Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2011-5037

Опубликовано: 30 дек. 2011
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*

EPSS

Процентиль: 73%
0.00764
Низкий

5 Medium

CVSS2

Дефекты

CWE-20

Связанные уязвимости

ubuntu
около 14 лет назад

Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.

redhat
около 14 лет назад

Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.

debian
около 14 лет назад

Google V8 computes hash values for form parameters without restricting ...

github
больше 3 лет назад

Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.

EPSS

Процентиль: 73%
0.00764
Низкий

5 Medium

CVSS2

Дефекты

CWE-20