Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 009

Количество 1 009

github логотип

GHSA-39qc-96h7-956f

около 3 лет назад

golang.org/x/net/http vulnerable to a reset flood

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potential ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-4fhm-44hf-3465

около 3 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2018-0735

больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-0735

больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.1
EPSS: Низкий
nvd логотип

CVE-2018-0735

больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-0735

больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable ...

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2023-03652

около 2 лет назад

Уязвимость библиотеки OpenSSL, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Критический
fstec логотип

BDU:2022-04683

больше 3 лет назад

Уязвимость приложения для проверки и тестирования JSON-файлов JSON Schema, связанная с недостаточным контролем модификации динамически определённых характеристик объекта, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2019-01911

почти 9 лет назад

Уязвимость в файле t1_lib.c библиотеки OpenSSL, позволяющие нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-8hfj-xrj2-pm22

почти 4 года назад

Certificate check bypass in openssl-src

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-5f8r-846v-423w

около 3 лет назад

inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.

CVSS3: 9.8
EPSS: Средний
ubuntu логотип

CVE-2021-3450

около 4 лет назад

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verif...

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2021-3450

около 4 лет назад

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verif...

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2021-3450

около 4 лет назад

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verifica

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2021-3450

около 4 лет назад

The X509_V_FLAG_X509_STRICT flag enables additional security checks of ...

CVSS3: 7.4
EPSS: Низкий
ubuntu логотип

CVE-2016-9841

около 8 лет назад

inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-39qc-96h7-956f

golang.org/x/net/http vulnerable to a reset flood

CVSS3: 7.5
9%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potential ...

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
github логотип
GHSA-4fhm-44hf-3465

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
8%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
8%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.1
8%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
8%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable ...

CVSS3: 5.9
8%
Низкий
больше 6 лет назад
fstec логотип
BDU:2023-03652

Уязвимость библиотеки OpenSSL, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
92%
Критический
около 2 лет назад
fstec логотип
BDU:2022-04683

Уязвимость приложения для проверки и тестирования JSON-файлов JSON Schema, связанная с недостаточным контролем модификации динамически определённых характеристик объекта, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-01911

Уязвимость в файле t1_lib.c библиотеки OpenSSL, позволяющие нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
20%
Средний
почти 9 лет назад
github логотип
GHSA-8hfj-xrj2-pm22

Certificate check bypass in openssl-src

CVSS3: 7.4
0%
Низкий
почти 4 года назад
github логотип
GHSA-5f8r-846v-423w

inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.

CVSS3: 9.8
19%
Средний
около 3 лет назад
ubuntu логотип
CVE-2021-3450

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verif...

CVSS3: 7.4
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-3450

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verif...

CVSS3: 7.4
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-3450

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verifica

CVSS3: 7.4
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-3450

The X509_V_FLAG_X509_STRICT flag enables additional security checks of ...

CVSS3: 7.4
0%
Низкий
около 4 лет назад
ubuntu логотип
CVE-2016-9841

inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.

CVSS3: 9.8
19%
Средний
около 8 лет назад

Уязвимостей на страницу