logo

CVE-2020-26306 knwl.js

Package

Manager: npm
Name: knwl.js
Vulnerable Version: >=0 <=1.0.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green

EPSS: 0.00204 pctl0.42703

Details

Knwl.js Regular Expression Denial of Service vulnerability Knwl.js is a Javascript library that parses through text for dates, times, phone numbers, emails, places, and more. Versions 1.0.2 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.

Metadata

Created: 2024-10-26T21:30:46Z
Modified: 2024-10-28T14:50:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-68qg-g787-3rp5/GHSA-68qg-g787-3rp5.json
CWE IDs: ["CWE-1333"]
Alternative ID: GHSA-68qg-g787-3rp5
Finding: F211
Auto approve: 1