Show filters
331 Total Results
Displaying 161-170 of 331
Sort by:
Attacker Value
Unknown

CVE-2020-15149

Disclosure Date: August 20, 2020 (last updated February 22, 2025)
NodeBB before version 1.14.3 has a bug introduced in version 1.12.2 in the validation logic that makes it possible to change the password of any user on a running NodeBB forum by sending a specially crafted socket.io call to the server. This could lead to a privilege escalation event due via an account takeover. As a workaround you may cherry-pick the following commit from the project's repository to your running instance of NodeBB: 16cee1b03ba3eee177834a1fdac4aa8a12b39d2a. This is fixed in version 1.14.3.
Attacker Value
Unknown

CVE-2020-8174

Disclosure Date: July 24, 2020 (last updated February 21, 2025)
napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0, 12.18.0, and < 14.4.0.
Attacker Value
Unknown

CVE-2020-7689

Disclosure Date: July 01, 2020 (last updated February 21, 2025)
Data is truncated wrong when its length is greater than 255 bytes.
Attacker Value
Unknown

CVE-2020-7673

Disclosure Date: June 10, 2020 (last updated February 21, 2025)
node-extend through 0.2.0 is vulnerable to Arbitrary Code Execution. User input provided to the argument `A` of `extend` function`(A,B,as,isAargs)` located within `lib/extend.js` is executed by the `eval` function, resulting in code execution.
Attacker Value
Unknown

CVE-2020-8172

Disclosure Date: June 08, 2020 (last updated February 21, 2025)
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
Attacker Value
Unknown

CVE-2020-11080

Disclosure Date: June 03, 2020 (last updated February 21, 2025)
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
Attacker Value
Unknown

CVE-2020-11079

Disclosure Date: May 28, 2020 (last updated February 21, 2025)
node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.
Attacker Value
Unknown

CVE-2020-7609

Disclosure Date: April 27, 2020 (last updated February 21, 2025)
node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function "fromJSON()" can be controlled by users without any sanitization.
Attacker Value
Unknown

CVE-2020-7632

Disclosure Date: April 06, 2020 (last updated February 21, 2025)
node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
Attacker Value
Unknown

CVE-2020-7627

Disclosure Date: April 02, 2020 (last updated February 21, 2025)
node-key-sender through 1.0.11 is vulnerable to Command Injection. It allows execution of arbitrary commands via the 'arrParams' argument in the 'execute()' function.

This site uses cookies for anonymized analytics. For more information or to change your cookie settings, view our Cookie Policy.