Update

Node.js LTS

Node.js Foundation

Node.js LTS

to version 22.15.0

View all applications

CVE Vulnerabilities for Node.js LTS

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2014‑52562014‑09‑05 17:55:07MEDIUM (5)Node.js 0.8 before 0.8.28 and 0.10 before 0.10.30 does not consider the possibility of recursive processing that triggers V8 garbage collection in conjunction with a V8 interrupt, which allows remote attackers to cause a denial of service (memory corruption and application crash) via deep JSON objects whose parsing lets this interrupt mask an overflow of the program stack.00NETWORK
CVE‑2013‑44502013‑10‑21 17:55:04MEDIUM (5)The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response.00NETWORK
CVE‑2012‑23302012‑08‑13 23:55:01MEDIUM (6)The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.00NETWORK

View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.