Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7695 | A vulnerability was found in email-existence. It has been rated as problematic. Affected by this issue is some unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The name of the patch is 0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56. It is recommended to apply a patch to fix this issue. VDB-216854 is the identifier assigned to this vulnerability. |
Github GHSA |
GHSA-p27h-4cpf-fw48 | email-existence Inefficient Regular Expression Complexity vulnerability |
Fri, 11 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-04-11T16:47:01.141Z
Reserved: 2022-12-27T08:09:20.592Z
Link: CVE-2018-25049
Updated: 2024-08-05T12:26:39.697Z
Status : Modified
Published: 2022-12-27T09:15:09.557
Modified: 2024-11-21T04:03:26.430
Link: CVE-2018-25049
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA