5.3
CVE-2016-1000232
- EPSS 0.92%
- Veröffentlicht 05.09.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 02:43:01
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulnerability appears to have been fixed in 2.3.0.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Salesforce ≫ Tough-cookie SwPlatformnode.js Version >= 0.9.7 <= 2.2.2
Ibm ≫ Api Connect Version >= 5.0.6.0 <= 5.0.6.5
Ibm ≫ Api Connect Version >= 5.0.7.0 <= 5.0.7.2
Ibm ≫ Api Connect Version5.0.8.0
Redhat ≫ Openshift Container Platform Version3.1
Redhat ≫ Openshift Container Platform Version3.2
Redhat ≫ Openshift Container Platform Version3.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.92% | 0.75 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.