Description
A vulnerability was found in melnaron mel-spintax. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/spintax.js. The manipulation of the argument text leads to inefficient regular expression complexity. The name of the patch is 37767617846e27b87b63004e30216e8f919637d3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218456.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0534 | A vulnerability was found in melnaron mel-spintax. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/spintax.js. The manipulation of the argument text leads to inefficient regular expression complexity. The name of the patch is 37767617846e27b87b63004e30216e8f919637d3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218456. |
Github GHSA |
GHSA-qjm7-55vv-3c5f | mel-spintax has Inefficient Regular Expression Complexity |
References
History
No history.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-05T12:33:47.805Z
Reserved: 2023-01-16T22:46:47.749Z
Link: CVE-2018-25077
No data.
Status : Modified
Published: 2023-01-18T01:15:11.653
Modified: 2024-11-21T04:03:30.250
Link: CVE-2018-25077
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA