Логотип exploitDog
bind:"CVE-2020-8174" OR bind:"CVE-2020-8172" OR bind:"CVE-2020-11080" OR bind:"CVE-2020-7598"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-8174" OR bind:"CVE-2020-8172" OR bind:"CVE-2020-11080" OR bind:"CVE-2020-7598"

Количество 46

Количество 46

oracle-oval логотип

ELSA-2020-5806

почти 5 лет назад

ELSA-2020-5806: GraalVM Security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2020-8172

около 5 лет назад

TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2020-8172

около 5 лет назад

TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2020-8172

около 5 лет назад

TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2020-8172

около 5 лет назад

TLS session reuse can lead to host certificate verification bypass in ...

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-98vx-jqrx-7mq2

около 3 лет назад

TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

CVSS3: 7.4
EPSS: Низкий
fstec логотип

BDU:2020-03621

больше 5 лет назад

Уязвимость реализации протокола TLS программной платформы Node.js, позволяющая нарушителю реализовать атаку типа «человек посередине»

CVSS3: 7.4
EPSS: Низкий
ubuntu логотип

CVE-2020-7598

больше 5 лет назад

minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.

CVSS3: 5.6
EPSS: Низкий
redhat логотип

CVE-2020-7598

больше 5 лет назад

minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.

CVSS3: 5.6
EPSS: Низкий
nvd логотип

CVE-2020-7598

больше 5 лет назад

minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.

CVSS3: 5.6
EPSS: Низкий
debian логотип

CVE-2020-7598

больше 5 лет назад

minimist before 1.2.2 could be tricked into adding or modifying proper ...

CVSS3: 5.6
EPSS: Низкий
ubuntu логотип

CVE-2020-11080

около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2020-11080

около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2020-11080

около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
EPSS: Низкий
msrc логотип

CVE-2020-11080

почти 5 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2020-11080

около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-vh95-rmgr-6w4m

около 5 лет назад

Prototype Pollution in minimist

CVSS3: 5.6
EPSS: Низкий
fstec логотип

BDU:2021-02868

около 4 лет назад

Уязвимость библиотеки minimist прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю реализовать атаку типа «загрязнение прототипа»

CVSS3: 5.6
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0468-1

около 4 лет назад

Security update for nghttp2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0931-1

около 4 лет назад

Security update for nghttp2

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2020-5806

ELSA-2020-5806: GraalVM Security update (IMPORTANT)

почти 5 лет назад
ubuntu логотип
CVE-2020-8172

TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

CVSS3: 7.4
1%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-8172

TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

CVSS3: 7.4
1%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-8172

TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

CVSS3: 7.4
1%
Низкий
около 5 лет назад
debian логотип
CVE-2020-8172

TLS session reuse can lead to host certificate verification bypass in ...

CVSS3: 7.4
1%
Низкий
около 5 лет назад
github логотип
GHSA-98vx-jqrx-7mq2

TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

CVSS3: 7.4
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-03621

Уязвимость реализации протокола TLS программной платформы Node.js, позволяющая нарушителю реализовать атаку типа «человек посередине»

CVSS3: 7.4
1%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2020-7598

minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.

CVSS3: 5.6
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-7598

minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.

CVSS3: 5.6
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-7598

minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.

CVSS3: 5.6
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-7598

minimist before 1.2.2 could be tricked into adding or modifying proper ...

CVSS3: 5.6
0%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
1%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 7.5
1%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
1%
Низкий
около 5 лет назад
msrc логотип
CVSS3: 7.5
1%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...

CVSS3: 3.7
1%
Низкий
около 5 лет назад
github логотип
GHSA-vh95-rmgr-6w4m

Prototype Pollution in minimist

CVSS3: 5.6
0%
Низкий
около 5 лет назад
fstec логотип
BDU:2021-02868

Уязвимость библиотеки minimist прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю реализовать атаку типа «загрязнение прототипа»

CVSS3: 5.6
0%
Низкий
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0468-1

Security update for nghttp2

1%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0931-1

Security update for nghttp2

1%
Низкий
около 4 лет назад

Уязвимостей на страницу