Show filters
170 Total Results
Displaying 81-90 of 170
Sort by:
Attacker Value
Unknown
CVE-2020-8174
Disclosure Date: July 24, 2020 (last updated February 21, 2025)
napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0, 12.18.0, and < 14.4.0.
0
Attacker Value
Unknown
CVE-2020-8172
Disclosure Date: June 08, 2020 (last updated February 21, 2025)
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
0
Attacker Value
Unknown
CVE-2020-11080
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
0
Attacker Value
Unknown
CVE-2020-10531
Disclosure Date: March 12, 2020 (last updated February 21, 2025)
An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
0
Attacker Value
Unknown
CVE-2014-9748
Disclosure Date: February 11, 2020 (last updated February 21, 2025)
The uv_rwlock_t fallback implementation for Windows XP and Server 2003 in libuv before 1.7.4 does not properly prevent threads from releasing the locks of other threads, which allows attackers to cause a denial of service (deadlock) or possibly have unspecified other impact by leveraging a race condition.
0
Attacker Value
Unknown
CVE-2019-15605
Disclosure Date: February 07, 2020 (last updated February 21, 2025)
HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed
0
Attacker Value
Unknown
CVE-2019-15606
Disclosure Date: February 07, 2020 (last updated February 21, 2025)
Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
0
Attacker Value
Unknown
CVE-2019-15604
Disclosure Date: February 07, 2020 (last updated February 21, 2025)
Improper Certificate Validation in Node.js 10, 12, and 13 causes the process to abort when sending a crafted X.509 certificate
0
Attacker Value
Unknown
CVE-2019-9515
Disclosure Date: August 13, 2019 (last updated January 15, 2025)
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
0
Attacker Value
Unknown
CVE-2019-9512
Disclosure Date: August 13, 2019 (last updated November 08, 2023)
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
0