Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 025

Количество 1 025

ubuntu логотип

CVE-2019-9516

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2019-9516

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-9516

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-9516

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potential ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2018-5407

почти 7 лет назад

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2018-5407

около 7 лет назад

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2018-5407

почти 7 лет назад

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2018-5407

почти 7 лет назад

Simultaneous Multi-threading (SMT) in processors can enable local user ...

CVSS3: 4.7
EPSS: Низкий
ubuntu логотип

CVE-2016-9843

больше 8 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2016-9843

около 9 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2016-9843

больше 8 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2016-9843

больше 8 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-de ...

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-02655

больше 2 лет назад

Уязвимость программной платформы Node.js, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю повысить свои привилегии

CVSS3: 4.2
EPSS: Низкий
fstec логотип

BDU:2021-03700

больше 4 лет назад

Уязвимость функции uv__idna_toascii() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-89fc-749h-w2fj

больше 3 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-3p35-64mh-v96v

больше 3 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9513

около 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-9513

около 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-9513

около 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9513

около 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-9516

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
4%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-9516

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
4%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-9516

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
4%
Низкий
около 6 лет назад
debian логотип
CVE-2019-9516

Some HTTP/2 implementations are vulnerable to a header leak, potential ...

CVSS3: 6.5
4%
Низкий
около 6 лет назад
ubuntu логотип
CVE-2018-5407

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.7
0%
Низкий
почти 7 лет назад
redhat логотип
CVE-2018-5407

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.8
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-5407

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.7
0%
Низкий
почти 7 лет назад
debian логотип
CVE-2018-5407

Simultaneous Multi-threading (SMT) in processors can enable local user ...

CVSS3: 4.7
0%
Низкий
почти 7 лет назад
ubuntu логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
9%
Низкий
больше 8 лет назад
redhat логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
9%
Низкий
около 9 лет назад
nvd логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
9%
Низкий
больше 8 лет назад
debian логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-de ...

CVSS3: 9.8
9%
Низкий
больше 8 лет назад
fstec логотип
BDU:2023-02655

Уязвимость программной платформы Node.js, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю повысить свои привилегии

CVSS3: 4.2
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2021-03700

Уязвимость функции uv__idna_toascii() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации

CVSS3: 8.2
0%
Низкий
больше 4 лет назад
github логотип
GHSA-89fc-749h-w2fj

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
18%
Средний
больше 3 лет назад
github логотип
GHSA-3p35-64mh-v96v

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
7%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
7%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
7%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
7%
Низкий
около 6 лет назад
debian логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
7%
Низкий
около 6 лет назад

Уязвимостей на страницу