CVE-2015-8851

node-uuid before 1.4.4 uses insufficiently random data to create a GUID, which could make it easier for attackers to have unspecified impact via brute force guessing.
Configurations

Configuration 1 (hide)

cpe:2.3:a:node-uuid_project:node-uuid:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 02:39

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2016/04/13/8 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/04/13/8 - Mailing List, Patch, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1327056 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1327056 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d - Patch () https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d - Patch
References () https://nodesecurity.io/advisories/93 - Third Party Advisory () https://nodesecurity.io/advisories/93 - Third Party Advisory

Information

Published : 2020-01-30 21:15

Updated : 2024-11-21 02:39


NVD link : CVE-2015-8851

Mitre link : CVE-2015-8851

CVE.ORG link : CVE-2015-8851


JSON object : View

Products Affected

node-uuid_project

  • node-uuid
CWE
CWE-331

Insufficient Entropy