Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 025

Количество 1 025

fstec логотип

BDU:2022-00760

около 4 лет назад

Уязвимость реализации функции console.table() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или обойти ограничения безопасности

CVSS3: 3.7
EPSS: Низкий
fstec логотип

BDU:2021-01025

почти 5 лет назад

Уязвимость программной платформы Node.js, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

CVSS3: 6.5
EPSS: Средний
github логотип

GHSA-93p3-5r25-4p75

больше 3 лет назад

Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9518

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-9518

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-9518

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9518

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a flood of empty frames, ...

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-03339

10 месяцев назад

Уязвимость утилиты diagnostics_channel программной платформы Node.js, позволяющая нарушителю обойти внедренные ограничения безопасности

CVSS3: 7.7
EPSS: Низкий
fstec логотип

BDU:2023-01627

больше 2 лет назад

Уязвимость функции process.mainModule.require() программной платформы Node.js, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2020-04460

больше 5 лет назад

Уязвимость функций napi_get_value_string_latin1(), napi_get_value_string_utf8(), napi_get_value_string_utf16() программной платформы Node.js, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0389-1

больше 4 лет назад

Security update for nodejs8

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0686-1

больше 4 лет назад

Security update for nodejs8

EPSS: Низкий
github логотип

GHSA-q27x-567x-5347

больше 3 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-6gw7-c226-vg73

больше 3 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-3rjg-j575-7f6p

больше 3 лет назад

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-2w6h-7cgj-qw4q

больше 3 лет назад

Node.js bad

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2021-22884

больше 4 лет назад

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2021-22884

больше 4 лет назад

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2021-22884

больше 4 лет назад

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-22884

больше 4 лет назад

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to ...

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2022-00760

Уязвимость реализации функции console.table() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или обойти ограничения безопасности

CVSS3: 3.7
0%
Низкий
около 4 лет назад
fstec логотип
BDU:2021-01025

Уязвимость программной платформы Node.js, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

CVSS3: 6.5
11%
Средний
почти 5 лет назад
github логотип
GHSA-93p3-5r25-4p75

Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVSS3: 7.5
2%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2019-9518

Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVSS3: 7.5
2%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-9518

Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVSS3: 7.5
2%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-9518

Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVSS3: 7.5
2%
Низкий
около 6 лет назад
debian логотип
CVE-2019-9518

Some HTTP/2 implementations are vulnerable to a flood of empty frames, ...

CVSS3: 7.5
2%
Низкий
около 6 лет назад
fstec логотип
BDU:2025-03339

Уязвимость утилиты diagnostics_channel программной платформы Node.js, позволяющая нарушителю обойти внедренные ограничения безопасности

CVSS3: 7.7
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2023-01627

Уязвимость функции process.mainModule.require() программной платформы Node.js, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2020-04460

Уязвимость функций napi_get_value_string_latin1(), napi_get_value_string_utf8(), napi_get_value_string_utf16() программной платформы Node.js, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
1%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0389-1

Security update for nodejs8

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0686-1

Security update for nodejs8

0%
Низкий
больше 4 лет назад
github логотип
GHSA-q27x-567x-5347

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
9%
Низкий
больше 3 лет назад
github логотип
GHSA-6gw7-c226-vg73

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
4%
Низкий
больше 3 лет назад
github логотип
GHSA-3rjg-j575-7f6p

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.7
0%
Низкий
больше 3 лет назад
github логотип
CVSS3: 7.5
0%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2021-22884

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-22884

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-22884

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-22884

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to ...

CVSS3: 7.5
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу