CVE-2020-8174
Severity CVSS v4.0:
Pending analysis
Type:
CWE-191
Integer Underflow (Wrap or Wraparound)
Publication date:
24/07/2020
Last modified:
12/05/2022
Description
napi_get_value_string_*() allows various kinds of memory corruption in node
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 10.21.0 (excluding) | |
| cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 12.0.0 (including) | 12.18.0 (excluding) |
| cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 14.0.0 (including) | 14.4.0 (excluding) |
| cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:banking_extensibility_workbench:14.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:* | 21.1.2 (excluding) | |
| cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:* | 7.3.30 (including) | |
| cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:* | 7.4.0 (including) | 7.4.29 (including) |
| cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:* | 7.5.0 (including) | 7.5.19 (including) |
| cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:* | 7.6.0 (including) | 7.6.15 (including) |
| cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:* | 8.0.0 (including) | 8.0.21 (including) |
| cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://hackerone.com/reports/784186
- https://security.gentoo.org/glsa/202101-07
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html



