The debug module is vulnerable to regular expression denial of service due to untrusted user input passed into the 'o' formatter, causing a 2-second block with 50k characters
Reporter | Title | Published | Views | Family All 23 |
---|---|---|---|---|
![]() | RHEL 8 : nodejs-debug (Unpatched Vulnerability) | 11 May 202400:00 | – | nessus |
![]() | CVE-2017-16137 | 7 Jun 201802:29 | – | cve |
![]() | CVE-2017-16137 | 7 Jun 201802:29 | – | osv |
![]() | Regular Expression Denial of Service in debug | 9 Aug 201820:18 | – | osv |
![]() | Regular Expression Denial of Service in debug | 9 Aug 201820:18 | – | github |
![]() | Regular Expression Denial of Service | 25 Sep 201718:55 | – | nodejs |
![]() | CVE-2017-16137 | 7 Jun 201802:00 | – | cvelist |
![]() | Regular Expression Denial Of Service (ReDoS) | 18 Sep 201706:28 | – | veracode |
![]() | Input validation | 7 Jun 201802:29 | – | prion |
![]() | CVE-2017-16137 | 7 Jun 201800:00 | – | ubuntucve |
Source | Link |
---|---|
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo