Количество 54
Количество 54

RLSA-2020:5499
Moderate: nodejs:12 security and bug fix update
ELSA-2020-5499
ELSA-2020-5499: nodejs:12 security and bug fix update (MODERATE)

RLSA-2021:0548
Moderate: nodejs:10 security update
ELSA-2021-0548
ELSA-2021-0548: nodejs:10 security update (MODERATE)

RLSA-2021:0551
Moderate: nodejs:14 security and bug fix update
ELSA-2021-0551
ELSA-2021-0551: nodejs:14 security and bug fix update (MODERATE)

CVE-2020-15366
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)

CVE-2020-15366
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)

CVE-2020-15366
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
CVE-2020-15366
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Sch ...
GHSA-v88g-cgmw-v5xw
Prototype Pollution in Ajv

CVE-2020-7608
yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload.

CVE-2020-7608
yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload.

CVE-2020-7608
yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload.
CVE-2020-7608
yargs-parser could be tricked into adding or modifying properties of O ...
GHSA-p9pc-299p-vxgp
yargs-parser Vulnerable to Prototype Pollution

BDU:2021-02883
Уязвимость библиотеки yargs-parser прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю реализовать атаку типа «загрязнение прототипа»

CVE-2020-8277
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVE-2020-8277
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVE-2020-8277
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | RLSA-2020:5499 Moderate: nodejs:12 security and bug fix update | больше 4 лет назад | ||
ELSA-2020-5499 ELSA-2020-5499: nodejs:12 security and bug fix update (MODERATE) | больше 4 лет назад | |||
![]() | RLSA-2021:0548 Moderate: nodejs:10 security update | больше 4 лет назад | ||
ELSA-2021-0548 ELSA-2021-0548: nodejs:10 security update (MODERATE) | больше 4 лет назад | |||
![]() | RLSA-2021:0551 Moderate: nodejs:14 security and bug fix update | больше 4 лет назад | ||
ELSA-2021-0551 ELSA-2021-0551: nodejs:14 security and bug fix update (MODERATE) | больше 4 лет назад | |||
![]() | CVE-2020-15366 An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.) | CVSS3: 5.6 | 0% Низкий | почти 5 лет назад |
![]() | CVE-2020-15366 An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.) | CVSS3: 5.6 | 0% Низкий | почти 5 лет назад |
![]() | CVE-2020-15366 An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.) | CVSS3: 5.6 | 0% Низкий | почти 5 лет назад |
CVE-2020-15366 An issue was discovered in ajv.validate() in Ajv (aka Another JSON Sch ... | CVSS3: 5.6 | 0% Низкий | почти 5 лет назад | |
GHSA-v88g-cgmw-v5xw Prototype Pollution in Ajv | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад | |
![]() | CVE-2020-7608 yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. | CVSS3: 5.3 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2020-7608 yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. | CVSS3: 5.3 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2020-7608 yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. | CVSS3: 5.3 | 0% Низкий | больше 5 лет назад |
CVE-2020-7608 yargs-parser could be tricked into adding or modifying properties of O ... | CVSS3: 5.3 | 0% Низкий | больше 5 лет назад | |
GHSA-p9pc-299p-vxgp yargs-parser Vulnerable to Prototype Pollution | CVSS3: 5.3 | 0% Низкий | почти 5 лет назад | |
![]() | BDU:2021-02883 Уязвимость библиотеки yargs-parser прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю реализовать атаку типа «загрязнение прототипа» | CVSS3: 5.3 | 0% Низкий | около 4 лет назад |
![]() | CVE-2020-8277 A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1. | CVSS3: 7.5 | 59% Средний | больше 4 лет назад |
![]() | CVE-2020-8277 A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1. | CVSS3: 7.5 | 59% Средний | больше 4 лет назад |
![]() | CVE-2020-8277 A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1. | CVSS3: 7.5 | 59% Средний | больше 4 лет назад |
Уязвимостей на страницу