Search CVE reports
1 – 8 of 8 results
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Express. This vulnerability affects the use of the Express Response object. This issue impacts Express: from 3.4.5 before 4.0.0.
1 affected package
node-express
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
node-express | Not affected | Not affected | Not affected | Not affected |
path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. The regular expression that is vulnerable to...
2 affected packages
node-path-to-regexp, node-express
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
node-path-to-regexp | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
node-express | Not affected | Not affected | Not affected | Not affected |
path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex...
2 affected packages
node-path-to-regexp, node-express
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
node-path-to-regexp | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
node-express | Not affected | Not affected | Not affected | Not affected |
Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.
1 affected package
node-express
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
node-express | Fixed | Fixed | Fixed | Fixed |
Some fixes available 4 of 5
Express.js minimalist web framework for node. Versions of Express.js prior to 4.19.0 and all pre-release alpha and beta versions of 5.0 are affected by an open redirect vulnerability using malformed URLs. When a user of Express...
1 affected package
node-express
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
node-express | Not affected | Fixed | Fixed | Fixed |
A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header...
1 affected package
node-express
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
node-express | Not affected | Not affected | Not affected | Not affected |
Some fixes available 2 of 5
qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an...
2 affected packages
node-express, node-qs
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
node-express | Not affected | Not affected | Fixed | Not affected |
node-qs | Not affected | Not affected | Fixed | Not affected |
Some fixes available 13 of 22
The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS)...
1 affected package
node-express
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
node-express | Fixed | Fixed | Fixed | Vulnerable |