1 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

ansi-regex is vulnerable to Inefficient Regular Expression Complexity ansi-regex es vulnerable a una Complejidad de Expresiones Regulares Ineficientes A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes. • https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9 https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994 https://security.netapp.com/advisory/ntap-20221014-0002 https://www.oracle.com/security-alerts/cpuapr2022.html https://access.redhat.com/security/cve/CVE-2021-3807 https://bugzilla.redhat.com/show_bug.cgi?id=2007557 • CWE-400: Uncontrolled Resource Consumption CWE-1333: Inefficient Regular Expression Complexity •