Количество 52
Количество 52
CVE-2021-22931
Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Co ...
GHSA-7r9p-c88x-w357
Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.
BDU:2022-01892
Уязвимость библиотеки dns программной платформы Node.js, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
CVE-2021-23343
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
CVE-2021-23343
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
CVE-2021-3672
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
CVE-2021-3672
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
CVE-2021-3672
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
CVE-2021-3672
CVE-2021-3672
A flaw was found in c-ares library, where a missing input validation c ...
GHSA-hj48-42vr-x3v9
Regular Expression Denial of Service in path-parse
openSUSE-SU-2021:2760-1
Security update for c-ares
openSUSE-SU-2021:1168-1
Security update for c-ares
SUSE-SU-2021:2760-1
Security update for c-ares
SUSE-SU-2021:2690-1
Security update for libcares2
SUSE-SU-2021:14776-1
Security update for libcares2
RLSA-2022:2043
Moderate: c-ares security update
GHSA-hghm-3vc3-hppj
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
ELSA-2022-2043
ELSA-2022-2043: c-ares security update (MODERATE)
BDU:2022-00342
Уязвимость библиотеки СИ для асинхронных запросов DNS c-ares, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-22931 Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Co ... | CVSS3: 9.8 | 1% Низкий | около 4 лет назад | |
GHSA-7r9p-c88x-w357 Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library. | CVSS3: 9.8 | 1% Низкий | больше 3 лет назад | |
BDU:2022-01892 Уязвимость библиотеки dns программной платформы Node.js, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 9.8 | 1% Низкий | около 4 лет назад | |
CVE-2021-23343 All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity. | CVSS3: 5.3 | 1% Низкий | больше 4 лет назад | |
CVE-2021-23343 All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity. | CVSS3: 5.3 | 1% Низкий | больше 4 лет назад | |
CVE-2021-3672 A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | CVSS3: 5.6 | 0% Низкий | почти 4 года назад | |
CVE-2021-3672 A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | CVSS3: 5.6 | 0% Низкий | около 4 лет назад | |
CVE-2021-3672 A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | CVSS3: 5.6 | 0% Низкий | почти 4 года назад | |
CVSS3: 5.6 | 0% Низкий | 8 месяцев назад | ||
CVE-2021-3672 A flaw was found in c-ares library, where a missing input validation c ... | CVSS3: 5.6 | 0% Низкий | почти 4 года назад | |
GHSA-hj48-42vr-x3v9 Regular Expression Denial of Service in path-parse | CVSS3: 5.3 | 1% Низкий | около 4 лет назад | |
openSUSE-SU-2021:2760-1 Security update for c-ares | 0% Низкий | около 4 лет назад | ||
openSUSE-SU-2021:1168-1 Security update for c-ares | 0% Низкий | около 4 лет назад | ||
SUSE-SU-2021:2760-1 Security update for c-ares | 0% Низкий | около 4 лет назад | ||
SUSE-SU-2021:2690-1 Security update for libcares2 | 0% Низкий | около 4 лет назад | ||
SUSE-SU-2021:14776-1 Security update for libcares2 | 0% Низкий | около 4 лет назад | ||
RLSA-2022:2043 Moderate: c-ares security update | 0% Низкий | больше 3 лет назад | ||
GHSA-hghm-3vc3-hppj A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад | |
ELSA-2022-2043 ELSA-2022-2043: c-ares security update (MODERATE) | больше 3 лет назад | |||
BDU:2022-00342 Уязвимость библиотеки СИ для асинхронных запросов DNS c-ares, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 5.6 | 0% Низкий | около 4 лет назад |
Уязвимостей на страницу