A vulnerability was found in Prestaul skeemas and classified as problematic. This issue affects some unknown processing of the file validators/base.js. The manipulation of the argument uri leads to inefficient regular expression complexity. The patch is named 65e94eda62dc8dc148ab3e59aa2ccc086ac448fd. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218003.
References
Link | Resource |
---|---|
https://github.com/Prestaul/skeemas/commit/65e94eda62dc8dc148ab3e59aa2ccc086ac448fd | Patch |
https://vuldb.com/?ctiid.218003 | Third Party Advisory |
https://vuldb.com/?id.218003 | Third Party Advisory |
Configurations
History
27 Oct 2023, 19:45
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1333 |
20 Oct 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
Summary | A vulnerability was found in Prestaul skeemas and classified as problematic. This issue affects some unknown processing of the file validators/base.js. The manipulation of the argument uri leads to inefficient regular expression complexity. The patch is named 65e94eda62dc8dc148ab3e59aa2ccc086ac448fd. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218003. |
Information
Published : 2023-01-11 15:15
Updated : 2024-05-17 01:27
NVD link : CVE-2018-25074
Mitre link : CVE-2018-25074
CVE.ORG link : CVE-2018-25074
JSON object : View
Products Affected
skeemas_project
- skeemas
CWE
CWE-1333
Inefficient Regular Expression Complexity