CWE-1333
High likelihoodInefficient Regular Expression Complexity
The product uses a regular expression with a worst-case computational complexity that is inefficient and possibly exponential.
410 vulnerabilities with CWE-1333
CVE-2024-36751
MEDIUM
parse-uri <1.0.9 - DoS
CVSS 6.5
CVE-2024-46242
HIGH
CTFd <3.7.3 - ReDoS
CVSS 7.5
CVE-2024-41766
HIGH
IBM Engineering Lifecycle Optimization Publishing - Denial of Service
CVSS 7.5
CVE-2024-45338
MEDIUM
Product - DoS
CVSS 5.3
CVE-2024-52798
HIGH
path-to-regexp <0.1.12 - Info Disclosure
CVE-2024-54157
MEDIUM
JetBrains YouTrack <2024.3.52635 - DoS
CVSS 4.3
CVE-2024-10270
MEDIUM
Keycloak-services - DoS
CVSS 6.5
CVE-2024-21539
HIGH
Eslint Plugin-kit < 0.2.3 - Denial of Service
CVSS 7.5
CVE-2024-52524
MEDIUM
Pypi Giskard < 2.15.5 - Remote Code Execution
CVE-2024-21538
HIGH
NPM Cross-spawn < 7.0.5 - Denial of Service
CVSS 7.5
CVE-2024-49761
HIGH
REXML <3.3.9 - ReDoS
CVSS 7.5
CVE-2024-50574
MEDIUM
Jetbrains Youtrack < 2024.3.47707 - Denial of Service
CVSS 5.3
CVE-2024-47889
MEDIUM
Rubygems Actionmailer < 6.1.7.9 - Denial of Service
CVE-2024-47888
MEDIUM
Rubygems Actiontext < 6.1.7.9 - Denial of Service
CVE-2024-47887
MEDIUM
Rubygems Actionpack < 6.1.7.9 - Denial of Service
CVE-2024-9506
LOW
NPM Vue < 3.0.0-alpha.0 - Denial of Service
CVSS 3.7
CVE-2024-48938
HIGH
Znuny < 6.1.0 - Denial of Service
CVSS 7.5
CVE-2024-25885
HIGH
Pypi Xhtml2pdf - Denial of Service
CVSS 7.5
CVE-2024-9277
LOW
Langflow <1.0.18 - Info Disclosure
CVSS 3.5
CVE-2024-45813
MEDIUM
NPM Find-my-way < 8.2.2 - Denial of Service
CVSS 5.3
CVE-2024-45801
HIGH
Cure53 Dompurify < 2.5.4 - XSS
CVSS 7.3
CVE-2024-8124
HIGH
GitLab CE/EE <17.1.7-17.3.2 - DoS
CVSS 7.5
CVE-2024-45296
HIGH
path-to-regexp <0.1 - DoS
CVSS 7.5
CVE-2024-6232
HIGH
CPython - ReDoS
CVSS 7.5
CVE-2024-7592
HIGH
CPython - Info Disclosure
CVSS 7.5
Details
Vulnerabilities
410
Exploit Likelihood
High