### [CVE-2024-27088](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27088) ![](https://img.shields.io/static/v1?label=Product&message=es5-ext&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%200.10.0%2C%20%3C%200.10.63%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%3A%20Uncontrolled%20Resource%20Consumption&color=brighgreen) ### Description es5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into `function#copy` or `function#toStringTokens` may cause the script to stall. The vulnerability is patched in v0.10.63. ### POC #### Reference - https://github.com/medikoo/es5-ext/issues/201 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds