Количество 2
Количество 2
CVE-2023-26103
Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server.
GHSA-jc97-h3h9-7xh6
Regular Expression Denial of Service in Deno.upgradeWebSocket API
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-26103 Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server. | CVSS3: 5.3 | 0% Низкий | почти 3 года назад | |
GHSA-jc97-h3h9-7xh6 Regular Expression Denial of Service in Deno.upgradeWebSocket API | CVSS3: 5.3 | 0% Низкий | почти 3 года назад |
Уязвимостей на страницу