First published: Fri Dec 30 2011(Updated: )
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google V8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.