Логотип exploitDog
bind:"CVE-2020-15095" OR bind:"CVE-2020-8116" OR bind:"CVE-2020-8201" OR bind:"CVE-2020-8252"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-15095" OR bind:"CVE-2020-8116" OR bind:"CVE-2020-8201" OR bind:"CVE-2020-8252"

Количество 35

Количество 35

debian логотип

CVE-2020-8116

больше 5 лет назад

Prototype pollution vulnerability in dot-prop npm package versions bef ...

CVSS3: 7.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2800-1

больше 4 лет назад

Security update for nodejs8

EPSS: Низкий
github логотип

GHSA-ff7x-qrg7-qggm

почти 5 лет назад

dot-prop Prototype Pollution vulnerability

CVSS3: 7.3
EPSS: Низкий
fstec логотип

BDU:2021-02884

около 4 лет назад

Уязвимость библиотеки dot-prop прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю реализовать атаку типа «загрязнение прототипа»

CVSS3: 7.3
EPSS: Низкий
ubuntu логотип

CVE-2020-8201

почти 5 лет назад

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2020-8201

почти 5 лет назад

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2020-8201

почти 5 лет назад

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2020-8201

почти 5 лет назад

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync ...

CVSS3: 7.4
EPSS: Низкий
ubuntu логотип

CVE-2020-8252

почти 5 лет назад

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2020-8252

почти 5 лет назад

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2020-8252

почти 5 лет назад

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2020-8252

почти 5 лет назад

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14 ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-7mcp-gwc2-4c6m

около 3 лет назад

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.

CVSS3: 7.4
EPSS: Низкий
fstec логотип

BDU:2020-05657

почти 5 лет назад

Уязвимость программной платформы Node.js, связанная с ошибкой обработки имен HTTP - заголовка, позволяющая нарушителю получить доступ к защищаемой информации или повысить свои привилегии

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-c5r6-cm8r-wgh9

около 3 лет назад

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
debian логотип
CVE-2020-8116

Prototype pollution vulnerability in dot-prop npm package versions bef ...

CVSS3: 7.3
0%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2800-1

Security update for nodejs8

больше 4 лет назад
github логотип
GHSA-ff7x-qrg7-qggm

dot-prop Prototype Pollution vulnerability

CVSS3: 7.3
0%
Низкий
почти 5 лет назад
fstec логотип
BDU:2021-02884

Уязвимость библиотеки dot-prop прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю реализовать атаку типа «загрязнение прототипа»

CVSS3: 7.3
0%
Низкий
около 4 лет назад
ubuntu логотип
CVE-2020-8201

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.

CVSS3: 7.4
1%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-8201

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.

CVSS3: 7.4
1%
Низкий
почти 5 лет назад
nvd логотип
CVE-2020-8201

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.

CVSS3: 7.4
1%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-8201

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync ...

CVSS3: 7.4
1%
Низкий
почти 5 лет назад
ubuntu логотип
CVE-2020-8252

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-8252

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2020-8252

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-8252

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14 ...

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
github логотип
GHSA-7mcp-gwc2-4c6m

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.

CVSS3: 7.4
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-05657

Уязвимость программной платформы Node.js, связанная с ошибкой обработки имен HTTP - заголовка, позволяющая нарушителю получить доступ к защищаемой информации или повысить свои привилегии

CVSS3: 7.4
1%
Низкий
почти 5 лет назад
github логотип
GHSA-c5r6-cm8r-wgh9

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

CVSS3: 7.8
0%
Низкий
около 3 лет назад

Уязвимостей на страницу