Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 065

Количество 1 065

ubuntu логотип

CVE-2018-5407

около 7 лет назад

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2018-5407

больше 7 лет назад

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2018-5407

около 7 лет назад

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2018-5407

около 7 лет назад

Simultaneous Multi-threading (SMT) in processors can enable local user ...

CVSS3: 4.7
EPSS: Низкий
ubuntu логотип

CVE-2016-9843

больше 8 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2016-9843

больше 9 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2016-9843

больше 8 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2016-9843

больше 8 лет назад

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-de ...

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-02655

почти 3 года назад

Уязвимость программной платформы Node.js, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю повысить свои привилегии

CVSS3: 4.2
EPSS: Низкий
fstec логотип

BDU:2021-03700

больше 4 лет назад

Уязвимость функции uv__idna_toascii() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации

CVSS3: 8.2
EPSS: Низкий
fstec логотип

BDU:2020-04460

больше 5 лет назад

Уязвимость функций napi_get_value_string_latin1(), napi_get_value_string_utf8(), napi_get_value_string_utf16() программной платформы Node.js, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-89fc-749h-w2fj

больше 3 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-3p35-64mh-v96v

больше 3 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9513

больше 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-9513

больше 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-9513

больше 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9513

больше 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9511

больше 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2019-9511

больше 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 6.5
EPSS: Средний
nvd логотип

CVE-2019-9511

больше 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-5407

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.7
1%
Низкий
около 7 лет назад
redhat логотип
CVE-2018-5407

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.8
1%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-5407

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

CVSS3: 4.7
1%
Низкий
около 7 лет назад
debian логотип
CVE-2018-5407

Simultaneous Multi-threading (SMT) in processors can enable local user ...

CVSS3: 4.7
1%
Низкий
около 7 лет назад
ubuntu логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
8%
Низкий
больше 8 лет назад
redhat логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
8%
Низкий
больше 9 лет назад
nvd логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

CVSS3: 9.8
8%
Низкий
больше 8 лет назад
debian логотип
CVE-2016-9843

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-de ...

CVSS3: 9.8
8%
Низкий
больше 8 лет назад
fstec логотип
BDU:2023-02655

Уязвимость программной платформы Node.js, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю повысить свои привилегии

CVSS3: 4.2
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2021-03700

Уязвимость функции uv__idna_toascii() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации

CVSS3: 8.2
1%
Низкий
больше 4 лет назад
fstec логотип
BDU:2020-04460

Уязвимость функций napi_get_value_string_latin1(), napi_get_value_string_utf8(), napi_get_value_string_utf16() программной платформы Node.js, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
2%
Низкий
больше 5 лет назад
github логотип
GHSA-89fc-749h-w2fj

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
15%
Средний
больше 3 лет назад
github логотип
GHSA-3p35-64mh-v96v

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
7%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
7%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
7%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
7%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
7%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
15%
Средний
больше 6 лет назад
redhat логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 6.5
15%
Средний
больше 6 лет назад
nvd логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
15%
Средний
больше 6 лет назад

Уязвимостей на страницу