Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 014

Количество 1 014

debian логотип

CVE-2018-5407

больше 6 лет назад

Simultaneous Multi-threading (SMT) in processors can enable local user ...

CVSS3: 4.7
EPSS: Низкий
ubuntu логотип

CVE-2016-9843

около 8 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2016-9843

почти 9 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2016-9843

около 8 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2016-9843

около 8 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-de ...

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2025-02664

6 месяцев назад

Уязвимость программной платформы Node.js, связанная с отсутствием освобождения памяти после эффективного срока службы, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-03312

больше 2 лет назад

Уязвимость криптографической библиотеки OpenSSL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю обойти проверку политик для сертификата

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-02655

больше 2 лет назад

Уязвимость программной платформы Node.js, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю повысить свои привилегии

CVSS3: 4.2
EPSS: Низкий
fstec логотип

BDU:2021-03700

около 4 лет назад

Уязвимость функции uv__idna_toascii() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-89fc-749h-w2fj

около 3 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-3p35-64mh-v96v

около 3 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 6.5
EPSS: Средний
nvd логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation ...

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2024-03125

больше 1 года назад

Уязвимость программной платформы Node.js, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
debian логотип
CVE-2018-5407

Simultaneous Multi-threading (SMT) in processors can enable local user ...

CVSS3: 4.7
1%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
5%
Низкий
около 8 лет назад
redhat логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
5%
Низкий
почти 9 лет назад
nvd логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
5%
Низкий
около 8 лет назад
debian логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-de ...

CVSS3: 9.8
5%
Низкий
около 8 лет назад
fstec логотип
BDU:2025-02664

Уязвимость программной платформы Node.js, связанная с отсутствием освобождения памяти после эффективного срока службы, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2023-03312

Уязвимость криптографической библиотеки OpenSSL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю обойти проверку политик для сертификата

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-02655

Уязвимость программной платформы Node.js, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю повысить свои привилегии

CVSS3: 4.2
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2021-03700

Уязвимость функции uv__idna_toascii() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации

CVSS3: 8.2
1%
Низкий
около 4 лет назад
github логотип
GHSA-89fc-749h-w2fj

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
15%
Средний
около 3 лет назад
github логотип
GHSA-3p35-64mh-v96v

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
5%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
5%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
5%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
5%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
5%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
15%
Средний
почти 6 лет назад
redhat логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 6.5
15%
Средний
почти 6 лет назад
nvd логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
15%
Средний
почти 6 лет назад
debian логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation ...

CVSS3: 7.5
15%
Средний
почти 6 лет назад
fstec логотип
BDU:2024-03125

Уязвимость программной платформы Node.js, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

CVSS3: 6.1
0%
Низкий
больше 1 года назад

Уязвимостей на страницу