7.5
CVE-2021-32838
- EPSS 1.37%
- Published 20.09.2021 18:15:11
- Last modified 21.11.2024 06:07:51
- Source security-advisories@github.com
- CVE-Watchlists
- Open
Flask-RESTX (pypi package flask-restx) is a community driven fork of Flask-RESTPlus. Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex. This is fixed in version 0.5.1.
Data is provided by the National Vulnerability Database (NVD)
	Flask-restx Project ≫ Flask-restx SwPlatformpython Version < 0.5.1
	Fedoraproject ≫ Fedora Version33 
	Fedoraproject ≫ Fedora Version34 
| Type | Source | Score | Percentile | 
|---|---|---|---|
| EPSS | FIRST.org | 1.37% | 0.784 | 
| Source | Base Score | Exploit Score | Impact Score | Vector string | 
|---|---|---|---|---|
| nvd@nist.gov | 5 | 10 | 2.9 | AV:N/AC:L/Au:N/C:N/I:N/A:P  | 
| security-advisories@github.com | 7.5 | 3.9 | 3.6 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H  | 
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.