Логотип exploitDog
bind:CVE-2023-26103
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26103

Количество 2

Количество 2

nvd логотип

CVE-2023-26103

почти 3 года назад

Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-jc97-h3h9-7xh6

почти 3 года назад

Regular Expression Denial of Service in Deno.upgradeWebSocket API

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26103

Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
github логотип
GHSA-jc97-h3h9-7xh6

Regular Expression Denial of Service in Deno.upgradeWebSocket API

CVSS3: 5.3
0%
Низкий
почти 3 года назад

Уязвимостей на страницу