Show filters
331 Total Results
Displaying 151-160 of 331
Sort by:
Attacker Value
Unknown

CVE-2020-8277

Disclosure Date: November 19, 2020 (last updated February 22, 2025)
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
Attacker Value
Unknown

CVE-2020-7769

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails.
Attacker Value
Unknown

CVE-2020-7740

Disclosure Date: October 06, 2020 (last updated February 22, 2025)
This affects all versions of package node-pdf-generator. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack.
0
Attacker Value
Unknown

CVE-2020-8251

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
Node.js < 14.11.0 is vulnerable to HTTP denial of service (DoS) attacks based on delayed requests submission which can make the server unable to accept new connections.
Attacker Value
Unknown

CVE-2020-8252

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
Attacker Value
Unknown

CVE-2020-8201

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.
Attacker Value
Unknown

CVE-2020-15168

Disclosure Date: September 10, 2020 (last updated February 22, 2025)
node-fetch before versions 2.6.1 and 3.0.0-beta.9 did not honor the size option after following a redirect, which means that when a content size was over the limit, a FetchError would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after fetch() has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.
Attacker Value
Unknown

CVE-2020-7722

Disclosure Date: September 01, 2020 (last updated February 22, 2025)
All versions of package nodee-utils are vulnerable to Prototype Pollution via the deepSet function.
Attacker Value
Unknown

CVE-2020-7721

Disclosure Date: September 01, 2020 (last updated February 22, 2025)
All versions of package node-oojs are vulnerable to Prototype Pollution via the setPath function.
Attacker Value
Unknown

CVE-2020-15156

Disclosure Date: August 26, 2020 (last updated February 22, 2025)
In nodebb-plugin-blog-comments before version 0.7.0, a logged in user is vulnerable to an XSS attack which could allow a third party to post on their behalf on the forum. This is due to lack of CSRF validation.