Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3213 | Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability. |
Github GHSA |
GHSA-7q7g-4xm8-89cq | Regular Expression Denial of Service (ReDoS) in @eslint/plugin-kit |
Tue, 19 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eslint
Eslint rewrite |
|
| Weaknesses | CWE-770 | |
| CPEs | cpe:2.3:a:eslint:rewrite:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Eslint
Eslint rewrite |
|
| Metrics |
ssvc
|
Tue, 19 Nov 2024 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability. | |
| Weaknesses | CWE-1333 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-11-19T15:18:10.708Z
Reserved: 2023-12-22T12:33:20.123Z
Link: CVE-2024-21539
Updated: 2024-11-19T15:17:21.488Z
Status : Deferred
Published: 2024-11-19T05:15:16.453
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-21539
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA