{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T17:15:08.117","vulnerabilities":[{"cve":{"id":"CVE-2018-12120","sourceIdentifier":"cve-request@iojs.org","published":"2018-11-28T17:29:00.290","lastModified":"2024-11-21T03:44:38.050","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Node.js: All versions prior to Node.js 6.15.0: Debugger port 5858 listens on any interface by default: When the debugger is enabled with `node --debug` or `node debug`, it listens to port 5858 on all interfaces by default. This may allow remote computers to attach to the debug port and evaluate arbitrary JavaScript. The default interface is now localhost. It has always been possible to start the debugger on a specific interface, such as `node --debug=localhost`. The debugger was removed in Node.js 8 and replaced with the inspector, so no versions from 8 and later are vulnerable."},{"lang":"es","value":"Node.js: Todas las versiones anteriores a la 6.15.0: El puerto de depuración 5858 escucha en cualquier interfaz por defecto. Cuando el depurador está habilitado con \"node --debug\" o \"node debug\", escucha en el puerto 5858 en todas las interfaces por defecto. Esto podría permitir que los ordenadores remotos se conecten al puerto de depuración y evalúen JavaScript arbitrario. La interfaz por defecto es ahora localhost. Siempre ha sido posible iniciar el depurador en una interfaz concreta, como \"node --debug=localhost\". El depurador fue eliminado en Node.js 8 y se sustituyó por el inspector, por lo que no hay versiones vulnerables a partir de la 8."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cve-request@iojs.org","type":"Secondary","description":[{"lang":"en","value":"CWE-419"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-829"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.15.0","matchCriteriaId":"30C30A13-A774-48C1-A0FC-1F31327DE909"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/106040","source":"cve-request@iojs.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/","source":"cve-request@iojs.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/106040","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}