Nodejs Node.Js vulnerabilities

162 known vulnerabilities affecting nodejs/node.js.

Total CVEs
162
CISA KEV
1
actively exploited
Public exploits
5
Exploited in wild
1
Severity breakdown
CRITICAL18HIGH96MEDIUM47LOW1

Vulnerabilities

Page 8 of 9
CVE-2016-5172MEDIUMCVSS 6.5≥ 6.0.0, ≤ 6.8.12016-09-25
CVE-2016-5172 [MEDIUM] CWE-200 CVE-2016-5172: The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which all The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.
nvd
CVE-2016-6303CRITICALCVSS 9.8fixed in 0.12.16≥ 4.0.0, < 4.6.0+1 more2016-09-16
CVE-2016-6303 [CRITICAL] CWE-787 CVE-2016-6303: Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allow Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
nvd
CVE-2016-2183HIGHCVSS 7.5≥ 0.10.0, < 0.10.47≥ 0.12.0, < 0.12.16+3 more2016-09-01
CVE-2016-2183 [HIGH] CWE-200 CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DE
nvd
CVE-2016-3956HIGHCVSS 7.5v0.10.0v0.10.1+82 more2016-07-02
CVE-2016-3956 [HIGH] CWE-200 CVE-2016-3956: The CLI in npm before 2.15.1 and 3.x before 3.8.3, as used in Node.js 0.10 before 0.10.44, 0.12 befo The CLI in npm before 2.15.1 and 3.x before 3.8.3, as used in Node.js 0.10 before 0.10.44, 0.12 before 0.12.13, 4 before 4.4.2, and 5 before 5.10.0, includes bearer tokens with arbitrary requests, which allows remote HTTP servers to obtain sensitive information by reading Authorization headers.
nvd
CVE-2016-2178MEDIUMCVSS 5.5≥ 0.10.0, < 0.10.47≥ 0.12.0, < 0.12.16+3 more2016-06-20
CVE-2016-2178 [MEDIUM] CWE-203 CVE-2016-2178: The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ens The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
nvd
CVE-2016-1669HIGHCVSS 8.8≥ 0.10.0, < 0.10.46≥ 0.12.0, < 0.12.15+4 more2016-05-14
CVE-2016-1669 [HIGH] CWE-119 CVE-2016-1669: The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50. The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
nvd
CVE-2016-2105HIGHCVSS 7.5≥ 0.10.0, < 0.10.45≥ 0.12.0, < 0.12.14+4 more2016-05-05
CVE-2016-2105 [HIGH] CWE-190 CVE-2016-2105: Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t an Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
nvd
CVE-2016-2107MEDIUMCVSS 5.9PoC≥ 0.10.0, < 0.10.45≥ 0.12.0, < 0.12.14+4 more2016-05-05
CVE-2016-2107 [MEDIUM] CVE-2016-2107: The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
nvd
CVE-2016-2216HIGHCVSS 7.5v0.10.0v0.10.1+81 more2016-04-07
CVE-2016-2216 [HIGH] CWE-20 CVE-2016-2216: The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.
nvd
CVE-2016-2086HIGHCVSS 7.5v0.10.0v0.10.1+70 more2016-04-07
CVE-2016-2086 [HIGH] CWE-20 CVE-2016-2086: Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow r Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
nvd
CVE-2016-0797HIGHCVSS 7.5≥ 4.0.0, < 4.1.2≥ 4.2.0, < 4.3.2+1 more2016-03-03
CVE-2016-0797 [HIGH] CVE-2016-0797: Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attac Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_
nvd
CVE-2016-0702MEDIUMCVSS 5.1≥ 4.0.0, ≤ 4.1.2≥ 4.2.0, < 4.3.2+1 more2016-03-03
CVE-2016-0702 [MEDIUM] CWE-200 CVE-2016-0702: The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and le
nvd
CVE-2015-8027HIGHCVSS 7.5v0.12.0v0.12.1+12 more2016-01-02
CVE-2015-8027 [HIGH] CWE-17 CVE-2015-8027: Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availabilit Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availability of a parser for each HTTP socket, which allows remote attackers to cause a denial of service (uncaughtException and service outage) via a pipelined HTTP request.
nvd
CVE-2015-6764CRITICALCVSS 9.8≥ 4.0.0, ≤ 4.1.2≥ 4.2.0, < 4.2.3+1 more2015-12-06
CVE-2015-6764 [CRITICAL] CWE-119 CVE-2015-6764: The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.
nvd
CVE-2015-3194HIGHCVSS 7.5≥ 0.10.0, < 0.10.41≥ 0.12.0, < 0.12.9+2 more2015-12-06
CVE-2015-3194 [HIGH] CWE-476 CVE-2015-3194: crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attacker crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
nvd
CVE-2015-3193HIGHCVSS 7.5≥ 4.0.0, ≤ 4.1.2≥ 4.2.0, < 4.2.3+1 more2015-12-06
CVE-2015-3193 [HIGH] CWE-200 CVE-2015-3193: The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0. The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hel
nvd
CVE-2015-5380HIGHCVSS 7.5≤ 0.12.52015-07-09
CVE-2015-5380 [HIGH] CWE-119 CVE-2015-5380: The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecif
nvd
CVE-2015-0278CRITICALCVSS 10.0fixed in 0.10.372015-05-18
CVE-2015-0278 [CRITICAL] CWE-273 CVE-2015-0278: libuv before 0.10.34 does not properly drop group privileges, which allows context-dependent attacke libuv before 0.10.34 does not properly drop group privileges, which allows context-dependent attackers to gain privileges via unspecified vectors.
nvd
CVE-2014-7191MEDIUMCVSS 5.0≤ 0.10.182014-10-19
CVE-2014-7191 [MEDIUM] CWE-399 CVE-2014-7191: The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allow The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.
nvd
CVE-2014-0224HIGHCVSS 7.4fixed in 0.10.292014-06-05
CVE-2014-0224 [HIGH] CWE-326 CVE-2014-0224: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict proc OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS hand
nvd