Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 025

Количество 1 025

github логотип

GHSA-rh28-x46h-8pcg

больше 3 лет назад

Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-rc2m-q589-vpqx

почти 3 года назад

The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-q5vx-44v4-gch4

больше 3 лет назад

llhttp allows HTTP Request Smuggling via Improper Delimiting of Header Fields

CVSS3: 9.1
EPSS: Средний
github логотип

GHSA-m5h6-hr3q-22h5

больше 7 лет назад

npm Token Leak in npm

EPSS: Низкий
github логотип

GHSA-hgr8-6h9x-f7q9

больше 3 лет назад

golang.org/x/net/http vulnerable to ping floods

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-h225-x2r7-r2m9

больше 3 лет назад

Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.

EPSS: Средний
github логотип

GHSA-gqhp-5j32-xwmm

около 4 лет назад

Use After Free in node.js

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-f33f-hhx9-6j4m

больше 3 лет назад

Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.

CVSS3: 6.5
EPSS: Средний
github логотип

GHSA-cpgp-qq89-2x6x

больше 3 лет назад

The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.

EPSS: Низкий
github логотип

GHSA-8rwr-x37p-mx23

около 3 лет назад

X.509 Email Address 4-byte Buffer Overflow

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-879w-9vpf-9pw9

больше 3 лет назад

Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-7wg6-6952-3vfv

больше 3 лет назад

The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-4368-3x2v-g4cm

больше 3 лет назад

Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."

EPSS: Низкий
github логотип

GHSA-3qv8-368w-r69p

больше 3 лет назад

Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-3gm7-8cfv-p8h9

больше 3 лет назад

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.

CVSS3: 5.9
EPSS: Высокий
ubuntu логотип

CVE-2022-3602

около 3 лет назад

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to...

CVSS3: 7.5
EPSS: Высокий
redhat логотип

CVE-2022-3602

около 3 лет назад

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to...

CVSS3: 7.5
EPSS: Высокий
nvd логотип

CVE-2022-3602

около 3 лет назад

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to up

CVSS3: 7.5
EPSS: Высокий
debian логотип

CVE-2022-3602

около 3 лет назад

A buffer overrun can be triggered in X.509 certificate verification, s ...

CVSS3: 7.5
EPSS: Высокий
ubuntu логотип

CVE-2022-35256

почти 3 года назад

The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-rh28-x46h-8pcg

Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.

CVSS3: 7.5
51%
Средний
больше 3 лет назад
github логотип
GHSA-rc2m-q589-vpqx

The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.

CVSS3: 9.8
5%
Низкий
почти 3 года назад
github логотип
GHSA-q5vx-44v4-gch4

llhttp allows HTTP Request Smuggling via Improper Delimiting of Header Fields

CVSS3: 9.1
62%
Средний
больше 3 лет назад
github логотип
GHSA-m5h6-hr3q-22h5

npm Token Leak in npm

2%
Низкий
больше 7 лет назад
github логотип
GHSA-hgr8-6h9x-f7q9

golang.org/x/net/http vulnerable to ping floods

CVSS3: 7.5
52%
Средний
больше 3 лет назад
github логотип
GHSA-h225-x2r7-r2m9

Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.

13%
Средний
больше 3 лет назад
github логотип
GHSA-gqhp-5j32-xwmm

Use After Free in node.js

CVSS3: 9.8
0%
Низкий
около 4 лет назад
github логотип
GHSA-f33f-hhx9-6j4m

Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.

CVSS3: 6.5
11%
Средний
больше 3 лет назад
github логотип
GHSA-cpgp-qq89-2x6x

The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-8rwr-x37p-mx23

X.509 Email Address 4-byte Buffer Overflow

CVSS3: 9.8
86%
Высокий
около 3 лет назад
github логотип
GHSA-879w-9vpf-9pw9

Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.

CVSS3: 8.1
1%
Низкий
больше 3 лет назад
github логотип
GHSA-7wg6-6952-3vfv

The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.

CVSS3: 8.8
5%
Низкий
больше 3 лет назад
github логотип
GHSA-4368-3x2v-g4cm

Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."

2%
Низкий
больше 3 лет назад
github логотип
GHSA-3qv8-368w-r69p

Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons

CVSS3: 9.8
2%
Низкий
больше 3 лет назад
github логотип
GHSA-3gm7-8cfv-p8h9

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.

CVSS3: 5.9
77%
Высокий
больше 3 лет назад
ubuntu логотип
CVE-2022-3602

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to...

CVSS3: 7.5
86%
Высокий
около 3 лет назад
redhat логотип
CVE-2022-3602

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to...

CVSS3: 7.5
86%
Высокий
около 3 лет назад
nvd логотип
CVE-2022-3602

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to up

CVSS3: 7.5
86%
Высокий
около 3 лет назад
debian логотип
CVE-2022-3602

A buffer overrun can be triggered in X.509 certificate verification, s ...

CVSS3: 7.5
86%
Высокий
около 3 лет назад
ubuntu логотип
CVE-2022-35256

The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.

CVSS3: 6.5
5%
Низкий
почти 3 года назад

Уязвимостей на страницу