Количество 1 025
Количество 1 025
CVE-2021-22883
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
CVE-2021-22883
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to ...
CVE-2016-9840
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
CVE-2016-9840
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
CVE-2016-9840
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
CVE-2016-9840
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to ha ...
CVE-2016-2183
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
CVE-2016-2183
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
CVE-2016-2183
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
CVE-2016-2183
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec pro ...
BDU:2023-07356
Уязвимость клиента HTTP/1.1 undici программной платформы Node.js, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-02171
Уязвимость компонента API https программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-00759
Уязвимость реализации способа указания всех доменных имен и IP-адресов Subject Alternative Names программной платформы Node.js, позволяющая нарушителю проводить спуфинг-атаки
BDU:2022-00758
Уязвимость реализации способа указания всех доменных имен и IP-адресов Subject Alternative Names программной платформы Node.js, позволяющая нарушителю проводить спуфинг-атаки
BDU:2021-00883
Уязвимость реализации метода DoWrite программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
openSUSE-SU-2022:0856-1
Security update for openssl-1_0_0
SUSE-SU-2022:14916-1
Security update for openssl1
SUSE-SU-2022:14915-1
Security update for openssl
SUSE-SU-2022:0935-1
Security update for nodejs12
SUSE-SU-2022:0860-1
Security update for openssl-1_1
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-22883 Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory. | CVSS3: 7.5 | 91% Критический | больше 4 лет назад | |
CVE-2021-22883 Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to ... | CVSS3: 7.5 | 91% Критический | больше 4 лет назад | |
CVE-2016-9840 inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. | CVSS3: 8.8 | 13% Средний | больше 8 лет назад | |
CVE-2016-9840 inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. | CVSS3: 8.8 | 13% Средний | около 9 лет назад | |
CVE-2016-9840 inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. | CVSS3: 8.8 | 13% Средний | больше 8 лет назад | |
CVE-2016-9840 inftrees.c in zlib 1.2.8 might allow context-dependent attackers to ha ... | CVSS3: 8.8 | 13% Средний | больше 8 лет назад | |
CVE-2016-2183 The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. | CVSS3: 7.5 | 38% Средний | около 9 лет назад | |
CVE-2016-2183 The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. | CVSS3: 7.5 | 38% Средний | около 9 лет назад | |
CVE-2016-2183 The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. | CVSS3: 7.5 | 38% Средний | около 9 лет назад | |
CVE-2016-2183 The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec pro ... | CVSS3: 7.5 | 38% Средний | около 9 лет назад | |
BDU:2023-07356 Уязвимость клиента HTTP/1.1 undici программной платформы Node.js, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 3.5 | 0% Низкий | около 2 лет назад | |
BDU:2022-02171 Уязвимость компонента API https программной платформы Node.js, позволяющая нарушителю оказать воздействие на целостность данных | CVSS3: 5.3 | 0% Низкий | около 4 лет назад | |
BDU:2022-00759 Уязвимость реализации способа указания всех доменных имен и IP-адресов Subject Alternative Names программной платформы Node.js, позволяющая нарушителю проводить спуфинг-атаки | CVSS3: 7.4 | почти 4 года назад | ||
BDU:2022-00758 Уязвимость реализации способа указания всех доменных имен и IP-адресов Subject Alternative Names программной платформы Node.js, позволяющая нарушителю проводить спуфинг-атаки | CVSS3: 7.4 | 0% Низкий | почти 4 года назад | |
BDU:2021-00883 Уязвимость реализации метода DoWrite программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие | CVSS3: 8.1 | 1% Низкий | почти 5 лет назад | |
openSUSE-SU-2022:0856-1 Security update for openssl-1_0_0 | 8% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:14916-1 Security update for openssl1 | 8% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:14915-1 Security update for openssl | 8% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:0935-1 Security update for nodejs12 | 8% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:0860-1 Security update for openssl-1_1 | 8% Низкий | больше 3 лет назад |
Уязвимостей на страницу