Skip to content
This repository was archived by the owner on Sep 21, 2025. It is now read-only.

Commit d324902

Browse files
committed
Automatic github actions updates. Changes found @lightswitch05
1 parent cd0ed63 commit d324902

3 files changed

Lines changed: 17 additions & 12 deletions

File tree

docs/rules-v1.json

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
2-
"lastUpdatedDate": "2025-05-08T13:35:22.310Z",
2+
"lastUpdatedDate": "2025-05-09T02:46:17.042Z",
33
"name": "Node Version Audit",
44
"website": "https://github.com/lightswitch05/node-version-audit",
55
"license": "https://github.com/lightswitch05/node-version-audit/blob/master/LICENSE",
66
"source": "https://www.github.developerdan.com/node-version-audit/rules-v1.json",
7-
"releasesCount": 658,
7+
"releasesCount": 659,
88
"cveCount": 138,
99
"supportVersionsCount": 21,
10-
"latestVersion": "24.0.0",
10+
"latestVersion": "24.0.1",
1111
"latestVersions": {
1212
"0": "0.12.18",
1313
"1": "1.8.4",
@@ -33,7 +33,7 @@
3333
"21": "21.7.3",
3434
"22": "22.15.0",
3535
"23": "23.11.0",
36-
"24": "24.0.0",
36+
"24": "24.0.1",
3737
"0.10": "0.10.48",
3838
"0.12": "0.12.18",
3939
"1.0": "1.0.4",
@@ -371,7 +371,7 @@
371371
"23.9": "23.9.0",
372372
"23.10": "23.10.0",
373373
"23.11": "23.11.0",
374-
"24.0": "24.0.0"
374+
"24.0": "24.0.1"
375375
},
376376
"supportEndDates": {
377377
"4": {
@@ -4403,6 +4403,11 @@
44034403
"version": "24.0.0",
44044404
"releaseDate": "2025-05-06T00:00:00.000Z",
44054405
"patchedCveIds": []
4406+
},
4407+
"24.0.1": {
4408+
"version": "24.0.1",
4409+
"releaseDate": "2025-05-08T00:00:00.000Z",
4410+
"patchedCveIds": []
44064411
}
44074412
},
44084413
"cves": {
@@ -5033,7 +5038,7 @@
50335038
"id": "CVE-2023-23918",
50345039
"baseScore": 7.5,
50355040
"publishedDate": "2023-02-23T20:15:00.000Z",
5036-
"lastModifiedDate": "2025-03-12T18:15:00.000Z",
5041+
"lastModifiedDate": "2025-05-08T17:16:00.000Z",
50375042
"description": "A privilege escalation vulnerability exists in Node.js <19.6.1, <18.14.1, <16.19.1 and <14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy."
50385043
},
50395044
"CVE-2023-23919": {
@@ -5103,7 +5108,7 @@
51035108
"id": "CVE-2023-30586",
51045109
"baseScore": 7.5,
51055110
"publishedDate": "2023-07-01T00:15:00.000Z",
5106-
"lastModifiedDate": "2024-11-21T08:00:00.000Z",
5111+
"lastModifiedDate": "2025-05-08T17:16:00.000Z",
51075112
"description": "A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process's stack memory to locate the permission model Permission::enabled_ in the host process's heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js."
51085113
},
51095114
"CVE-2023-30587": {
@@ -5152,7 +5157,7 @@
51525157
"id": "CVE-2023-32004",
51535158
"baseScore": 8.8,
51545159
"publishedDate": "2023-08-15T16:15:00.000Z",
5155-
"lastModifiedDate": "2024-11-21T08:02:00.000Z",
5160+
"lastModifiedDate": "2025-05-08T16:15:00.000Z",
51565161
"description": "A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of Buffers in file system APIs causing a traversal path to bypass when verifying file permissions.\n\nThis vulnerability affects all users using the experimental permission model in Node.js 20.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js."
51575162
},
51585163
"CVE-2023-32005": {
@@ -5166,7 +5171,7 @@
51665171
"id": "CVE-2023-32006",
51675172
"baseScore": 8.8,
51685173
"publishedDate": "2023-08-15T16:15:00.000Z",
5169-
"lastModifiedDate": "2024-11-21T08:02:00.000Z",
5174+
"lastModifiedDate": "2025-05-08T16:15:00.000Z",
51705175
"description": "The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js."
51715176
},
51725177
"CVE-2023-32558": {

package-lock.json

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "node-version-audit",
3-
"version": "1.20250508.1",
3+
"version": "1.20250509.0",
44
"description": "Audit your Node version for known CVEs and patches ",
55
"main": "index.js",
66
"scripts": {

0 commit comments

Comments
 (0)