Show filters
331 Total Results
Displaying 161-170 of 331
Sort by:
Attacker Value
Unknown
CVE-2020-15149
Disclosure Date: August 20, 2020 (last updated February 22, 2025)
NodeBB before version 1.14.3 has a bug introduced in version 1.12.2 in the validation logic that makes it possible to change the password of any user on a running NodeBB forum by sending a specially crafted socket.io call to the server. This could lead to a privilege escalation event due via an account takeover. As a workaround you may cherry-pick the following commit from the project's repository to your running instance of NodeBB: 16cee1b03ba3eee177834a1fdac4aa8a12b39d2a. This is fixed in version 1.14.3.
0
Attacker Value
Unknown
CVE-2020-8174
Disclosure Date: July 24, 2020 (last updated February 21, 2025)
napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0, 12.18.0, and < 14.4.0.
0
Attacker Value
Unknown
CVE-2020-7689
Disclosure Date: July 01, 2020 (last updated February 21, 2025)
Data is truncated wrong when its length is greater than 255 bytes.
0
Attacker Value
Unknown
CVE-2020-7673
Disclosure Date: June 10, 2020 (last updated February 21, 2025)
node-extend through 0.2.0 is vulnerable to Arbitrary Code Execution. User input provided to the argument `A` of `extend` function`(A,B,as,isAargs)` located within `lib/extend.js` is executed by the `eval` function, resulting in code execution.
0
Attacker Value
Unknown
CVE-2020-8172
Disclosure Date: June 08, 2020 (last updated February 21, 2025)
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
0
Attacker Value
Unknown
CVE-2020-11080
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
0
Attacker Value
Unknown
CVE-2020-11079
Disclosure Date: May 28, 2020 (last updated February 21, 2025)
node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.
0
Attacker Value
Unknown
CVE-2020-7609
Disclosure Date: April 27, 2020 (last updated February 21, 2025)
node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function "fromJSON()" can be controlled by users without any sanitization.
0
Attacker Value
Unknown
CVE-2020-7632
Disclosure Date: April 06, 2020 (last updated February 21, 2025)
node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
0
Attacker Value
Unknown
CVE-2020-7627
Disclosure Date: April 02, 2020 (last updated February 21, 2025)
node-key-sender through 1.0.11 is vulnerable to Command Injection. It allows execution of arbitrary commands via the 'arrParams' argument in the 'execute()' function.
0