Описание
node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 1.4.7-5 |
| devel | not-affected | 1.4.7-5 |
| esm-apps/bionic | not-affected | 1.4.7-5 |
| esm-apps/xenial | not-affected | code not present |
| esm-infra-legacy/trusty | not-affected | code not present |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| trusty | not-affected | code not present |
| trusty/esm | not-affected | code not present |
Показывать по
Ссылки на источники
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.
node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.
node-uuid before 1.4.4 uses insufficiently random data to create a GUI ...
Insecure Entropy Source - Math.random() in node-uuid
5 Medium
CVSS2
7.5 High
CVSS3