CVE List
-
CVE-2021-40901:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
scniro-validator
versionv1.0.1
when validating crafted invalid emails. -
CVE-2021-40900:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
regexfn
versionv1.0.5
when validating crafted invalid emails. -
CVE-2021-40899:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
repo-git-downloader
versionv0.1.1
when downloading crafted invalid git repositories. -
CVE-2021-40898:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
scaffold-helper
versionv1.2.0
when copying crafted invalid files. -
CVE-2021-40897:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
split-html-to-chars
versionv1.0.5
when splitting crafted invalid htmls. -
CVE-2021-40896:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
that-value
versionv0.1.3
when validating crafted invalid emails. -
CVE-2021-40895:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
todo-regex
versionv0.1.1
when matching crafted invalid TODO statements. -
CVE-2021-40894:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
underscore-99xp
versionv1.7.2
when the deepValueSearch function is called. -
CVE-2021-40893:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
validate-data
versionv0.1.1
when validating crafted invalid emails. -
CVE-2021-40892:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
validate-color
versionv2.1.0
when handling crafted invalid rgb(a) strings. -
CVE-2021-23663:
All versions of package
sey
are vulnerable to Prototype Pollution via thedeepmerge()
function. -
CVE-2021-23561:
All versions of package
comb
are vulnerable to Prototype Pollution via thedeepMerge()
function. -
CVE-2021-23797:
All versions of package
http-server-node
are vulnerable to Directory Traversal via use of--path-as-is
. -
CVE-2021-23700:
All versions of package
merge-deep2
are vulnerable to Prototype Pollution via themergeDeep()
function. -
CVE-2021-3801:
prism
is vulnerable to Inefficient Regular Expression Complexity. -
CVE-2021-3810:
code-server
is vulnerable to Inefficient Regular Expression Complexity. -
CVE-2021-3795:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
semver-regex
when formatting crafted invalid semver versions. -
CVE-2021-3803:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
nth-check
when parsing crafted invalid CSS nth-checks. -
CVE-2021-3807:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
ansi-regex
when matching crafted invalid ANSI escape codes. -
CVE-2021-3765:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
validator.js
when validating crafted invalid MagnetURIs. -
CVE-2021-3777:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
tmpl
versionv1.0.5
when formatting crafted strings. -
CVE-2021-3733:
There's a flaw in
urllib's AbstractBasicAuthHandler
class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. -
CVE-2021-36716:
A ReDoS (regular expression denial of service) flaw was found in the Segment
is-email
package before1.0.1
for Node.js. An attacker that is able to provide crafted input to the isEmail(input) function may cause an application to consume an excessive amount of CPU. -
CVE-2021-23437:
The package
pillow
from0
and before8.3.2
are vulnerable to Regular Expression Denial of Service (ReDoS) via thegetrgb
function. -
CVE-2021-29063:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
Mpmath
versionv1.0.0
when thempmathify
function is called. -
CVE-2021-29061:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
Vfsjfilechooser2
version0.2.9
and below which occurs when the application attempts to validate craftedURIs
. -
CVE-2021-29060:
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in
Color-String
version1.5.5
and below which occurs when the application is provided and checks a crafted invalidHWB
string. -
CVE-2021-29059:
A vulnerability was discovered in
IS-SVG
version4.3.1
and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalidSVG
string. -
CVE-2021-23392:
The package
locutus
before2.0.15
are vulnerable to Regular Expression Denial of Service (ReDoS) via thegopher_parsedir
function. -
CVE-2021-23343:
All versions of package
path-parse
are vulnerable to Regular Expression Denial of Service (ReDoS) viasplitDeviceRe
,splitTailRe
, andsplitPathRe
regular expressions. ReDoS exhibits polynomial worst-case time complexity. -
CVE-2021-23364:
The package
browserslist
from4.0.0
and before4.16.5
are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries. -
CVE-2021-23382:
The package
postcss
before8.2.13
