Количество 46
Количество 46
ELSA-2020-5806
ELSA-2020-5806: GraalVM Security update (IMPORTANT)

CVE-2020-8172
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

CVE-2020-8172
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

CVE-2020-8172
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
CVE-2020-8172
TLS session reuse can lead to host certificate verification bypass in ...
GHSA-98vx-jqrx-7mq2
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

BDU:2020-03621
Уязвимость реализации протокола TLS программной платформы Node.js, позволяющая нарушителю реализовать атаку типа «человек посередине»

CVE-2020-7598
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.

CVE-2020-7598
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.

CVE-2020-7598
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
CVE-2020-7598
minimist before 1.2.2 could be tricked into adding or modifying proper ...

CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVE-2020-11080
CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...
GHSA-vh95-rmgr-6w4m
Prototype Pollution in minimist

BDU:2021-02868
Уязвимость библиотеки minimist прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю реализовать атаку типа «загрязнение прототипа»

openSUSE-SU-2021:0468-1
Security update for nghttp2

SUSE-SU-2021:0931-1
Security update for nghttp2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2020-5806 ELSA-2020-5806: GraalVM Security update (IMPORTANT) | почти 5 лет назад | |||
![]() | CVE-2020-8172 TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0. | CVSS3: 7.4 | 1% Низкий | около 5 лет назад |
![]() | CVE-2020-8172 TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0. | CVSS3: 7.4 | 1% Низкий | около 5 лет назад |
![]() | CVE-2020-8172 TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0. | CVSS3: 7.4 | 1% Низкий | около 5 лет назад |
CVE-2020-8172 TLS session reuse can lead to host certificate verification bypass in ... | CVSS3: 7.4 | 1% Низкий | около 5 лет назад | |
GHSA-98vx-jqrx-7mq2 TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0. | CVSS3: 7.4 | 1% Низкий | около 3 лет назад | |
![]() | BDU:2020-03621 Уязвимость реализации протокола TLS программной платформы Node.js, позволяющая нарушителю реализовать атаку типа «человек посередине» | CVSS3: 7.4 | 1% Низкий | больше 5 лет назад |
![]() | CVE-2020-7598 minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. | CVSS3: 5.6 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2020-7598 minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. | CVSS3: 5.6 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2020-7598 minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. | CVSS3: 5.6 | 0% Низкий | больше 5 лет назад |
CVE-2020-7598 minimist before 1.2.2 could be tricked into adding or modifying proper ... | CVSS3: 5.6 | 0% Низкий | больше 5 лет назад | |
![]() | CVE-2020-11080 In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection. | CVSS3: 3.7 | 1% Низкий | около 5 лет назад |
![]() | CVE-2020-11080 In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection. | CVSS3: 7.5 | 1% Низкий | около 5 лет назад |
![]() | CVE-2020-11080 In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection. | CVSS3: 3.7 | 1% Низкий | около 5 лет назад |
![]() | CVSS3: 7.5 | 1% Низкий | почти 5 лет назад | |
CVE-2020-11080 In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ... | CVSS3: 3.7 | 1% Низкий | около 5 лет назад | |
GHSA-vh95-rmgr-6w4m Prototype Pollution in minimist | CVSS3: 5.6 | 0% Низкий | около 5 лет назад | |
![]() | BDU:2021-02868 Уязвимость библиотеки minimist прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю реализовать атаку типа «загрязнение прототипа» | CVSS3: 5.6 | 0% Низкий | около 4 лет назад |
![]() | openSUSE-SU-2021:0468-1 Security update for nghttp2 | 1% Низкий | около 4 лет назад | |
![]() | SUSE-SU-2021:0931-1 Security update for nghttp2 | 1% Низкий | около 4 лет назад |
Уязвимостей на страницу