Description
The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3350-1 | node-css-what security update |
EUVD |
EUVD-2022-7138 | The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function. |
Github GHSA |
GHSA-p28h-cc7q-c4fg | css-what vulnerable to ReDoS due to use of insecure regular expression |
Ubuntu USN |
USN-6065-1 | css-what vulnerabilities |
References
History
Tue, 20 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-05-20T16:04:07.202Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-21222
Updated: 2024-08-03T02:31:59.016Z
Status : Modified
Published: 2022-09-30T05:15:08.713
Modified: 2025-05-20T16:15:21.037
Link: CVE-2022-21222
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN