Lucene search

K
redosRedosROS-20220125-10
HistoryJan 25, 2022 - 12:00 a.m.

ROS-20220125-10

2022-01-2500:00:00
redos.red-soft.ru
42

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.004 Low

EPSS

Percentile

74.7%

A vulnerability in the Node.js software platform is related to the formatting logic of the console.table() function.
Exploitation of the vulnerability could allow an attacker acting remotely to send a special request
and assign an empty string to the prototype object’s numeric keys

A vulnerability in the Node.js software platform is related to incorrect validation of the subject and issuer fields of the
of a certificate. Exploitation of the vulnerability could allow an attacker acting remotely to create a
certificate with special names and perform a spoofing attack.

A vulnerability in the Node.js software platform is related to insufficient validation of alternative subject names
URIS. Exploitation of the vulnerability could allow an attacker acting remotely to bypass intermediate
name-restricted intermediate links and perform a spoofing attack

A vulnerability in the Node.js software platform is related to insufficient certificate validation during the
SAN (alternate entity names) conversion to string format. Exploitation of the vulnerability could
allow a remote attacker to inject special characters into the string and perform a spoofing attack.
spoofing attack

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64nodejs<= 16.13.2-1UNKNOWN

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.004 Low

EPSS

Percentile

74.7%