We found results for “”
WS-2019-0169
Good to know:
Date: April 3, 2019
marked versions >0.3.14 and < 0.6.2 has Regular Expression Denial of Service vulnerability Email addresses may be evaluated in quadratic time, allowing attackers to potentially crash the node process due to resource exhaustion.
Language: JS
Severity Score
Severity Score
Weakness Type (CWE)
Uncontrolled Resource Consumption
CWE-400Top Fix
Upgrade Version
Upgrade to version marked - 0.6.2;laminas-api-tools/api-tools-documentation-swagger - no_fix;laminas-api-tools/api-tools-documentation-swagger - 1.7.x-dev;laminas-api-tools/api-tools-documentation-swagger - 1.6.0;laminas-api-tools/api-tools-documentation-swagger - 1.5.0;EaCloud.Template.Frontend.App.PDA - 7.0.0.6;restaurare/ewlist - no_fix;lindelin/lindale - v1.4.0;lindelin/lindale - v1.1.5;lindelin/lindale - v2.0.0;lindelin/lindale - dev-up-to-version-3;lindelin/lindale - no_fix;lindelin/lindale - v1.4.2;lindelin/lindale - 4.0.0.x-dev;lindelin/lindale - v1.5.7;lindelin/lindale - v1.6.0;lindelin/lindale - v1.0.0;lindelin/lindale - v1.1.0;lindelin/lindale - v0.5.0-build.430;houdunwang/hdcms - dev-dependabot/composer/symfony/http-foundation-4.4.7;houdunwang/hdcms - dev-dependabot/npm_and_yarn/Modules/Article/dns-packet-1.3.4;houdunwang/hdcms - dev-dependabot/npm_and_yarn/acorn-6.4.1;EaCloud.Template.App.PDA - no_fix;autovizwidget - 0.12.7;notebook - 6.1.0;org.webjars.npm:polymer__polymer:3.0.5;org.webjars.npm:voc:1.2.0;org.webjars.bowergithub.markedjs:marked:0.3.19;org.webjars.npm:marked:0.6.2;org.webjars.npm:marked:0.3.17;org.webjars.bower:marked:no_fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


