Show filters
73 Total Results
Displaying 31-40 of 73
Sort by:
Attacker Value
Unknown
CVE-2022-25598
Disclosure Date: March 30, 2022 (last updated February 23, 2025)
Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Service (ReDoS) attacks, Apache DolphinScheduler users should upgrade to version 2.0.5 or higher.
0
Attacker Value
Unknown
CVE-2022-24729
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the `dialog` plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds.
0
Attacker Value
Unknown
CVE-2022-24713
Disclosure Date: March 08, 2022 (last updated February 23, 2025)
regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex cr…
0
Attacker Value
Unknown
CVE-2022-21681
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
0
Attacker Value
Unknown
CVE-2022-21680
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
0
Attacker Value
Unknown
CVE-2022-21670
Disclosure Date: January 10, 2022 (last updated February 23, 2025)
markdown-it is a Markdown parser. Prior to version 1.3.2, special patterns with length greater than 50 thousand characterss could slow down the parser significantly. Users should upgrade to version 12.3.2 to receive a patch. There are no known workarounds aside from upgrading.
0
Attacker Value
Unknown
CVE-2021-3842
Disclosure Date: January 04, 2022 (last updated February 23, 2025)
nltk is vulnerable to Inefficient Regular Expression Complexity
0
Attacker Value
Unknown
CVE-2021-41817
Disclosure Date: January 01, 2022 (last updated February 23, 2025)
Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.
0
Attacker Value
Unknown
CVE-2021-23490
Disclosure Date: December 24, 2021 (last updated February 23, 2025)
The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function.
0
Attacker Value
Unknown
CVE-2021-45470
Disclosure Date: December 23, 2021 (last updated February 23, 2025)
lib/DatabaseLayer.py in cve-search before 4.1.0 allows regular expression injection, which can lead to ReDoS (regular expression denial of service) or other impacts.
0