vulnerability
FreeBSD: VID-b092bd4f-1b16-11ec-9d9d-0022489ad614 (CVE-2021-22939): Node.js -- August 2021 Security Releases
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Sep 21, 2021 | Nov 4, 2022 | Dec 10, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Sep 21, 2021
Added
Nov 4, 2022
Modified
Dec 10, 2025
Description
Node.js reports: cares upgrade - Improper handling of untypical characters in domain names (High) (CVE-2021-22931) Node.js was vulnerable to Remote Code Execution, XSS, application crashes due to missing input validation of host names returned by Domain Name Servers in the Node.js DNS library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library. Use after free on close http2 on stream canceling (High) (CVE-2021-22940) Node.js was vulnerable to a use after free attack where an attacker might be able to exploit memory corruption to change process behavior. The issue is a follow on to CVE-2021-22930 as the issue was not completely resolved in the fix for CVE-2021-22930. Incomplete validation of rejectUnauthorized parameter (Low) (CVE-2021-22939) If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.
Solutions
freebsd-upgrade-package-node14freebsd-upgrade-package-node
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.