Количество 28
Количество 28
GHSA-g526-x7vj-cfv6
When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.

CVE-2023-30588
When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.

CVE-2023-30588
When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.

CVE-2023-30588
When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.
CVE-2023-30588
When an invalid public key is used to create an x509 certificate using ...

BDU:2023-04951
Уязвимость функции crypto.X509Certificate() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20240917-04
Уязвимость nodejs
ELSA-2023-4537
ELSA-2023-4537: nodejs:16 security, bug fix, and enhancement update (MODERATE)
ELSA-2023-4536
ELSA-2023-4536: nodejs:18 security, bug fix, and enhancement update (MODERATE)
ELSA-2023-4331
ELSA-2023-4331: nodejs security, bug fix, and enhancement update (MODERATE)
ELSA-2023-4330
ELSA-2023-4330: 18 security, bug fix, and enhancement update (MODERATE)
ELSA-2023-12944
ELSA-2023-12944: GraalVM Security update (IMPORTANT)
ELSA-2023-12943
ELSA-2023-12943: GraalVM Security update (IMPORTANT)
ELSA-2023-12942
ELSA-2023-12942: GraalVM Security update (IMPORTANT)
ELSA-2023-12941
ELSA-2023-12941: GraalVM Security update (IMPORTANT)
ELSA-2023-12940
ELSA-2023-12940: GraalVM Security update (IMPORTANT)
ELSA-2023-12939
ELSA-2023-12939: GraalVM Security update (IMPORTANT)
ELSA-2023-12938
ELSA-2023-12938: GraalVM Security update (IMPORTANT)
ELSA-2023-12937
ELSA-2023-12937: GraalVM Security update (IMPORTANT)
ELSA-2023-12936
ELSA-2023-12936: GraalVM Security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-g526-x7vj-cfv6 When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2023-30588 When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-30588 When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20. | CVSS3: 5.3 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-30588 When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
CVE-2023-30588 When an invalid public key is used to create an x509 certificate using ... | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2023-04951 Уязвимость функции crypto.X509Certificate() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | почти 2 года назад |
![]() | ROS-20240917-04 Уязвимость nodejs | CVSS3: 5.3 | 0% Низкий | 9 месяцев назад |
ELSA-2023-4537 ELSA-2023-4537: nodejs:16 security, bug fix, and enhancement update (MODERATE) | почти 2 года назад | |||
ELSA-2023-4536 ELSA-2023-4536: nodejs:18 security, bug fix, and enhancement update (MODERATE) | почти 2 года назад | |||
ELSA-2023-4331 ELSA-2023-4331: nodejs security, bug fix, and enhancement update (MODERATE) | почти 2 года назад | |||
ELSA-2023-4330 ELSA-2023-4330: 18 security, bug fix, and enhancement update (MODERATE) | почти 2 года назад | |||
ELSA-2023-12944 ELSA-2023-12944: GraalVM Security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12943 ELSA-2023-12943: GraalVM Security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12942 ELSA-2023-12942: GraalVM Security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12941 ELSA-2023-12941: GraalVM Security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12940 ELSA-2023-12940: GraalVM Security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12939 ELSA-2023-12939: GraalVM Security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12938 ELSA-2023-12938: GraalVM Security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12937 ELSA-2023-12937: GraalVM Security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12936 ELSA-2023-12936: GraalVM Security update (IMPORTANT) | больше 1 года назад |
Уязвимостей на страницу