Описание
The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2.1.0-1+deb10u1build0.18.04.1 |
| devel | needs-triage | |
| esm-apps/bionic | released | 2.1.0-1+deb10u1build0.18.04.1 |
| esm-apps/focal | released | 3.2.1-1ubuntu0.1~esm1 |
| esm-apps/jammy | not-affected | 5.1.0-2 |
| esm-apps/noble | needs-triage | |
| esm-apps/xenial | released | 2.1.0-1ubuntu0.16.04.1~esm1 |
| focal | ignored | end of standard support, was needed |
| jammy | not-affected | 5.1.0-2 |
| kinetic | not-affected | 6.1.0-5 |
Показывать по
5.3 Medium
CVSS3
Связанные уязвимости
The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.
The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.
The package css-what before 2.1.3 are vulnerable to Regular Expression ...
css-what vulnerable to ReDoS due to use of insecure regular expression
5.3 Medium
CVSS3