Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3561-1 | node-cookiejar security update |
EUVD |
EUVD-2023-0478 | Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression. |
Github GHSA |
GHSA-h452-7996-h45h | cookiejar Regular Expression Denial of Service via Cookie.parse function |
Thu, 03 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression. | Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression. |
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-04-03T19:33:00.360Z
Reserved: 2022-02-24T11:58:22.541Z
Link: CVE-2022-25901
Updated: 2024-08-03T04:49:44.454Z
Status : Modified
Published: 2023-01-18T05:15:11.860
Modified: 2025-02-13T17:15:39.400
Link: CVE-2022-25901
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA