CVE-2020-26310
Oct. 28, 2024, 1:58 p.m.
None
No Score
Description
Validate.js provides a declarative way of validating javascript objects. All versions as of 30 November 2020 contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any patches are available.
Product(s) Impacted
Product | Versions |
---|---|
Validate.js |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
CWE-1333
Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Tags
Timeline
Published: Oct. 26, 2024, 9:15 p.m.
Last Modified: Oct. 28, 2024, 1:58 p.m.
Last Modified: Oct. 28, 2024, 1:58 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
security-advisories@github.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.