CWE-1333
High likelihoodInefficient Regular Expression Complexity
The product uses a regular expression with a worst-case computational complexity that is inefficient and possibly exponential.
410 vulnerabilities with CWE-1333
CVE-2023-2199
HIGH
GitLab CE/EE <15.10.8/<16.0.2 - DoS
CVSS 7.5
CVE-2023-2198
HIGH
GitLab CE/EE <15.10.8/<16.0.2 - DoS
CVSS 7.5
CVE-2023-34104
HIGH
fast-xml-parser - DoS
CVSS 7.5
CVE-2023-31606
HIGH
redcloth gem <4.0.0 - DoS
CVSS 7.5
CVE-2023-2132
HIGH
GitLab CE/EE <15.10.8/<15.11.7/<16.0.2 - DoS
CVSS 7.5
CVE-2023-33950
MEDIUM
Liferay Portal/DXP 7.4.3.48-7.4.3.76 - DoS
CVSS 6.5
CVE-2023-32758
HIGH
Coala Git-url-parse < 1.2.2 - Denial of Service
CVSS 7.5
CVE-2023-1894
MEDIUM
Puppet Server 7.9.2 - DoS
CVSS 5.3
CVE-2023-30858
MEDIUM
Denosaurs <0.3.0 - Info Disclosure
CVSS 5.3
CVE-2023-30608
MEDIUM
Sqlparse < 0.4.4 - Denial of Service
CVSS 5.5
CVE-2023-27704
MEDIUM
Voidtools Everything < 1.4.1.1022 - Denial of Service
CVSS 5.5
CVE-2023-26112
LOW
configobj - ReDoS
CVSS 3.7
CVE-2023-28756
MEDIUM
Ruby <3.2.1 - DoS
CVSS 5.3
CVE-2023-28755
MEDIUM
Ruby <3.2.1 - DoS
CVSS 5.3
CVE-2023-26118
MEDIUM
Angular <1.4.9 - ReDoS
CVSS 5.3
CVE-2023-26117
MEDIUM
Angular <1.0.0 - ReDoS
CVSS 5.3
CVE-2023-26116
MEDIUM
Angular <1.2.21 - ReDoS
CVSS 5.3
CVE-2023-26103
MEDIUM
Deno <1.31.0 - DoS
CVSS 5.3
CVE-2023-24807
HIGH
Undici <5.19.1 - ReDoS
CVSS 7.5
CVE-2023-22799
HIGH
Rubyonrails Globalid < 1.0.1 - Denial of Service
CVSS 7.5
CVE-2023-22796
HIGH
Activesupport < 6.1.7.1 - Denial of Service
CVSS 7.5
CVE-2023-22795
HIGH
Rails < 6.1.7.1 - Denial of Service
CVSS 7.5
CVE-2023-22792
HIGH
Rails < 6.0.6.1 - Denial of Service
CVSS 7.5
CVE-2023-25167
MEDIUM
Discourse < 3.0.1 - Denial of Service
CVSS 6.5
CVE-2023-25166
MEDIUM
Hapi Formula < 3.0.1 - Denial of Service
CVSS 5.5
Details
Vulnerabilities
410
Exploit Likelihood
High