| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| An issue was discovered in Delight Nashorn Sandbox 0.2.0. There is an ReDoS vulnerability that can be exploited to launching a denial of service (DoS) attack. |
| nltk is vulnerable to Inefficient Regular Expression Complexity |
| nltk is vulnerable to Inefficient Regular Expression Complexity |
| jsoneditor is vulnerable to Inefficient Regular Expression Complexity |
| inflect is vulnerable to Inefficient Regular Expression Complexity |
| code-server is vulnerable to Inefficient Regular Expression Complexity |
| ansi-regex is vulnerable to Inefficient Regular Expression Complexity |
| taro is vulnerable to Inefficient Regular Expression Complexity |
| nth-check is vulnerable to Inefficient Regular Expression Complexity |
| prism is vulnerable to Inefficient Regular Expression Complexity |
| semver-regex is vulnerable to Inefficient Regular Expression Complexity |
| nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity |
| validator.js is vulnerable to Inefficient Regular Expression Complexity |
| axios is vulnerable to Inefficient Regular Expression Complexity |
| chatwoot is vulnerable to Inefficient Regular Expression Complexity |
| An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab Maven Package registry is vulnerable to a regular expression denial of service when a specifically crafted string is sent. |
| An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression used for handling user input (notes, comments, etc) was susceptible to catastrophic backtracking that could cause a DOS attack. |
| The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs. |
| The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time. |
| In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service. |