Логотип exploitDog
bind:CVE-2025-50537
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-50537

Количество 4

Количество 4

ubuntu логотип

CVE-2025-50537

14 дней назад

Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-50537

14 дней назад

Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-50537

14 дней назад

Stack overflow vulnerability in eslint before 9.26.0 when serializing ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-p5wg-g6qr-c7cg

14 дней назад

Withdrawn Advisory: eslint has a Stack Overflow when serializing objects with circular references

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-50537

Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.

CVSS3: 5.5
0%
Низкий
14 дней назад
nvd логотип
CVE-2025-50537

Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.

CVSS3: 5.5
0%
Низкий
14 дней назад
debian логотип
CVE-2025-50537

Stack overflow vulnerability in eslint before 9.26.0 when serializing ...

CVSS3: 5.5
0%
Низкий
14 дней назад
github логотип
GHSA-p5wg-g6qr-c7cg

Withdrawn Advisory: eslint has a Stack Overflow when serializing objects with circular references

CVSS3: 5.5
0%
Низкий
14 дней назад

Уязвимостей на страницу