The parsejson module is vulnerable to regular expression denial of service due to untrusted user input
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | CVE-2017-16113 | 7 Jun 201802:00 | – | cvelist |
![]() | Regular Expression Denial of Service | 8 Sep 201720:43 | – | nodejs |
![]() | Regular Expression Denial Of Service (ReDoS) | 22 Sep 201708:07 | – | veracode |
![]() | CVE-2017-16113 | 7 Jun 201802:29 | – | nvd |
![]() | Regular Expression Denial of Service in parsejson | 24 Jul 201820:11 | – | osv |
![]() | CVE-2017-16113 | 7 Jun 201802:29 | – | cve |
![]() | Input validation | 7 Jun 201802:29 | – | prion |
![]() | Regular Expression Denial of Service in parsejson | 24 Jul 201820:11 | – | github |
Source | Link |
---|---|
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo