CVE-2020-26306 – knwl.js
Package
Manager: npm
Name: knwl.js
Vulnerable Version: >=0 <=1.0.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:R
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
EPSS: 0.00204 pctl0.42703
Details
Knwl.js Regular Expression Denial of Service vulnerability Knwl.js is a Javascript library that parses through text for dates, times, phone numbers, emails, places, and more. Versions 1.0.2 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.
Metadata
Created: 2024-10-26T21:30:46Z
Modified: 2024-10-28T14:50:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-68qg-g787-3rp5/GHSA-68qg-g787-3rp5.json
CWE IDs: ["CWE-1333"]
Alternative ID: GHSA-68qg-g787-3rp5
Finding: F211
Auto approve: 1