7.4
CVE-2023-46809
- EPSS 1.24%
- Veröffentlicht 07.09.2024 16:15:02
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle support@hackerone.com
- CVE-Watchlists
- Unerledigt
Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellernodejs
≫
Produkt
nodejs
Default Statusunaffected
Version <=
18.19.0
Version
18.0
Status
affected
Version <=
20.11.0
Version
20.0
Status
affected
Version <=
21.6.0
Version
21.0
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.24% | 0.791 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.4 | 2.2 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-385 Covert Timing Channel
Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information.