{"id":"CVE-2017-16137","details":"The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.","aliases":["GHSA-gxpj-cx7g-858c"],"modified":"2026-04-02T00:07:40.691533Z","published":"2018-06-07T02:29:03.817Z","related":["CGA-48v6-3vvp-93xw"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3%40%3Ccommits.netbeans.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63%40%3Cnotifications.netbeans.apache.org%3E"},{"type":"ADVISORY","url":"https://github.com/visionmedia/debug/issues/501"},{"type":"ADVISORY","url":"https://nodesecurity.io/advisories/534"},{"type":"FIX","url":"https://github.com/visionmedia/debug/pull/504"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/debug-js/debug","events":[{"introduced":"c61ae82bde19c6fdedfc6684817ff7eb541ff029"},{"fixed":"13abeae468fea297d0dccc50bc55590809241083"},{"introduced":"52b894cd798f492ead1866fca4d76a649f0e62c6"},{"fixed":"f073e056f33efdd5b311381eb6bca2bc850745bf"}],"database_specific":{"versions":[{"introduced":"2.0.0"},{"fixed":"2.6.9"},{"introduced":"3.0.0"},{"fixed":"3.1.0"}]}}],"versions":["2.0.0","2.1.0","2.1.1","2.1.2","2.1.3","2.2.0","2.3.0","2.3.1","2.3.2","2.3.3","2.4.0","2.4.1","2.4.2","2.4.3","2.4.4","2.4.5","2.5.1","2.5.2","2.6.0","2.6.1","2.6.2","2.6.3","2.6.4","2.6.5","2.6.6","2.6.7","2.6.8","3.0.0","3.0.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-16137.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}