Nodejs

Node.Js

174 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.25%
  • Veröffentlicht 21.08.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:37

In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a ...

  • EPSS 0.6%
  • Veröffentlicht 21.08.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:42

In all versions of Node.js 10 prior to 10.9.0, an argument processing flaw can cause `Buffer.alloc()` to return uninitialized memory. This method is intended to be safe and only return initialized, or cleared, memory. The third argument specifying `e...

  • EPSS 1.02%
  • Veröffentlicht 13.06.2018 16:29:01
  • Zuletzt bearbeitet 21.11.2024 04:11:42

All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 se...

  • EPSS 1.51%
  • Veröffentlicht 13.06.2018 16:29:01
  • Zuletzt bearbeitet 21.11.2024 04:11:42

All versions of Node.js 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending ...

  • EPSS 0.91%
  • Veröffentlicht 13.06.2018 16:29:01
  • Zuletzt bearbeitet 21.11.2024 04:11:42

Node.js versions 9.7.0 and later and 10.x are vulnerable and the severity is MEDIUM. A bug introduced in 9.7.0 increases the memory consumed when reading from the network into JavaScript using the net.Socket object directly as a stream. An attacker c...

  • EPSS 0.82%
  • Veröffentlicht 13.06.2018 16:29:01
  • Zuletzt bearbeitet 21.11.2024 04:11:42

Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero ...

  • EPSS 81.09%
  • Veröffentlicht 12.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:49

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime result...

  • EPSS 0.26%
  • Veröffentlicht 04.06.2018 19:29:01
  • Zuletzt bearbeitet 21.11.2024 03:15:41

The sync-exec module is used to simulate child_process.execSync in node versions <0.11.9. Sync-exec uses tmp directories as a buffer before returning values. Other users on the server have read access to the tmp directory, possibly allowing an attack...

  • EPSS 1.77%
  • Veröffentlicht 17.05.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:41

The `'path'` module in the Node.js 4.x release line contains a potential regular expression denial of service (ReDoS) vector. The code in question was replaced in Node.js 6.x and later so this vulnerability only impacts all versions of Node.js 4.x. T...

  • EPSS 0.87%
  • Veröffentlicht 17.05.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:41

The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Conte...