Логотип exploitDog
bind:CVE-2026-4926
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-4926

Количество 5

Количество 5

ubuntu логотип

CVE-2026-4926

13 дней назад

Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2026-4926

13 дней назад

Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2026-4926

13 дней назад

Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2026-4926

13 дней назад

Impact: A bad regular expression is generated any time you have multi ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-j3q9-mxjg-w52f

12 дней назад

path-to-regexp vulnerable to Denial of Service via sequential optional groups

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-4926

Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.

CVSS3: 7.5
0%
Низкий
13 дней назад
redhat логотип
CVE-2026-4926

Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.

CVSS3: 7.5
0%
Низкий
13 дней назад
nvd логотип
CVE-2026-4926

Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.

CVSS3: 7.5
0%
Низкий
13 дней назад
debian логотип
CVE-2026-4926

Impact: A bad regular expression is generated any time you have multi ...

CVSS3: 7.5
0%
Низкий
13 дней назад
github логотип
GHSA-j3q9-mxjg-w52f

path-to-regexp vulnerable to Denial of Service via sequential optional groups

CVSS3: 7.5
0%
Низкий
12 дней назад

Уязвимостей на страницу