Количество 4
Количество 4
CVE-2017-16129
The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.
CVE-2017-16129
The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.
CVE-2017-16129
The HTTP client module superagent is vulnerable to ZIP bomb attacks. I ...
GHSA-8225-6cvr-8pqp
superagent vulnerable to zip bomb attacks
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-16129 The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to. | CVSS3: 5.9 | 0% Низкий | больше 7 лет назад | |
CVE-2017-16129 The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to. | CVSS3: 5.9 | 0% Низкий | больше 7 лет назад | |
CVE-2017-16129 The HTTP client module superagent is vulnerable to ZIP bomb attacks. I ... | CVSS3: 5.9 | 0% Низкий | больше 7 лет назад | |
GHSA-8225-6cvr-8pqp superagent vulnerable to zip bomb attacks | CVSS3: 5.9 | 0% Низкий | больше 7 лет назад |
Уязвимостей на страницу