Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability.
History

Tue, 19 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Eslint
Eslint rewrite
Weaknesses CWE-770
CPEs cpe:2.3:a:eslint:rewrite:*:*:*:*:*:*:*:*
Vendors & Products Eslint
Eslint rewrite
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 Nov 2024 05:15:00 +0000

Type Values Removed Values Added
Description Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability.
Weaknesses CWE-1333
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2024-11-19T05:00:02.929Z

Updated: 2024-11-19T15:18:10.708Z

Reserved: 2023-12-22T12:33:20.123Z

Link: CVE-2024-21539

cve-icon Vulnrichment

Updated: 2024-11-19T15:17:21.488Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-19T05:15:16.453

Modified: 2024-11-19T21:57:32.967

Link: CVE-2024-21539

cve-icon Redhat

No data.