CVE-2021-3807

ansi-regex is vulnerable to Inefficient Regular Expression Complexity
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ansi-regex_project:ansi-regex:*:*:*:*:*:node.js:*:*
cpe:2.3:a:ansi-regex_project:ansi-regex:3.0.0:*:*:*:*:node.js:*:*
cpe:2.3:a:ansi-regex_project:ansi-regex:5.0.0:*:*:*:*:node.js:*:*
cpe:2.3:a:ansi-regex_project:ansi-regex:6.0.0:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:22

Type Values Removed Values Added
References () https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9 - Patch, Third Party Advisory () https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9 - Patch, Third Party Advisory
References () https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20221014-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20221014-0002/ - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory

10 Jul 2023, 19:01

Type Values Removed Values Added
CWE CWE-697 CWE-1333

Information

Published : 2021-09-17 07:15

Updated : 2024-11-21 06:22


NVD link : CVE-2021-3807

Mitre link : CVE-2021-3807

CVE.ORG link : CVE-2021-3807


JSON object : View

Products Affected

ansi-regex_project

  • ansi-regex

oracle

  • communications_cloud_native_core_policy
CWE
CWE-1333

Inefficient Regular Expression Complexity