Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-13863

Опубликовано: 10 июл. 2018
Источник: debian
EPSS Низкий

Описание

The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-mongodbfixed3.1.10+~3.1.9-1package

Примечания

  • https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a (1.0.5)

EPSS

Процентиль: 59%
0.00387
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.

CVSS3: 3.7
redhat
почти 8 лет назад

The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.

CVSS3: 7.5
nvd
больше 7 лет назад

The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.

CVSS3: 7.5
github
больше 7 лет назад

js-bson vulnerable to REDoS

EPSS

Процентиль: 59%
0.00387
Низкий