An issue in alanclarke URLite v.3.1.0 allows an attacker to cause a denial of service (DoS) via a crafted payload to the parsing function.
References
Link | Resource |
---|---|
https://gist.github.com/6en6ar/c792d8337b63f095cbda907e834cb4ba | Exploit Third Party Advisory |
https://github.com/alanclarke/urlite/issues/61 | Exploit Issue Tracking |
https://gist.github.com/6en6ar/c792d8337b63f095cbda907e834cb4ba | Exploit Third Party Advisory |
https://github.com/alanclarke/urlite/issues/61 | Exploit Issue Tracking |
Configurations
History
13 Jan 2025, 14:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:alanclarke:urlite:*:*:*:*:*:node.js:*:* | |
First Time |
Alanclarke
Alanclarke urlite |
|
CWE | CWE-1333 | |
References | () https://gist.github.com/6en6ar/c792d8337b63f095cbda907e834cb4ba - Exploit, Third Party Advisory | |
References | () https://github.com/alanclarke/urlite/issues/61 - Exploit, Issue Tracking |
Information
Published : 2024-02-16 09:15
Updated : 2025-01-13 14:28
NVD link : CVE-2023-51931
Mitre link : CVE-2023-51931
CVE.ORG link : CVE-2023-51931
JSON object : View
Products Affected
alanclarke
- urlite