Логотип exploitDog
bind:"CVE-2025-22150" OR bind:"CVE-2025-23083" OR bind:"CVE-2025-23085"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-22150" OR bind:"CVE-2025-23083" OR bind:"CVE-2025-23085"

Количество 38

Количество 38

suse-cvrf логотип

SUSE-SU-2025:0284-1

11 месяцев назад

Security update for nodejs22

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0237-1

11 месяцев назад

Security update for nodejs20

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0232-1

11 месяцев назад

Security update for nodejs20

EPSS: Низкий
rocky логотип

RLSA-2025:1613

10 месяцев назад

Important: nodejs:22 security update

EPSS: Низкий
rocky логотип

RLSA-2025:1611

10 месяцев назад

Important: nodejs:22 security update

EPSS: Низкий
rocky логотип

RLSA-2025:1443

11 месяцев назад

Important: nodejs:20 security update

EPSS: Низкий
rocky логотип

RLSA-2025:1351

11 месяцев назад

Important: nodejs:20 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1613

10 месяцев назад

ELSA-2025-1613: nodejs:22 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1611

10 месяцев назад

ELSA-2025-1611: nodejs:22 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1443

11 месяцев назад

ELSA-2025-1443: nodejs:20 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1351

11 месяцев назад

ELSA-2025-1351: nodejs:20 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0234-1

11 месяцев назад

Security update for nodejs18

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0233-1

11 месяцев назад

Security update for nodejs18

EPSS: Низкий
rocky логотип

RLSA-2025:1582

10 месяцев назад

Moderate: nodejs:18 security update

EPSS: Низкий
rocky логотип

RLSA-2025:1446

11 месяцев назад

Moderate: nodejs:18 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1582

10 месяцев назад

ELSA-2025-1582: nodejs:18 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1446

11 месяцев назад

ELSA-2025-1446: nodejs:18 security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-22150

11 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
EPSS: Низкий
redhat логотип

CVE-2025-22150

11 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2025-22150

11 месяцев назад

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:0284-1

Security update for nodejs22

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0237-1

Security update for nodejs20

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0232-1

Security update for nodejs20

11 месяцев назад
rocky логотип
RLSA-2025:1613

Important: nodejs:22 security update

10 месяцев назад
rocky логотип
RLSA-2025:1611

Important: nodejs:22 security update

10 месяцев назад
rocky логотип
RLSA-2025:1443

Important: nodejs:20 security update

11 месяцев назад
rocky логотип
RLSA-2025:1351

Important: nodejs:20 security update

11 месяцев назад
oracle-oval логотип
ELSA-2025-1613

ELSA-2025-1613: nodejs:22 security update (IMPORTANT)

10 месяцев назад
oracle-oval логотип
ELSA-2025-1611

ELSA-2025-1611: nodejs:22 security update (IMPORTANT)

10 месяцев назад
oracle-oval логотип
ELSA-2025-1443

ELSA-2025-1443: nodejs:20 security update (IMPORTANT)

11 месяцев назад
oracle-oval логотип
ELSA-2025-1351

ELSA-2025-1351: nodejs:20 security update (IMPORTANT)

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0234-1

Security update for nodejs18

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0233-1

Security update for nodejs18

11 месяцев назад
rocky логотип
RLSA-2025:1582

Moderate: nodejs:18 security update

10 месяцев назад
rocky логотип
RLSA-2025:1446

Moderate: nodejs:18 security update

11 месяцев назад
oracle-oval логотип
ELSA-2025-1582

ELSA-2025-1582: nodejs:18 security update (MODERATE)

10 месяцев назад
oracle-oval логотип
ELSA-2025-1446

ELSA-2025-1446: nodejs:18 security update (MODERATE)

11 месяцев назад
ubuntu логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
0%
Низкий
11 месяцев назад
redhat логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
0%
Низкий
11 месяцев назад
nvd логотип
CVE-2025-22150

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.

CVSS3: 6.8
0%
Низкий
11 месяцев назад

Уязвимостей на страницу