Skip to content
Browse files

doc: simplify valid security issue descriptions

PR-URL: #23881
Reviewed-By: James M Snell <>
Reviewed-By: Luigi Pinca <>
  • Loading branch information
Trott committed Oct 27, 2018
1 parent c99026b commit 336651bad0368e1a4ea5597c9a0615764dba4d16
Showing with 4 additions and 5 deletions.
  1. +4 −5
@@ -182,18 +182,17 @@ nonetheless.
### Private disclosure preferred

- [CVE-2016-7099](
_Fix invalid wildcard certificate validation check_. This is a high severity
defect that would allow a malicious TLS server to serve an invalid wildcard
certificate for its hostname and be improperly validated by a Node.js client.
_Fix invalid wildcard certificate validation check_. This was a high-severity
defect. It caused Node.js TLS clients to accept invalid wildcard certificates.

- [#5507]( _Fix a defect that makes
the CacheBleed Attack possible_. Many, though not all, OpenSSL vulnerabilities
in the TLS/SSL protocols also affect Node.js.

- [CVE-2016-2216](
_Fix defects in HTTP header parsing for requests and responses that can allow
response splitting_. While the impact of this vulnerability is application and
network dependent, it is remotely exploitable in the HTTP protocol.
response splitting_. This was a remotely-exploitable defect in the Node.js
HTTP implementation.

When in doubt, please do send us a report.

0 comments on commit 336651b

Please sign in to comment.
You can’t perform that action at this time.