CVE-2019-9516
- EPSS 2.29%
- Veröffentlicht 13.08.2019 21:15:12
- Zuletzt bearbeitet 14.01.2025 19:29:55
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater h...
CVE-2019-9517
- EPSS 4.56%
- Veröffentlicht 13.08.2019 21:15:12
- Zuletzt bearbeitet 14.01.2025 19:29:55
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so...
CVE-2019-5737
- EPSS 36.86%
- Veröffentlicht 28.03.2019 17:29:01
- Zuletzt bearbeitet 21.11.2024 04:45:24
In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly...
CVE-2019-5739
- EPSS 0.67%
- Veröffentlicht 28.03.2019 17:29:01
- Zuletzt bearbeitet 21.11.2024 04:45:25
Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier...
CVE-2019-1559
- EPSS 5.05%
- Veröffentlicht 27.02.2019 23:29:00
- Zuletzt bearbeitet 21.11.2024 04:36:48
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...
CVE-2018-12116
- EPSS 0.62%
- Veröffentlicht 28.11.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:44:37
Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a secon...
CVE-2018-12120
- EPSS 0.42%
- Veröffentlicht 28.11.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:44:38
Node.js: All versions prior to Node.js 6.15.0: Debugger port 5858 listens on any interface by default: When the debugger is enabled with `node --debug` or `node debug`, it listens to port 5858 on all interfaces by default. This may allow remote compu...
CVE-2018-12121
- EPSS 4.28%
- Veröffentlicht 28.11.2018 17:29:00
- Zuletzt bearbeitet 27.12.2024 16:15:22
Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of ...
CVE-2018-12122
- EPSS 2.81%
- Veröffentlicht 28.11.2018 17:29:00
- Zuletzt bearbeitet 13.12.2024 14:15:19
Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Slowloris HTTP Denial of Service: An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources ali...
CVE-2018-12123
- EPSS 4.7%
- Veröffentlicht 28.11.2018 17:29:00
- Zuletzt bearbeitet 13.12.2024 14:15:19
Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a m...