Количество 1 009
Количество 1 009

openSUSE-SU-2016:3006-1
Security update for nodejs4

openSUSE-SU-2016:2752-1
Security update for nodejs

SUSE-SU-2018:2956-1
Security update for openssl-1_1

SUSE-SU-2018:2207-1
Security update for openssl

SUSE-SU-2018:2041-1
Security update for openssl-1_1

SUSE-SU-2018:2036-1
Security update for openssl-1_1

SUSE-SU-2018:1968-1
Security update for openssl

SUSE-SU-2018:1887-2
Security update for openssl

SUSE-SU-2018:1887-1
Security update for openssl

SUSE-SU-2017:1792-1
Security update for libcares2

SUSE-SU-2016:3287-1
Security update for libcares2

SUSE-SU-2016:3286-1
Security update for libcares2

SUSE-SU-2016:2898-1
Security update for nodejs4

RLSA-2021:3075
Low: libuv security update
GHSA-xwg4-93c6-3h42
Directory Traversal in send
GHSA-x3cj-3539-rcpx
Out-of-Bounds Read in Node.js
GHSA-wff4-fpwg-qqv3
Unexpected server crash in Next.js
GHSA-w95h-2gj2-x2p4
A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.
GHSA-w6xc-jcff-g3vg
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
GHSA-vjr3-54h8-whpv
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | openSUSE-SU-2016:3006-1 Security update for nodejs4 | 22% Средний | больше 8 лет назад | |
![]() | openSUSE-SU-2016:2752-1 Security update for nodejs | 22% Средний | больше 8 лет назад | |
![]() | SUSE-SU-2018:2956-1 Security update for openssl-1_1 | 81% Высокий | больше 6 лет назад | |
![]() | SUSE-SU-2018:2207-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:2041-1 Security update for openssl-1_1 | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:2036-1 Security update for openssl-1_1 | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:1968-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:1887-2 Security update for openssl | 81% Высокий | больше 6 лет назад | |
![]() | SUSE-SU-2018:1887-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2017:1792-1 Security update for libcares2 | 1% Низкий | почти 8 лет назад | |
![]() | SUSE-SU-2016:3287-1 Security update for libcares2 | 22% Средний | больше 8 лет назад | |
![]() | SUSE-SU-2016:3286-1 Security update for libcares2 | 22% Средний | больше 8 лет назад | |
![]() | SUSE-SU-2016:2898-1 Security update for nodejs4 | 22% Средний | больше 8 лет назад | |
![]() | RLSA-2021:3075 Low: libuv security update | 1% Низкий | почти 4 года назад | |
GHSA-xwg4-93c6-3h42 Directory Traversal in send | 5% Низкий | больше 7 лет назад | ||
GHSA-x3cj-3539-rcpx Out-of-Bounds Read in Node.js | CVSS3: 8.2 | 1% Низкий | почти 4 года назад | |
GHSA-wff4-fpwg-qqv3 Unexpected server crash in Next.js | CVSS3: 5.3 | 0% Низкий | почти 3 года назад | |
GHSA-w95h-2gj2-x2p4 A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks. | CVSS3: 8.1 | 0% Низкий | почти 3 года назад | |
GHSA-w6xc-jcff-g3vg Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors. | CVSS3: 9.8 | 32% Средний | около 3 лет назад | |
GHSA-vjr3-54h8-whpv The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way. | CVSS3: 7.5 | 1% Низкий | около 3 лет назад |
Уязвимостей на страницу