Show filters
32 Total Results
Displaying 1-10 of 32
Sort by:
Attacker Value
Unknown
CVE-2024-45338
Disclosure Date: December 18, 2024 (last updated February 23, 2025)
An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.
0
Attacker Value
Unknown
CVE-2021-39940
Disclosure Date: December 13, 2021 (last updated February 23, 2025)
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab Maven Package registry is vulnerable to a regular expression denial of service when a specifically crafted string is sent.
0
Attacker Value
Unknown
CVE-2021-39933
Disclosure Date: December 13, 2021 (last updated February 23, 2025)
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression used for handling user input (notes, comments, etc) was susceptible to catastrophic backtracking that could cause a DOS attack.
0
Attacker Value
Unknown
CVE-2021-43805
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
Solidus is a free, open-source ecommerce platform built on Rails. Versions of Solidus prior to 3.1.4, 3.0.4, and 2.11.13 have a denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.` Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression. The maintainers added a check for email addresses that are no longer valid that will print information about any affected orders that exist. If a prompt upgrade is not an option, a workaround is available. It is possible to edit the file `config/application.rb` manually (with code provided by the maintainers in the GitHub Security Advisory) to check email validity.
0
Attacker Value
Unknown
CVE-2021-3765
Disclosure Date: November 02, 2021 (last updated February 23, 2025)
validator.js is vulnerable to Inefficient Regular Expression Complexity
0
Attacker Value
Unknown
CVE-2021-41115
Disclosure Date: October 07, 2021 (last updated February 23, 2025)
Zulip is an open source team chat server. In affected versions Zulip allows organization administrators on a server to configure "linkifiers" that automatically create links from messages that users send, detected via arbitrary regular expressions. Malicious organization administrators could subject the server to a denial-of-service via regular expression complexity attacks; most simply, by configuring a quadratic-time regular expression in a linkifier, and sending messages that exploited it. A regular expression attempted to parse the user-provided regexes to verify that they were safe from ReDoS -- this was both insufficient, as well as _itself_ subject to ReDoS if the organization administrator entered a sufficiently complex invalid regex. Affected users should [upgrade to the just-released Zulip 4.7](https://zulip.readthedocs.io/en/latest/production/upgrade-or-modify.html#upgrading-to-a-release), or [`main`](https://zulip.readthedocs.io/en/latest/production/upgrade-or-modify.html#…
0
Attacker Value
Unknown
CVE-2021-23446
Disclosure Date: September 29, 2021 (last updated February 23, 2025)
The package handsontable before 10.0.0; the package handsontable from 0 and before 10.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) in Handsontable.helper.isNumeric function.
0
Attacker Value
Unknown
CVE-2021-3822
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
jsoneditor is vulnerable to Inefficient Regular Expression Complexity
0
Attacker Value
Unknown
CVE-2021-3820
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
inflect is vulnerable to Inefficient Regular Expression Complexity
0
Attacker Value
Unknown
CVE-2021-3828
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
nltk is vulnerable to Inefficient Regular Expression Complexity
0