Описание
node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.
Ссылки
- Mailing ListPatchThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- Patch
- Third Party Advisory
- Mailing ListPatchThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- Patch
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.4.4 (исключая)
cpe:2.3:a:node-uuid_project:node-uuid:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 64%
0.00477
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-331
Связанные уязвимости
CVSS3: 7.5
ubuntu
около 6 лет назад
node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.
redhat
почти 10 лет назад
node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.
CVSS3: 7.5
debian
около 6 лет назад
node-uuid before 1.4.4 uses insufficiently random data to create a GUI ...
CVSS3: 7.5
github
почти 6 лет назад
Insecure Entropy Source - Math.random() in node-uuid
EPSS
Процентиль: 64%
0.00477
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-331