2 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins NodeJS Plugin 1.6.0 and earlier does not properly mask (i.e., replace with asterisks) credentials specified in the Npm config file in Pipeline build logs. • http://www.openwall.com/lists/oss-security/2023/08/16/3 https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3196 •

CVSS: 6.4EPSS: 0%CPEs: 9EXPL: 2

The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string. El método de actualización (Update) en src/node_http_parser.cc en Node.js antes de v0.6.17 y v0.7 antes de v0.7.8 no comprueba correctamente la longitud de una cadena, lo que permite a atacantes remotos obtener información sensible (contenidos del encabezado de la solicitud) y, posiblemente, HTTP falsear cabeceras a través de una cadena de longitud cero. • http://blog.nodejs.org/2012/05/04/version-0-6-17-stable http://secunia.com/advisories/49066 http://www.openwall.com/lists/oss-security/2012/05/08/4 http://www.openwall.com/lists/oss-security/2012/05/08/8 https://github.com/joyent/node/commit/7b3fb22 https://github.com/joyent/node/commit/c9a231d https://support.f5.com/csp/article/K99038439?utm_source=f5support&amp%3Butm_medium=RSS • CWE-20: Improper Input Validation •