Node.js — программная платформа, основанная на движке V8 (компилирующем JavaScript в машинный код)
Релизный цикл, информация об уязвимостях
График релизов
Количество 1 014

BDU:2019-02939
Уязвимость парсера URL-адресов библиотеки Node.js, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным

CVE-2018-5407
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
CVE-2018-5407
Simultaneous Multi-threading (SMT) in processors can enable local user ...

CVE-2018-5407
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
GHSA-38h8-x697-gh8q
Tmp files readable by other users in sync-exec
GHSA-79mx-88w7-8f7q
XSS Filter Bypass via Encoded URL in validator

CVE-2018-0734
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
CVE-2018-0734
The OpenSSL DSA signature algorithm has been shown to be vulnerable to ...

CVE-2018-0734
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

CVE-2018-5407
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
![]() | BDU:2019-02939 Уязвимость парсера URL-адресов библиотеки Node.js, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад |
![]() | CVE-2018-5407 Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'. | CVSS3: 4.7 | 1% Низкий | почти 7 лет назад |
CVE-2018-5407 Simultaneous Multi-threading (SMT) in processors can enable local user ... | CVSS3: 4.7 | 1% Низкий | почти 7 лет назад | |
![]() | CVE-2018-5407 Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'. | CVSS3: 4.7 | 1% Низкий | почти 7 лет назад |
GHSA-38h8-x697-gh8q Tmp files readable by other users in sync-exec | CVSS3: 6.5 | 0% Низкий | почти 7 лет назад | |
GHSA-79mx-88w7-8f7q XSS Filter Bypass via Encoded URL in validator | CVSS3: 6.1 | 1% Низкий | почти 7 лет назад | |
![]() | CVE-2018-0734 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p). | CVSS3: 5.9 | 4% Низкий | почти 7 лет назад |
CVE-2018-0734 The OpenSSL DSA signature algorithm has been shown to be vulnerable to ... | CVSS3: 5.9 | 4% Низкий | почти 7 лет назад | |
![]() | CVE-2018-0734 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p). | CVSS3: 5.9 | 4% Низкий | почти 7 лет назад |
![]() | CVE-2018-5407 Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'. | CVSS3: 4.8 | 1% Низкий | почти 7 лет назад |
Уязвимостей на страницу