CWE-1333
High likelihoodInefficient Regular Expression Complexity
The product uses a regular expression with a worst-case computational complexity that is inefficient and possibly exponential.
410 vulnerabilities with CWE-1333
CVE-2021-4299
MEDIUM
cronvel string-kit <0.12.8 - Info Disclosure
CVSS 4.3
CVE-2021-35065
HIGH
glob-parent <6.0.1 - DoS
CVSS 7.5
CVE-2021-43309
MEDIUM
uri-template-lite - DoS
CVSS 5.9
CVE-2021-40901
HIGH
scniro-validator v1.0.1 - DoS
CVSS 7.5
CVE-2021-40900
HIGH
regexfn 1.0.5 - DoS
CVSS 7.5
CVE-2021-40899
HIGH
repo-git-downloader <0.1.1 - DoS
CVSS 7.5
CVE-2021-40898
HIGH
scaffold-helper <1.2.0 - DoS
CVSS 7.5
CVE-2021-40897
HIGH
split-html-to-chars <1.0.5 - DoS
CVSS 7.5
CVE-2021-40896
HIGH
that-value 0.1.3 - DoS
CVSS 7.5
CVE-2021-40895
HIGH
todo-regex <0.1.1 - DoS
CVSS 7.5
CVE-2021-40894
HIGH
underscore-99xp <1.7.2 - DoS
CVSS 7.5
CVE-2021-40893
HIGH
validate-data <0.1.1 - DoS
CVSS 7.5
CVE-2021-40892
HIGH
validate-color <2.1.0 - DoS
CVSS 7.5
CVE-2021-46823
MEDIUM
python-ldap <3.4.0 - DoS
CVSS 6.5
CVE-2021-40660
HIGH
Delight Nashorn Sandbox <0.2.0 - DoS
CVSS 7.5
CVE-2021-43308
MEDIUM
markdown-link-extractor - DoS
CVSS 5.9
CVE-2021-43307
MEDIUM
semver-regex - DoS
CVSS 5.9
CVE-2021-43306
MEDIUM
jquery-validation - DoS
CVSS 5.9
CVE-2021-3842
HIGH
nltk - Code Injection
CVSS 7.5
CVE-2021-41817
HIGH
Ruby-lang Date < 2.0.1 - Denial of Service
CVSS 7.5
CVE-2021-23490
HIGH
Parse-link-header < 2.0.0 - Denial of Service
CVSS 7.5
CVE-2021-45470
HIGH
Circl Cve-search < 4.1.0 - Denial of Service
CVSS 7.5
CVE-2021-43843
MEDIUM
jsx-slack <4.5.1 - DoS
CVSS 5.3
CVE-2021-43838
MEDIUM
jsx-slack <4.5.1 - DoS
CVSS 5.3
CVE-2021-39940
MEDIUM
Gitlab < 14.3.6 - Denial of Service
CVSS 4.3
Details
Vulnerabilities
410
Exploit Likelihood
High