Логотип exploitDog
bind:"CVE-2025-23085" OR bind:"CVE-2025-22150"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-23085" OR bind:"CVE-2025-22150"

Количество 25

Количество 25

suse-cvrf логотип

SUSE-SU-2025:0234-1

5 месяцев назад

Security update for nodejs18

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0233-1

5 месяцев назад

Security update for nodejs18

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1582

4 месяца назад

ELSA-2025-1582: nodejs:18 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1446

4 месяца назад

ELSA-2025-1446: nodejs:18 security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0284-1

5 месяцев назад

Security update for nodejs22

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0237-1

5 месяцев назад

Security update for nodejs20

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0232-1

5 месяцев назад

Security update for nodejs20

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1613

4 месяца назад

ELSA-2025-1613: nodejs:22 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1611

4 месяца назад

ELSA-2025-1611: nodejs:22 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1443

4 месяца назад

ELSA-2025-1443: nodejs:20 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1351

4 месяца назад

ELSA-2025-1351: nodejs:20 security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2025-22150

5 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
EPSS: Низкий
redhat логотип

CVE-2025-22150

5 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2025-22150

5 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
EPSS: Низкий
msrc логотип

CVE-2025-22150

4 месяца назад

CVSS3: 6.8
EPSS: Низкий
debian логотип

CVE-2025-22150

5 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to v ...

CVSS3: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2025-23085

4 месяца назад

A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions. This vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2025-23085

5 месяцев назад

A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions. This vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-23085

4 месяца назад

A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions. This vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2025-23085

4 месяца назад

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:0234-1

Security update for nodejs18

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0233-1

Security update for nodejs18

5 месяцев назад
oracle-oval логотип
ELSA-2025-1582

ELSA-2025-1582: nodejs:18 security update (MODERATE)

4 месяца назад
oracle-oval логотип
ELSA-2025-1446

ELSA-2025-1446: nodejs:18 security update (MODERATE)

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0284-1

Security update for nodejs22

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0237-1

Security update for nodejs20

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0232-1

Security update for nodejs20

5 месяцев назад
oracle-oval логотип
ELSA-2025-1613

ELSA-2025-1613: nodejs:22 security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-1611

ELSA-2025-1611: nodejs:22 security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-1443

ELSA-2025-1443: nodejs:20 security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-1351

ELSA-2025-1351: nodejs:20 security update (IMPORTANT)

4 месяца назад
ubuntu логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
0%
Низкий
5 месяцев назад
msrc логотип
CVSS3: 6.8
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to v ...

CVSS3: 6.8
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-23085

A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions. This vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.

CVSS3: 5.3
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-23085

A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions. This vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.

CVSS3: 5.3
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-23085

A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions. This vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.

CVSS3: 5.3
0%
Низкий
4 месяца назад
msrc логотип
CVSS3: 5.3
0%
Низкий
4 месяца назад

Уязвимостей на страницу