Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1335 | Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server. |
Github GHSA |
GHSA-jc97-h3h9-7xh6 | Regular Expression Denial of Service in Deno.upgradeWebSocket API |
Tue, 11 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-03-11T15:31:01.247Z
Reserved: 2023-02-20T10:28:48.921Z
Link: CVE-2023-26103
Updated: 2024-08-02T11:39:06.569Z
Status : Modified
Published: 2023-02-25T05:15:12.343
Modified: 2025-03-11T16:15:14.263
Link: CVE-2023-26103
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA