Lucene search

K
githubGitHub Advisory DatabaseGHSA-P27H-4CPF-FW48
HistoryDec 27, 2022 - 9:30 a.m.

email-existence Inefficient Regular Expression Complexity vulnerability

2022-12-2709:30:41
CWE-1333
GitHub Advisory Database
github.com
17
vulnerability
email-existence
index.js
regular expression complexity
manipulation
patch
0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56
vdb-216854

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

45.9%

A vulnerability was found in email-existence. It has been rated as problematic. Affected by this issue is some unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The name of the patch is 0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56. It is recommended to apply a patch to fix this issue. VDB-216854 is the identifier assigned to this vulnerability.

Affected configurations

Vulners
Node
emailexistenceRange0.1.6
CPENameOperatorVersion
email-existencele0.1.6

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

45.9%

Related for GHSA-P27H-4CPF-FW48