9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.014 Low
EPSS
Percentile
86.4%
Rogier Schouten discovered that Node.js incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
(CVE-2019-15604)
Ethan Rubinson discovered that Node.js incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2019-15605)
Alyssa Wilk discovered that Node.js incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to execute
arbitrary code. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2019-15606)
Tobias Niessen discovered that Node.js incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-8174)
It was discovered that Node.js incorrectly handled certain inputs. If a user
or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2020-8265, CVE-2020-8287)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | libnode-dev | < 10.19.0~dfsg-3ubuntu1.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libnode64 | < 10.19.0~dfsg-3ubuntu1.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | libnode64-dbgsym | < 10.19.0~dfsg-3ubuntu1.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | nodejs | < 10.19.0~dfsg-3ubuntu1.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | nodejs-dbgsym | < 10.19.0~dfsg-3ubuntu1.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | nodejs-doc | < 10.19.0~dfsg-3ubuntu1.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | nodejs | < 8.10.0~dfsg-2ubuntu0.4+esm2 | UNKNOWN |
Ubuntu | 18.04 | noarch | nodejs | < 8.10.0~dfsg-2ubuntu0.4 | UNKNOWN |
Ubuntu | 18.04 | noarch | nodejs-dbgsym | < 8.10.0~dfsg-2ubuntu0.4 | UNKNOWN |
Ubuntu | 18.04 | noarch | nodejs-dev | < 8.10.0~dfsg-2ubuntu0.4 | UNKNOWN |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.014 Low
EPSS
Percentile
86.4%