Show filters
234 Total Results
Displaying 151-160 of 234
Sort by:
Attacker Value
Unknown
CVE-2018-0735
Disclosure Date: October 29, 2018 (last updated November 08, 2023)
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
0
Attacker Value
Unknown
CVE-2018-7166
Disclosure Date: August 21, 2018 (last updated November 27, 2024)
In all versions of Node.js 10 prior to 10.9.0, an argument processing flaw can cause `Buffer.alloc()` to return uninitialized memory. This method is intended to be safe and only return initialized, or cleared, memory. The third argument specifying `encoding` can be passed as a number, this is misinterpreted by `Buffer's` internal "fill" method as the `start` to a fill operation. This flaw may be abused where `Buffer.alloc()` arguments are derived from user input to return uncleared memory blocks that may contain sensitive information.
0
Attacker Value
Unknown
CVE-2018-12115
Disclosure Date: August 21, 2018 (last updated November 27, 2024)
In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.
0
Attacker Value
Unknown
CVE-2018-7162
Disclosure Date: June 13, 2018 (last updated November 26, 2024)
All versions of Node.js 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation.
0
Attacker Value
Unknown
CVE-2018-7164
Disclosure Date: June 13, 2018 (last updated November 26, 2024)
Node.js versions 9.7.0 and later and 10.x are vulnerable and the severity is MEDIUM. A bug introduced in 9.7.0 increases the memory consumed when reading from the network into JavaScript using the net.Socket object directly as a stream. An attacker could use this cause a denial of service by sending tiny chunks of data in short succession. This vulnerability was restored by reverting to the prior behaviour.
0
Attacker Value
Unknown
CVE-2018-7167
Disclosure Date: June 13, 2018 (last updated November 26, 2024)
Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.
0
Attacker Value
Unknown
CVE-2018-7161
Disclosure Date: June 13, 2018 (last updated November 26, 2024)
All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.
0
Attacker Value
Unknown
CVE-2018-0732
Disclosure Date: June 12, 2018 (last updated November 08, 2023)
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
0
Attacker Value
Unknown
CVE-2017-16113
Disclosure Date: June 07, 2018 (last updated November 26, 2024)
The parsejson module is vulnerable to regular expression denial of service when untrusted user input is passed into it to be parsed.
0
Attacker Value
Unknown
CVE-2017-16024
Disclosure Date: June 04, 2018 (last updated November 26, 2024)
The sync-exec module is used to simulate child_process.execSync in node versions <0.11.9. Sync-exec uses tmp directories as a buffer before returning values. Other users on the server have read access to the tmp directory, possibly allowing an attacker on the server to obtain confidential information from the buffer/tmp file, while it exists.
0