First published: Mon Sep 09 2024(Updated: )
pillarjs Path-to-RegExp is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw. By sending a specially crafted regex request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/path-to-regexp | >=4.0.0<6.3.0 | 6.3.0 |
npm/path-to-regexp | >=7.0.0<8.0.0 | 8.0.0 |
npm/path-to-regexp | >=2.0.0<3.3.0 | 3.3.0 |
npm/path-to-regexp | >=0.2.0<1.9.0 | 1.9.0 |
npm/path-to-regexp | <0.1.10 | 0.1.10 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.