Node.js reports:
+++ +Code injection and privilege escalation through Linux capabilities- (High)
+http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks- (High)
+Path traversal by monkey-patching Buffer internals- (High)
+setuid() does not drop all privileges due to io_uring - (High)
+Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) - (Medium)
+Multiple permission model bypasses due to improper path traversal sequence sanitization - (Medium)
+Improper handling of wildcards in --allow-fs-read and --allow-fs-write (Medium)
+Denial of Service by resource exhaustion in fetch() brotli decoding - (Medium)
+
support@hackerone.com reports:
+++ +On Linux, Node.js ignores certain environment variables if those + may have been set by an unprivileged user while the process is + running with elevated privileges with the only exception of + CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this + exception, Node.js incorrectly applies this exception even when + certain other capabilities have been set. This allows unprivileged + users to inject code that inherits the process's elevated + privileges.
+