Node Underground
Dec 24, 2015 · Information Security
Exploiting and Mitigating Node.js CVE-2015-8027 & CVE-2015-6764 Vulnerabilities
This article explains the technical details of Node.js CVE-2015-8027 and CVE-2015-6764 vulnerabilities, how they can be triggered through highWaterMark and HTTP UPGRADE misuse, and provides mitigation advice including version upgrades and Nginx filtering.
CVE-2015-6764CVE-2015-8027Denial of Service
0 likes · 9 min read
