{"id":"CVE-2016-1000236","details":"Node-cookie-signature before 1.0.6 is affected by a timing attack due to the type of comparison used.","aliases":["GHSA-92vm-wfm5-mxvv"],"modified":"2026-03-14T09:17:31.670496Z","published":"2019-11-19T17:15:11.343Z","references":[{"type":"WEB","url":"https://www.mail-archive.com/secure-testing-team%40lists.alioth.debian.org/msg06583.html"},{"type":"ADVISORY","url":"https://travis-ci.com/nodejs/security-wg/builds/76423102"},{"type":"REPORT","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838618"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1371409"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000236"},{"type":"FIX","url":"https://security-tracker.debian.org/tracker/CVE-2016-1000236"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-1000236.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.6"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"}]}