Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Google V8输入验证漏洞
Vulnerability Description
Google V8中存在漏洞,由于计算哈希值时未限制可预测的触发哈希冲突的能力。远程攻击者可通过发送许多特制的参数导致拒绝服务(CPU消耗)。
CVSS Information
N/A
Vulnerability Type
N/A