Nodejs

Node.Js

167 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.82%
  • Veröffentlicht 14.05.2016 21:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer ...

  • EPSS 79.14%
  • Veröffentlicht 05.05.2016 01:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against...

  • EPSS 50.8%
  • Veröffentlicht 05.05.2016 01:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.

  • EPSS 2.11%
  • Veröffentlicht 07.04.2016 21:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded U...

  • EPSS 0.45%
  • Veröffentlicht 07.04.2016 21:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

  • EPSS 30.74%
  • Veröffentlicht 03.03.2016 20:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit stri...

  • EPSS 0.46%
  • Veröffentlicht 03.03.2016 20:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discov...

  • EPSS 1.5%
  • Veröffentlicht 02.01.2016 21:59:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availability of a parser for each HTTP socket, which allows remote attackers to cause a denial of service (uncaughtException and service outage) via a pipelined ...

  • EPSS 64.59%
  • Veröffentlicht 06.12.2015 20:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function p...

  • EPSS 26.94%
  • Veröffentlicht 06.12.2015 20:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for r...