Количество 7
Количество 7
BDU:2024-02397
Уязвимость функции lines_with_leading_tabs_expanded() файла strings.py программного средства форматирования Python-кода Black, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2024-21503
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.
CVE-2024-21503
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.
CVE-2024-21503
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.
CVE-2024-21503
Versions of the package black before 24.3.0 are vulnerable to Regular ...
SUSE-SU-2024:2481-1
Security update for python-black
GHSA-fj7x-q9j7-g6q6
Black vulnerable to Regular Expression Denial of Service (ReDoS)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2024-02397 Уязвимость функции lines_with_leading_tabs_expanded() файла strings.py программного средства форматирования Python-кода Black, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
CVE-2024-21503 Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings. | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
CVE-2024-21503 Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings. | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
CVE-2024-21503 Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings. | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
CVE-2024-21503 Versions of the package black before 24.3.0 are vulnerable to Regular ... | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
SUSE-SU-2024:2481-1 Security update for python-black | 0% Низкий | больше 1 года назад | ||
GHSA-fj7x-q9j7-g6q6 Black vulnerable to Regular Expression Denial of Service (ReDoS) | CVSS3: 5.3 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу