diff --git a/vuln/core/154.json b/vuln/core/154.json new file mode 100644 index 00000000..e582d944 --- /dev/null +++ b/vuln/core/154.json @@ -0,0 +1,14 @@ +{ + "cve": [ + "CVE-2025-27210" + ], + "vulnerable": "20.x || 22.x || 24.x", + "patched": "^20.19.4 || ^22.17.1 || ^24.4.1", + "ref": "https://nodejs.org/en/blog/vulnerability/july-2025-security-releases/", + "description": "Windows Device Names (CON, PRN, AUX) Bypass Path Traversal Protection in path.normalize()", + "overview": "An incomplete fix has been identified for CVE-2025-23084 in Node.js, specifically affecting Windows device names like CON, PRN, and AUX. \n\nThis vulnerability affects Windows users of `path.join` API.", + "affectedEnvironments": [ + "win32" + ], + "severity": "high" +} diff --git a/vuln/core/155.json b/vuln/core/155.json new file mode 100644 index 00000000..dce073b6 --- /dev/null +++ b/vuln/core/155.json @@ -0,0 +1,14 @@ +{ + "cve": [ + "CVE-2025-27209" + ], + "vulnerable": "24.x", + "patched": "^24.4.1", + "ref": "https://nodejs.org/en/blog/vulnerability/july-2025-security-releases/", + "description": "HashDoS in V8", + "overview": "The V8 release used in Node.js v24.0.0 has changed how string hashes are computed using rapidhash. This implementation re-introduces the HashDoS vulnerability as an attacker who can control the strings to be hashed can generate many hash collisions - an attacker can generate collisions even without knowing the hash-seed.\n\n* This vulnerability affects Node.js v24.x users.", + "affectedEnvironments": [ + "all" + ], + "severity": "high" +}