Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-3213 | Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability. |
![]() |
GHSA-7q7g-4xm8-89cq | Regular Expression Denial of Service (ReDoS) in @eslint/plugin-kit |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 19 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Eslint
Eslint rewrite |
|
Weaknesses | CWE-770 | |
CPEs | cpe:2.3:a:eslint:rewrite:*:*:*:*:*:*:*:* | |
Vendors & Products |
Eslint
Eslint rewrite |
|
Metrics |
ssvc
|
Tue, 19 Nov 2024 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability. | |
Weaknesses | CWE-1333 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-11-19T15:18:10.708Z
Reserved: 2023-12-22T12:33:20.123Z
Link: CVE-2024-21539

Updated: 2024-11-19T15:17:21.488Z

Status : Awaiting Analysis
Published: 2024-11-19T05:15:16.453
Modified: 2024-11-19T21:57:32.967
Link: CVE-2024-21539

No data.

No data.