Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-0654
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Exposure of Sensitive Information to an Unauthorized Actor in fgribreau/node-request-retry
Source: NVD (National Vulnerability Database)
Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
node-request-retry 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
node-request-retry是当连接失败并出现ECONNRESET, ENOTFOUND, ESOCKETTIMEDOUT, ETIMEDOUT, ECONNREFUSED, EHOSTUNREACH,之一时EPIPE,EAI_AGAIN或者发生 HTTP 5xx 或 429 错误时,将自动重新尝试请求,因为这些通常是可恢复的错误,并且会在重试时消失。 fgribreau node-request-retry 存在信息泄露漏洞,该漏洞源于 fgribreau node-request-retry
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
fgribreaufgribreau/node-request-retry unspecified ~ 7.0.0 -
II. Public POCs for CVE-2022-0654
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-0654
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-0654

No comments yet


Leave a comment