Логотип exploitDog
bind:"GHSA-952p-6rrq-rcjv" OR bind:"CVE-2024-4067"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-952p-6rrq-rcjv" OR bind:"CVE-2024-4067"

Количество 9

Количество 9

github логотип

GHSA-952p-6rrq-rcjv

около 1 года назад

Regular Expression Denial of Service (ReDoS) in micromatch

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2024-4067

около 1 года назад

The NPM package `micromatch` is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2024-4067

больше 1 года назад

The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-4067

около 1 года назад

The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2024-4067

около 1 года назад

EPSS: Низкий
debian логотип

CVE-2024-4067

около 1 года назад

The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular E ...

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-09421

больше 1 года назад

Уязвимость библиотеки micromatch, связанная с неэффективной сложностью регулярных выражений, позволяющая нарушителю получить вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20241029-08

8 месяцев назад

Множественные уязвимости opensearch

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3771-1

8 месяцев назад

Security update for pgadmin4

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-952p-6rrq-rcjv

Regular Expression Denial of Service (ReDoS) in micromatch

CVSS3: 5.3
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-4067

The NPM package `micromatch` is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching.

CVSS3: 5.3
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-4067

The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-4067

The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.

CVSS3: 5.3
0%
Низкий
около 1 года назад
msrc логотип
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-4067

The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular E ...

CVSS3: 5.3
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-09421

Уязвимость библиотеки micromatch, связанная с неэффективной сложностью регулярных выражений, позволяющая нарушителю получить вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
больше 1 года назад
redos логотип
ROS-20241029-08

Множественные уязвимости opensearch

CVSS3: 7.5
8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3771-1

Security update for pgadmin4

8 месяцев назад

Уязвимостей на страницу