2 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 2

ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option. ssri versión 5.2.2-8.0.0, corregido en versión 8.0.1, procesa los SRI usando una expresión regular que es vulnerable a una denegación de servicio. Los SRI maliciosos pueden tardar mucho en procesarse, conllevando a una denegación del servicio. Este problema solo afecta a consumidores que usan la opción estricta A flaw was found in ssri package. • https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf https://npmjs.com https://www.oracle.com/security-alerts/cpuoct2021.html https://access.redhat.com/security/cve/CVE-2021-27290 https://bugzilla.redhat.com/show_bug.cgi?id=1941471 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 1

index.js in the ssri module before 5.2.2 for Node.js is prone to a regular expression denial of service vulnerability in strict mode functionality via a long base64 hash string. index.js en el módulo ssri en versiones anteriores a la 5.2.2 para Node.js es propenso a una vulnerabilidad de denegación de servicio de expresión regular (DoS) en funcionalidad de modo estricto mediante una cadena de hash larga en base64. • https://github.com/ossf-cve-benchmark/CVE-2018-7651 https://github.com/zkat/ssri/commit/d0ebcdc22cb5c8f47f89716d08b3518b2485d65d https://github.com/zkat/ssri/issues/10 https://nodesecurity.io/advisories/565 • CWE-400: Uncontrolled Resource Consumption •