5.3
CVE-2018-1107
- EPSS 0.26%
- Veröffentlicht 30.03.2021 02:15:14
- Zuletzt bearbeitet 21.11.2024 03:59:11
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Is-my-json-valid Project ≫ Is-my-json-valid SwPlatformnode.js Version < 1.4.1
Is-my-json-valid Project ≫ Is-my-json-valid SwPlatformnode.js Version >= 2.0.0 < 2.17.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.26% | 0.46 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.