Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 014

Количество 1 014

github логотип

GHSA-3686-jjcf-4w27

больше 3 лет назад

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
EPSS: Низкий
ubuntu логотип

CVE-2021-22939

почти 4 года назад

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2021-22939

около 4 лет назад

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2021-22939

почти 4 года назад

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2021-22939

почти 4 года назад

If the Node.js https API was used incorrectly and "undefined" was in p ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2020-8277

больше 4 лет назад

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2020-8277

почти 5 лет назад

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2020-8277

больше 4 лет назад

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2020-8277

больше 4 лет назад

A Node.js application that allows an attacker to trigger a DNS request ...

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2020-11080

около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2020-11080

около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2020-11080

около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2020-11080

около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...

CVSS3: 3.7
EPSS: Низкий
ubuntu логотип

CVE-2016-9842

около 8 лет назад

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2016-9842

почти 9 лет назад

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2016-9842

около 8 лет назад

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2016-9842

около 8 лет назад

The inflateMark function in inflate.c in zlib 1.2.8 might allow contex ...

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-04930

около 2 лет назад

Уязвимость функции generateKeys() программной платформы Node.js, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2022-00751

больше 3 лет назад

Уязвимость компонента Relative Distinguished Name (RDN) программной платформы Node.js, позволяющая нарушителю проводить спуфинг-атаки

CVSS3: 7.4
EPSS: Низкий
fstec логотип

BDU:2022-00330

больше 5 лет назад

Уязвимость программной платформы Node.js, связанная с непоследовательной интерпретацией http-запросов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-3686-jjcf-4w27

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
6%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2021-22939

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-22939

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 3.7
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-22939

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
debian логотип
CVE-2021-22939

If the Node.js https API was used incorrectly and "undefined" was in p ...

CVSS3: 5.3
0%
Низкий
почти 4 года назад
ubuntu логотип
CVE-2020-8277

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
63%
Средний
больше 4 лет назад
redhat логотип
CVE-2020-8277

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
63%
Средний
почти 5 лет назад
nvd логотип
CVE-2020-8277

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
63%
Средний
больше 4 лет назад
debian логотип
CVE-2020-8277

A Node.js application that allows an attacker to trigger a DNS request ...

CVSS3: 7.5
63%
Средний
больше 4 лет назад
ubuntu логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
1%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 7.5
1%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
1%
Низкий
около 5 лет назад
debian логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...

CVSS3: 3.7
1%
Низкий
около 5 лет назад
ubuntu логотип
CVE-2016-9842

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
6%
Низкий
около 8 лет назад
redhat логотип
CVE-2016-9842

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
6%
Низкий
почти 9 лет назад
nvd логотип
CVE-2016-9842

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
6%
Низкий
около 8 лет назад
debian логотип
CVE-2016-9842

The inflateMark function in inflate.c in zlib 1.2.8 might allow contex ...

CVSS3: 8.8
6%
Низкий
около 8 лет назад
fstec логотип
BDU:2023-04930

Уязвимость функции generateKeys() программной платформы Node.js, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 5.3
1%
Низкий
около 2 лет назад
fstec логотип
BDU:2022-00751

Уязвимость компонента Relative Distinguished Name (RDN) программной платформы Node.js, позволяющая нарушителю проводить спуфинг-атаки

CVSS3: 7.4
больше 3 лет назад
fstec логотип
BDU:2022-00330

Уязвимость программной платформы Node.js, связанная с непоследовательной интерпретацией http-запросов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 9.8
32%
Средний
больше 5 лет назад

Уязвимостей на страницу