Количество 52
Количество 52
CVE-2021-22931
Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Co ...
GHSA-7r9p-c88x-w357
Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.

BDU:2022-01892
Уязвимость библиотеки dns программной платформы Node.js, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVE-2021-23343
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.

CVE-2021-23343
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.

CVE-2021-3672
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.

CVE-2021-3672
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.

CVE-2021-3672
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.

CVE-2021-3672
CVE-2021-3672
A flaw was found in c-ares library, where a missing input validation c ...
GHSA-hj48-42vr-x3v9
Regular Expression Denial of Service in path-parse

openSUSE-SU-2021:2760-1
Security update for c-ares

openSUSE-SU-2021:1168-1
Security update for c-ares

SUSE-SU-2021:2760-1
Security update for c-ares

SUSE-SU-2021:2690-1
Security update for libcares2

SUSE-SU-2021:14776-1
Security update for libcares2

RLSA-2022:2043
Moderate: c-ares security update
GHSA-hghm-3vc3-hppj
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
ELSA-2022-2043
ELSA-2022-2043: c-ares security update (MODERATE)

BDU:2022-00342
Уязвимость библиотеки СИ для асинхронных запросов DNS c-ares, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
CVE-2021-22931 Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Co ... | CVSS3: 9.8 | 1% Низкий | почти 4 года назад | |
GHSA-7r9p-c88x-w357 Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library. | CVSS3: 9.8 | 1% Низкий | около 3 лет назад | |
![]() | BDU:2022-01892 Уязвимость библиотеки dns программной платформы Node.js, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 9.8 | 1% Низкий | почти 4 года назад |
![]() | CVE-2021-23343 All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity. | CVSS3: 5.3 | 1% Низкий | около 4 лет назад |
![]() | CVE-2021-23343 All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity. | CVSS3: 5.3 | 1% Низкий | около 4 лет назад |
![]() | CVE-2021-3672 A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-3672 A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | CVSS3: 5.6 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-3672 A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 5.6 | 0% Низкий | 4 месяца назад | |
CVE-2021-3672 A flaw was found in c-ares library, where a missing input validation c ... | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад | |
GHSA-hj48-42vr-x3v9 Regular Expression Denial of Service in path-parse | CVSS3: 5.3 | 1% Низкий | почти 4 года назад | |
![]() | openSUSE-SU-2021:2760-1 Security update for c-ares | 0% Низкий | почти 4 года назад | |
![]() | openSUSE-SU-2021:1168-1 Security update for c-ares | 0% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:2760-1 Security update for c-ares | 0% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:2690-1 Security update for libcares2 | 0% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:14776-1 Security update for libcares2 | 0% Низкий | почти 4 года назад | |
![]() | RLSA-2022:2043 Moderate: c-ares security update | 0% Низкий | около 3 лет назад | |
GHSA-hghm-3vc3-hppj A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | CVSS3: 5.6 | 0% Низкий | около 3 лет назад | |
ELSA-2022-2043 ELSA-2022-2043: c-ares security update (MODERATE) | около 3 лет назад | |||
![]() | BDU:2022-00342 Уязвимость библиотеки СИ для асинхронных запросов DNS c-ares, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 5.6 | 0% Низкий | почти 4 года назад |
Уязвимостей на страницу