漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects
Vulnerability Description
Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Vulnerability Title
Serialize JavaScript 安全漏洞
Vulnerability Description
Serialize JavaScript是Yahoo开源的一个将 JavaScript 序列化为包含正则表达式和函数的 JSON 超集。 Serialize JavaScript 7.0.5之前版本存在安全漏洞,该漏洞源于序列化特制的类数组对象时进入消耗100% CPU的密集循环,可能导致拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A