are vulnerable to Regular Expression Denial of Service (ReDoS) viagetAnnotationURL()
andloadAnnotation()
inlib/previous-map.js
. The vulnerable regexes are caused mainly by the sub-pattern\/\*\s*# sourceMappingURL=(.*)
. -
CVE-2021-21391:
Affected versions of several
CKEditor 5
packages are vulnerable to Regular Expression Denial of Service (ReDoS). It allows to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. -
CVE-2021-23368:
The package
postcss
from7.0.0
and before8.2.10
are vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing. -
CVE-2021-23362:
The package
hosted-git-info
before3.0.8
are vulnerable to Regular Expression Denial of Service (ReDoS) via the regular expressionshortcutMatch
in thefromUrl
function inindex.js
. The affected regular expression exhibits polynomial worst-case time complexity. -
CVE-2021-27290:
ssri
5.2.2
-8.0.0
, fixed in8.0.1
, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using thestrict
option. -
CVE-2021-23354:
The package
printf
before0.6.1
are vulnerable to Regular Expression Denial of Service (ReDoS) via the regexFormatter.prototype._re
inlib/printf.js
. The vulnerable regular expression has cubic worst-case time complexity. -
CVE-2021-23353:
This affects the package
jspdf
before2.3.1
. ReDoS is possible via theaddImage
function. -
CVE-2021-23346:
This affects the package
html-parse-stringify
before2.0.1
; all versions of packagehtml-parse-stringify2
. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process. -
CVE-2021-23341:
The package
prismjs
before1.23.0
are vulnerable to Regular Expression Denial of Service (ReDoS) via theprism-asciidoc
,prism-rest
,prism-tap
andprism-eiffel
components. -
CVE-2021-21317:
uap-core
in an open-source npm package which contains the core of BrowserScope's original user agent string parser. Inuap-core
before version0.11.0
, some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. This is fixed in version0.11.0
. Downstream packages such asuap-python
,uap-ruby
etc which depend uponuap-core
follow different version schemes. -
CVE-2020-29651:
A denial of service via regular expression in the
py.path.svnwc
component ofpy
(akapython-py
) through1.9.0
could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality. -
CVE-2020-28500:
All versions of package
lodash
; all versions of packageorg.fujion.webjars:lodash
are vulnerable to Regular Expression Denial of Service (ReDoS) via thetoNumber
,trim
andtrimEnd
functions. -
CVE-2020-28496:
This affects the package
three
before0.125.0
. This can happen when handling rgb or hsl colors. -
CVE-2020-28493:
This affects the package
jinja2
from0.0.0
and before2.11.3
. The ReDoS vulnerability is mainly due to the_punctuation_re regex
operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory. -
CVE-2020-28469:
Affected versions of the package
glob-parent
are vulnerable to Regular Expression Denial of Service (ReDoS). Theenclosure
regex used to check for strings ending in enclosure containing path separator. -
CVE-2020-27511:
An issue was discovered in the
stripTags
andunescapeHTML
components inPrototype
1.7.3
version1.6
and below where an attacker can cause a Regular Expression Denial of Service (ReDOS) through stripping craftedHTML
tags. -
CVE-2020-7793:
The package
ua-parser-js
before0.7.23
are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes. -
CVE-2020-7779:
All versions of package
djvalidator
are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails. -
CVE-2020-7767:
All versions of package
express-validators
are vulnerable to Regular Expression Denial of Service (ReDoS) when validating specifically-crafted invalid urls. -
CVE-2020-7761:
This affects the package
@absolunet/kafe
before3.2.10
. It allows cause a denial of service when validating crafted invalid emails. -
CVE-2020-7760:
This affects the package
codemirror
before5.58.2
; the packageorg.apache.marmotta.webjars:codemirror
before5.58.2
. -
CVE-2020-7755:
All versions of package
dat.gui
are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values. -
CVE-2020-7754:
This affects the package
npm-user-validate
before1.0.1
. The regex that validates user emails took exponentially longer to process long input strings beginning with@
characters. -
CVE-2020-7753:
All versions of package
trim
are vulnerable to Regular Expression Denial of Service (ReDoS) viatrim()
. -
CVE-2020-7733:
The package
ua-parser-js
before0.7.22
are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex forRedmi Phones
andMi Pad Tablets UA
.