296,172
Total vulnerabilities in the database
websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.
Software | From | Fixed in |
---|---|---|
websocket-extensions_project / websocket-extensions | - | 0.1.5 |
debian / debian_linux | 9.0 | 9.0.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 20.04 | 20.04.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
![]() |
- | 0.1.5 |