Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8851

Опубликовано: 30 янв. 2020
Источник: debian

Описание

node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-uuidfixed1.4.7-1package

Примечания

  • https://github.com/broofa/node-uuid/issues/108

  • https://github.com/broofa/node-uuid/issues/118

  • https://github.com/broofa/node-uuid/issues/122

  • https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d

  • nodejs not covered by security support

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.

redhat
почти 10 лет назад

node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.

CVSS3: 7.5
nvd
около 6 лет назад

node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.

CVSS3: 7.5
github
почти 6 лет назад

Insecure Entropy Source - Math.random() in node-uuid