{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T12:48:39.548","vulnerabilities":[{"cve":{"id":"CVE-2017-16025","sourceIdentifier":"support@hackerone.com","published":"2018-06-04T19:29:01.490","lastModified":"2024-11-21T03:15:41.180","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Nes is a websocket extension library for hapi. Hapi is a webserver framework. Versions below and including 6.4.0 have a denial of service vulnerability via an invalid Cookie header. This is only present when websocket authentication is set to `cookie`. Submitting an invalid cookie on the websocket upgrade request will cause the node process to error out."},{"lang":"es","value":"Nes es una biblioteca de extensiones websocket para hapi. Hapi es un framework de servidores web. Las versiones anteriores a, e incluyendo, la 6.4.0, tienen una vulnerabilidad de denegación de servicio (DoS) mediante una cabecera Cookie inválida. Esto solo está presente cuando la autenticación websocket está establecida en \"cookie\". El envío de una cookie inválida en la petición de actualización de websocket provocará que el proceso node genere un error."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"support@hackerone.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hapijs:nes:*:*:*:*:*:node.js:*:*","versionEndIncluding":"6.4.0","matchCriteriaId":"160C670F-52B7-46F7-BA0A-B24372E55CBA"}]}]}],"references":[{"url":"https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655","source":"support@hackerone.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/hapijs/nes/issues/171","source":"support@hackerone.com","tags":["Third Party Advisory"]},{"url":"https://nodesecurity.io/advisories/331","source":"support@hackerone.com","tags":["Third Party Advisory"]},{"url":"https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/hapijs/nes/issues/171","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://nodesecurity.io/advisories/331","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}