Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 064

Количество 1 064

suse-cvrf логотип

SUSE-SU-2020:3549-1

около 5 лет назад

Security update for nodejs12

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:3478-1

около 5 лет назад

Security update for c-ares

EPSS: Средний
rocky логотип

RLSA-2020:2755

больше 5 лет назад

Important: nghttp2 security update

EPSS: Низкий
github логотип

GHSA-m5pg-8h68-j225

почти 5 лет назад

Uncontrolled Resource Consumption in node

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-9mvv-4q4j-q2j8

больше 3 лет назад

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-3686-jjcf-4w27

больше 3 лет назад

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
EPSS: Средний
ubuntu логотип

CVE-2021-22939

больше 4 лет назад

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2021-22939

больше 4 лет назад

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2021-22939

больше 4 лет назад

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2021-22939

больше 4 лет назад

If the Node.js https API was used incorrectly and "undefined" was in p ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2020-8277

около 5 лет назад

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2020-8277

около 5 лет назад

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2020-8277

около 5 лет назад

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2020-8277

около 5 лет назад

A Node.js application that allows an attacker to trigger a DNS request ...

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2020-11080

больше 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2020-11080

больше 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2020-11080

больше 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2020-11080

больше 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...

CVSS3: 3.7
EPSS: Низкий
ubuntu логотип

CVE-2016-9842

больше 8 лет назад

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
EPSS: Средний
redhat логотип

CVE-2016-9842

больше 9 лет назад

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2020:3549-1

Security update for nodejs12

59%
Средний
около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3478-1

Security update for c-ares

59%
Средний
около 5 лет назад
rocky логотип
RLSA-2020:2755

Important: nghttp2 security update

1%
Низкий
больше 5 лет назад
github логотип
GHSA-m5pg-8h68-j225

Uncontrolled Resource Consumption in node

CVSS3: 7.5
59%
Средний
почти 5 лет назад
github логотип
GHSA-9mvv-4q4j-q2j8

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-3686-jjcf-4w27

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
14%
Средний
больше 3 лет назад
ubuntu логотип
CVE-2021-22939

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-22939

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 3.7
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-22939

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-22939

If the Node.js https API was used incorrectly and "undefined" was in p ...

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2020-8277

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
59%
Средний
около 5 лет назад
redhat логотип
CVE-2020-8277

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
59%
Средний
около 5 лет назад
nvd логотип
CVE-2020-8277

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

CVSS3: 7.5
59%
Средний
около 5 лет назад
debian логотип
CVE-2020-8277

A Node.js application that allows an attacker to trigger a DNS request ...

CVSS3: 7.5
59%
Средний
около 5 лет назад
ubuntu логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
1%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 7.5
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
1%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-11080

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...

CVSS3: 3.7
1%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2016-9842

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
14%
Средний
больше 8 лет назад
redhat логотип
CVE-2016-9842

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

CVSS3: 8.8
14%
Средний
больше 9 лет назад

Уязвимостей на страницу