CVE-2011-5037
30.12.2011, 01:55
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.Enginsight
Vendor | Product | Version |
---|---|---|
v8 | * |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
libv8 |
| ||||||||||||||||||||||||||||||
libv8-3.14 |
|
Common Weakness Enumeration
References