7.5

CVE-2020-8277

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

Data is provided by the National Vulnerability Database (NVD)
NodejsNode.Js SwEditionlts Version >= 12.16.3 < 12.19.1
NodejsNode.Js SwEditionlts Version >= 14.13.0 < 14.15.1
NodejsNode.Js SwEdition- Version >= 15.0.0 < 15.2.1
FedoraprojectFedora Version32
FedoraprojectFedora Version33
OracleBlockchain Platform Version < 21.1.2
OracleGraalvm Version19.3.4 SwEditionenterprise
OracleGraalvm Version20.3.0 SwEditionenterprise
OracleJd Edwards Enterpriseone Tools Version < 9.2.6.0
OracleMysql Cluster Version <= 8.0.23
C-ares ProjectC-ares Version < 1.16.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 59.17% 0.982
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.