Search for packages
| purl | pkg:rpm/redhat/nodejs-tough-cookie@2.3.1-1?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-atyy-fepb-6yge
Aliases: CVE-2016-5325 |
Multiple vulnerabilities have been found in Node.js, the worst of which can allow remote attackers to cause Denial of Service conditions. | There are no reported fixed by versions. |
|
VCID-ep8y-hq9y-afcu
Aliases: CVE-2017-15138 |
atomic-openshift: cluster-reader can escalate to creating builds via webhooks in any project | There are no reported fixed by versions. |
|
VCID-gcrq-1at1-bygq
Aliases: CVE-2016-1000232 GHSA-qhv9-728r-6jqg |
Improper Input Validation NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulnerability appears to have been fixed in 2.3.0. | There are no reported fixed by versions. |
|
VCID-jqgq-yvxr-r7hs
Aliases: CVE-2017-12195 |
3: authentication bypass for elasticsearch with external routes | There are no reported fixed by versions. |
|
VCID-u9ph-5sbd-mfgp
Aliases: CVE-2018-1000169 GHSA-cpw3-x7gf-p872 |
Information Exposure Jenkins allows unauthorized attackers to confirm the existence of agents or views with an attacker-specified name by sending a CLI command to Jenkins. | There are no reported fixed by versions. |
|
VCID-vtvy-ec7a-xua9
Aliases: CVE-2017-15137 |
atomic-openshift: image import whitelist can be bypassed by creating an imagestream or using oc tag | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||