2 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 3

Schema-Inspector is an open-source tool to sanitize and validate JS objects (npm package schema-inspector). In before version 2.0.0, email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS. • https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr https://security.netapp.com/advisory/ntap-20210528-0006 https://www.npmjs.com/package/schema-inspector • CWE-20: Improper Input Validation CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector. En schema-inspector versiones anteriores a 1.6.9, un objeto JavaScript creado maliciosamente puede omitir las funciones "sanitize()" y "validate()" utilizadas dentro de schema-inspector. • https://github.com/ossf-cve-benchmark/CVE-2019-10781 https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d https://snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-536970 • CWE-668: Exposure of Resource to Wrong Sphere •