From c7feb246e62ca1767378c19b3cb5c6c63998ede1 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Fri, 23 Sep 2022 20:43:31 +0200 Subject: Reference followup for CVE-2022-32213 --- data/CVE/list | 1 + 1 file changed, 1 insertion(+) (limited to 'data/CVE/list') diff --git a/data/CVE/list b/data/CVE/list index bc251f22fa..0c9b87be7e 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -23587,6 +23587,7 @@ CVE-2022-32213 (The llhttp parser in the http module in Node.js v17.x does not c NOTE: https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-flawed-parsing-of-transfer-encoding-medium-cve-2022-32213 NOTE: https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd (v14.x) NOTE: https://github.com/nodejs/node/commit/d9b71f4c241fa31cc2a48331a4fc28c15937875a (main) + NOTE: https://nodejs.org/en/blog/vulnerability/september-2022-security-releases/#cve-2022-32213-bypass-via-obs-fold-mechanic-medium-cve-2022-32213 CVE-2022-32212 (A OS Command Injection vulnerability exists in Node.js versions <14 ...) - nodejs 18.6.0+dfsg-3 NOTE: https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-ip-addresses-high-cve-2022-32212 -- cgit v1.2.3