Skip to content
This repository was archived by the owner on Sep 21, 2025. It is now read-only.

Commit 4b296f9

Browse files
committed
Automatic github actions updates. Changes found @lightswitch05
1 parent e9c5447 commit 4b296f9

3 files changed

Lines changed: 19 additions & 5 deletions

File tree

docs/rules-v1.json

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
2-
"lastUpdatedDate": "2025-07-18T13:45:38.214Z",
2+
"lastUpdatedDate": "2025-07-19T02:56:52.275Z",
33
"name": "Node Version Audit",
44
"website": "https://github.com/lightswitch05/node-version-audit",
55
"license": "https://github.com/lightswitch05/node-version-audit/blob/master/LICENSE",
66
"source": "https://www.github.developerdan.com/node-version-audit/rules-v1.json",
77
"releasesCount": 673,
8-
"cveCount": 141,
8+
"cveCount": 143,
99
"supportVersionsCount": 23,
1010
"latestVersion": "24.4.1",
1111
"latestVersions": {
@@ -5503,6 +5503,20 @@
55035503
"publishedDate": "2025-05-19T02:15:00.000Z",
55045504
"lastModifiedDate": "2025-05-19T16:15:00.000Z",
55055505
"description": "A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\\r\\n\\rX` instead of the required `\\r\\n\\r\\n`.\nThis inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests.\n\nThe issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination.\n\nImpact:\n* This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade."
5506+
},
5507+
"CVE-2025-27209": {
5508+
"id": "CVE-2025-27209",
5509+
"baseScore": null,
5510+
"publishedDate": "2025-07-18T23:15:00.000Z",
5511+
"lastModifiedDate": "2025-07-18T23:15:00.000Z",
5512+
"description": "The V8 release used in Node.js v24.0.0 has changed how string hashes are computed using rapidhash. This implementation re-introduces the HashDoS vulnerability as an attacker who can control the strings to be hashed can generate many hash collisions - an attacker can generate collisions even without knowing the hash-seed.\r\n\r\n* This vulnerability affects Node.js v24.x users."
5513+
},
5514+
"CVE-2025-27210": {
5515+
"id": "CVE-2025-27210",
5516+
"baseScore": null,
5517+
"publishedDate": "2025-07-18T23:15:00.000Z",
5518+
"lastModifiedDate": "2025-07-18T23:15:00.000Z",
5519+
"description": "An incomplete fix has been identified for CVE-2025-23084 in Node.js, specifically affecting Windows device names like CON, PRN, and AUX. \r\n\r\nThis vulnerability affects Windows users of `path.join` API."
55065520
}
55075521
}
55085522
}

package-lock.json

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "node-version-audit",
3-
"version": "1.20250718.1",
3+
"version": "1.20250719.0",
44
"description": "Audit your Node version for known CVEs and patches ",
55
"main": "index.js",
66
"scripts": {

0 commit comments

Comments
 (0)