mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
76 lines
2.5 KiB
JSON
76 lines
2.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-26305",
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CommonRegexJS is a CommonRegex port for JavaScript. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-1333 Inefficient Regular Expression Complexity",
|
|
"cweId": "CWE-1333"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "talyssonoc",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "CommonRegexJS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://securitylab.github.com/advisories/GHSL-2020-291-redos-CommonRegexJS/",
|
|
"refsource": "MISC",
|
|
"name": "https://securitylab.github.com/advisories/GHSL-2020-291-redos-CommonRegexJS/"
|
|
},
|
|
{
|
|
"url": "https://github.com/talyssonoc/CommonRegexJS/issues/4",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/talyssonoc/CommonRegexJS/issues/4"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.2.0"
|
|
},
|
|
"source": {
|
|
"advisory": "GHSL-2020-291",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |