2016-705": {
4476-
"id": "CVE-2016-705",
4477-
"baseScore": 9.8,
4478-
"publishedDate": "2016-03-03T20:59:00.000Z",
4479-
"lastModifiedDate": "2024-11-21T02:42:00.000Z",
4480-
"description": "Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key."
4481-
},
4482-
"CVE-2016-797": {
4483-
"id": "CVE-2016-797",
4484-
"baseScore": 7.5,
4485-
"publishedDate": "2016-03-03T20:59:00.000Z",
4486-
"lastModifiedDate": "2024-11-21T02:42:00.000Z",
4487-
"description": "Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c."
4488-
},
4489-
"CVE-2016-1669": {
4490-
"id": "CVE-2016-1669",
4491-
"baseScore": 8.8,
4492-
"publishedDate": "2016-05-14T21:59:00.000Z",
4493-
"lastModifiedDate": "2024-11-21T02:46:00.000Z",
4494-
"description": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
4495-
},
4496-
"CVE-2016-1699": {
4497-
"id": "CVE-2016-1699",
4498-
"baseScore": 6.5,
4499-
"publishedDate": "2016-06-05T23:59:00.000Z",
4500-
"lastModifiedDate": "2024-11-21T02:46:00.000Z",
4501-
"description": "WebKit/Source/devtools/front_end/devtools.js in the Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 51.0.2704.79, does not ensure that the remoteFrontendUrl parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL."
4502-
},
4503-
"CVE-2016-2086": {
4504-
"id": "CVE-2016-2086",
4505-
"baseScore": 7.5,
4506-
"publishedDate": "2016-04-07T21:59:00.000Z",
4507-
"lastModifiedDate": "2024-11-21T02:47:00.000Z",
4508-
"description": "Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header."
4509-
},
4510-
"CVE-2016-2105": {
4511-
"id": "CVE-2016-2105",
4512-
"baseScore": 7.5,
4513-
"publishedDate": "2016-05-05T01:59:00.000Z",
4514-
"lastModifiedDate": "2024-11-21T02:47:00.000Z",
4515-
"description": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data."
4516-
},
4517-
"CVE-2016-2107": {
4518-
"id": "CVE-2016-2107",
4519-
"baseScore": 5.9,
4520-
"publishedDate": "2016-05-05T01:59:00.000Z",
4521-
"lastModifiedDate": "2024-11-21T02:47:00.000Z",
4522-
"description": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169."
4523-
},
4524-
"CVE-2016-2178": {
4525-
"id": "CVE-2016-2178",
4526-
"baseScore": 5.5,
4527-
"publishedDate": "2016-06-20T01:59:00.000Z",
4528-
"lastModifiedDate": "2024-11-21T02:47:00.000Z",
4529-
"description": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack."
4530-
},
4531-
"CVE-2016-2183": {
4532-
"id": "CVE-2016-2183",
4533-
"baseScore": 7.5,
4534-
"publishedDate": "2016-09-01T00:59:00.000Z",
4535-
"lastModifiedDate": "2025-03-31T15:15:00.000Z",
4536-
"description": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack."
4537-
},
4538-
"CVE-2016-2216": {
4539-
"id": "CVE-2016-2216",
4540-
"baseScore": 7.5,
4541-
"publishedDate": "2016-04-07T21:59:00.000Z",
4542-
"lastModifiedDate": "2024-11-21T02:48:00.000Z",
4543-
"description": "The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a."
4544-
},
4545-
"CVE-2016-5172": {
4546-
"id": "CVE-2016-5172",
4547-
"baseScore": 6.5,
4548-
"publishedDate": "2016-09-25T20:59:00.000Z",
4549-
"lastModifiedDate": "2024-11-21T02:53:00.000Z",
4550-
"description": "The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code."
4551-
},
4552-
"CVE-2016-5180": {
4553-
"id": "CVE-2016-5180",
4554-
"baseScore": 9.8,
4555-
"publishedDate": "2016-10-03T15:59:00.000Z",
4556-
"lastModifiedDate": "2024-11-21T02:53:00.000Z",
4557-
"description": "Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot."
4558-
},
4559-
"CVE-2016-5325": {
4560-
"id": "CVE-2016-5325",
4561-
"baseScore": 6.1,
4562-
"publishedDate": "2016-10-10T16:59:00.000Z",
4563-
"lastModifiedDate": "2024-11-21T02:54:00.000Z",
4564-
"description": "CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument."
4565-
},
4566-
"CVE-2016-6303": {
4567-
"id": "CVE-2016-6303",
4568-
"baseScore": 9.8,
4569-
"publishedDate": "2016-09-16T05:59:00.000Z",
4570-
"lastModifiedDate": "2024-11-21T02:55:00.000Z",
4571-
"description": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors."
4572-
},
4573-
"CVE-2016-6304": {
4574-
"id": "CVE-2016-6304",
4575-
"baseScore": 7.5,
4576-
"publishedDate": "2016-09-26T19:59:00.000Z",
4577-
"lastModifiedDate": "2024-11-21T02:55:00.000Z",
4578-
"description": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions."
4579-
},
4580-
"CVE-2016-6306": {
4581-
"id": "CVE-2016-6306",
4582-
"baseScore": 5.9,
4583-
"publishedDate": "2016-09-26T19:59:00.000Z",
4584-
"lastModifiedDate": "2024-11-21T02:55:00.000Z",
4585-
"description": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c."
4586-
},
4587-
"CVE-2016-7052": {
4588-
"id": "CVE-2016-7052",
4589-
"baseScore": 7.5,
4590-
"publishedDate": "2016-09-26T19:59:00.000Z",
4591-
"lastModifiedDate": "2024-11-21T02:57:00.000Z",
4592-
"description": "crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation."
4593-
},
4594-
"CVE-2016-7099": {
4595-
"id": "CVE-2016-7099",
4596-
"baseScore": 5.9,
4597-
"publishedDate": "2016-10-10T16:59:00.000Z",
4598-
"lastModifiedDate": "2024-11-21T02:57:00.000Z",
4599-
"description": "The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate."
4600-
},
46014405
"CVE-2017-3738": {
46024406
"id": "CVE-2017-3738",
46034407
"baseScore": 5.9,

package-lock.json

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "node-version-audit",
3-
"version": "1.20250413.0",
3+
"version": "1.20250413.1",
44
"description": "Audit your Node version for known CVEs and patches ",
55
"main": "index.js",
66
"scripts": {

0 commit comments

Comments
 (0)