slug is a module to slugify strings, even if they contain unicode. slug is vulnerable to regular expression denial of service is specially crafted untrusted input is passed as input. About 50k characters can block the event loop for 2 seconds.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/dodo/node-slug/issues/82 | Third Party Advisory | 
| https://nodesecurity.io/advisories/537 | Third Party Advisory | 
| https://github.com/dodo/node-slug/issues/82 | Third Party Advisory | 
| https://nodesecurity.io/advisories/537 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/dodo/node-slug/issues/82 - Third Party Advisory | |
| References | () https://nodesecurity.io/advisories/537 - Third Party Advisory | 
Information
                Published : 2018-06-07 02:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-16117
Mitre link : CVE-2017-16117
CVE.ORG link : CVE-2017-16117
JSON object : View
Products Affected
                slug_project
- slug
CWE
                
                    
                        
                        CWE-400
                        
            Uncontrolled Resource Consumption
