Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2701 | fsevents before 1.2.11 depends on the https://fsevents-binaries.s3-us-west-2.amazonaws.com URL, which might allow an adversary to execute arbitrary code if any JavaScript project (that depends on fsevents) distributes code that was obtained from that URL at a time when it was controlled by an adversary. NOTE: some sources feel that this means that no version is affected any longer, because the URL is not controlled by an adversary. |
Github GHSA |
GHSA-8r6j-v8pm-fqw3 | Code injection in fsevents |
Tue, 26 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-26T21:45:11.260Z
Reserved: 2023-10-06T00:00:00.000Z
Link: CVE-2023-45311
Updated: 2024-08-02T20:21:15.380Z
Status : Modified
Published: 2023-10-06T21:15:10.940
Modified: 2024-11-21T08:26:43.370
Link: CVE-2023-45311
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA