CWE-1333

High likelihood

Inefficient Regular Expression Complexity

Parent: CWE-407 - Inefficient Algorithmic Complexity

The product uses a regular expression with a worst-case computational complexity that is inefficient and possibly exponential.

410 vulnerabilities with CWE-1333
CVE-2024-36751 MEDIUM
parse-uri <1.0.9 - DoS
CVSS 6.5
CVE-2024-46242 HIGH
CTFd <3.7.3 - ReDoS
CVSS 7.5
CVE-2024-41766 HIGH
IBM Engineering Lifecycle Optimization Publishing - Denial of Service
CVSS 7.5
CVE-2024-45338 MEDIUM
Product - DoS
CVSS 5.3
CVE-2024-52798 HIGH
path-to-regexp <0.1.12 - Info Disclosure
CVE-2024-54157 MEDIUM
JetBrains YouTrack <2024.3.52635 - DoS
CVSS 4.3
CVE-2024-10270 MEDIUM
Keycloak-services - DoS
CVSS 6.5
CVE-2024-21539 HIGH
Eslint Plugin-kit < 0.2.3 - Denial of Service
CVSS 7.5
CVE-2024-52524 MEDIUM
Pypi Giskard < 2.15.5 - Remote Code Execution
CVE-2024-21538 HIGH
NPM Cross-spawn < 7.0.5 - Denial of Service
CVSS 7.5
CVE-2024-49761 HIGH
REXML <3.3.9 - ReDoS
CVSS 7.5
CVE-2024-50574 MEDIUM
Jetbrains Youtrack < 2024.3.47707 - Denial of Service
CVSS 5.3
CVE-2024-47889 MEDIUM
Rubygems Actionmailer < 6.1.7.9 - Denial of Service
CVE-2024-47888 MEDIUM
Rubygems Actiontext < 6.1.7.9 - Denial of Service
CVE-2024-47887 MEDIUM
Rubygems Actionpack < 6.1.7.9 - Denial of Service
CVE-2024-9506 LOW
NPM Vue < 3.0.0-alpha.0 - Denial of Service
CVSS 3.7
CVE-2024-48938 HIGH
Znuny < 6.1.0 - Denial of Service
CVSS 7.5
CVE-2024-25885 HIGH
Pypi Xhtml2pdf - Denial of Service
CVSS 7.5
CVE-2024-9277 LOW
Langflow <1.0.18 - Info Disclosure
CVSS 3.5
CVE-2024-45813 MEDIUM
NPM Find-my-way < 8.2.2 - Denial of Service
CVSS 5.3
CVE-2024-45801 HIGH
Cure53 Dompurify < 2.5.4 - XSS
CVSS 7.3
CVE-2024-8124 HIGH
GitLab CE/EE <17.1.7-17.3.2 - DoS
CVSS 7.5
CVE-2024-45296 HIGH
path-to-regexp <0.1 - DoS
CVSS 7.5
CVE-2024-6232 HIGH
CPython - ReDoS
CVSS 7.5
CVE-2024-7592 HIGH
CPython - Info Disclosure
CVSS 7.5
Details
Vulnerabilities 410
Exploit Likelihood High