Количество 4
Количество 4
CVE-2018-1107
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
CVE-2018-1107
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
GHSA-4hpf-3wq7-5rpr
Regular expression deinal of service (ReDoS) in is-my-json-valid
BDU:2024-01507
Уязвимость библиотеки is-my-json-valid програмной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-1107 It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated. | CVSS3: 5.3 | 0% Низкий | почти 8 лет назад | |
CVE-2018-1107 It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated. | CVSS3: 5.3 | 0% Низкий | почти 5 лет назад | |
GHSA-4hpf-3wq7-5rpr Regular expression deinal of service (ReDoS) in is-my-json-valid | CVSS3: 5.3 | 0% Низкий | около 4 лет назад | |
BDU:2024-01507 Уязвимость библиотеки is-my-json-valid програмной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | почти 8 лет назад |
Уязвимостей на страницу