CWE-1333

High likelihood

Inefficient Regular Expression Complexity

Parent: CWE-407 - Inefficient Algorithmic Complexity

The product uses a regular expression with a worst-case computational complexity that is inefficient and possibly exponential.

410 vulnerabilities with CWE-1333
CVE-2021-4299 MEDIUM
cronvel string-kit <0.12.8 - Info Disclosure
CVSS 4.3
CVE-2021-35065 HIGH
glob-parent <6.0.1 - DoS
CVSS 7.5
CVE-2021-43309 MEDIUM
uri-template-lite - DoS
CVSS 5.9
CVE-2021-40901 HIGH
scniro-validator v1.0.1 - DoS
CVSS 7.5
CVE-2021-40900 HIGH
regexfn 1.0.5 - DoS
CVSS 7.5
CVE-2021-40899 HIGH
repo-git-downloader <0.1.1 - DoS
CVSS 7.5
CVE-2021-40898 HIGH
scaffold-helper <1.2.0 - DoS
CVSS 7.5
CVE-2021-40897 HIGH
split-html-to-chars <1.0.5 - DoS
CVSS 7.5
CVE-2021-40896 HIGH
that-value 0.1.3 - DoS
CVSS 7.5
CVE-2021-40895 HIGH
todo-regex <0.1.1 - DoS
CVSS 7.5
CVE-2021-40894 HIGH
underscore-99xp <1.7.2 - DoS
CVSS 7.5
CVE-2021-40893 HIGH
validate-data <0.1.1 - DoS
CVSS 7.5
CVE-2021-40892 HIGH
validate-color <2.1.0 - DoS
CVSS 7.5
CVE-2021-46823 MEDIUM
python-ldap <3.4.0 - DoS
CVSS 6.5
CVE-2021-40660 HIGH
Delight Nashorn Sandbox <0.2.0 - DoS
CVSS 7.5
CVE-2021-43308 MEDIUM
markdown-link-extractor - DoS
CVSS 5.9
CVE-2021-43307 MEDIUM
semver-regex - DoS
CVSS 5.9
CVE-2021-43306 MEDIUM
jquery-validation - DoS
CVSS 5.9
CVE-2021-3842 HIGH
nltk - Code Injection
CVSS 7.5
CVE-2021-41817 HIGH
Ruby-lang Date < 2.0.1 - Denial of Service
CVSS 7.5
CVE-2021-23490 HIGH
Parse-link-header < 2.0.0 - Denial of Service
CVSS 7.5
CVE-2021-45470 HIGH
Circl Cve-search < 4.1.0 - Denial of Service
CVSS 7.5
CVE-2021-43843 MEDIUM
jsx-slack <4.5.1 - DoS
CVSS 5.3
CVE-2021-43838 MEDIUM
jsx-slack <4.5.1 - DoS
CVSS 5.3
CVE-2021-39940 MEDIUM
Gitlab < 14.3.6 - Denial of Service
CVSS 4.3
Details
Vulnerabilities 410
Exploit Likelihood High