Логотип exploitDog
bind:"CVE-2025-23085" OR bind:"CVE-2025-22150" OR bind:"CVE-2025-23083"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-23085" OR bind:"CVE-2025-22150" OR bind:"CVE-2025-23083"

Количество 32

Количество 32

redhat логотип

CVE-2025-23083

10 месяцев назад

With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.

CVSS3: 7.7
EPSS: Низкий
nvd логотип

CVE-2025-23083

10 месяцев назад

With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.

CVSS3: 7.7
EPSS: Низкий
msrc логотип

CVE-2025-23083

9 месяцев назад

CVSS3: 7.7
EPSS: Низкий
debian логотип

CVE-2025-23083

10 месяцев назад

With the aid of the diagnostics_channel utility, an event can be hooke ...

CVSS3: 7.7
EPSS: Низкий
ubuntu логотип

CVE-2025-22150

10 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
EPSS: Низкий
redhat логотип

CVE-2025-22150

10 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2025-22150

10 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
EPSS: Низкий
msrc логотип

CVE-2025-22150

9 месяцев назад

Undici Uses Insufficiently Random Values

CVSS3: 6.8
EPSS: Низкий
debian логотип

CVE-2025-22150

10 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to v ...

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-wv7p-rjf3-9fr5

10 месяцев назад

With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.

CVSS3: 7.7
EPSS: Низкий
fstec логотип

BDU:2025-03339

10 месяцев назад

Уязвимость утилиты diagnostics_channel программной платформы Node.js, позволяющая нарушителю обойти внедренные ограничения безопасности

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-c76h-2ccp-4975

10 месяцев назад

Use of Insufficiently Random Values in undici

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-23083

With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.

CVSS3: 7.7
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2025-23083

With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.

CVSS3: 7.7
0%
Низкий
10 месяцев назад
msrc логотип
CVSS3: 7.7
0%
Низкий
9 месяцев назад
debian логотип
CVE-2025-23083

With the aid of the diagnostics_channel utility, an event can be hooke ...

CVSS3: 7.7
0%
Низкий
10 месяцев назад
ubuntu логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
0%
Низкий
10 месяцев назад
redhat логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
0%
Низкий
10 месяцев назад
msrc логотип
CVE-2025-22150

Undici Uses Insufficiently Random Values

CVSS3: 6.8
0%
Низкий
9 месяцев назад
debian логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to v ...

CVSS3: 6.8
0%
Низкий
10 месяцев назад
github логотип
GHSA-wv7p-rjf3-9fr5

With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.

CVSS3: 7.7
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-03339

Уязвимость утилиты diagnostics_channel программной платформы Node.js, позволяющая нарушителю обойти внедренные ограничения безопасности

CVSS3: 7.7
0%
Низкий
10 месяцев назад
github логотип
GHSA-c76h-2ccp-4975

Use of Insufficiently Random Values in undici

CVSS3: 6.8
0%
Низкий
10 месяцев назад

Уязвимостей на страницу