CVE-2018-25049
LOW
3,0
Source: [email protected]
Attack Vector: adjacent_network
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: low
Description
AI Translation Available
A vulnerability was found in email-existence. It has been rated as problematic. Affected by this issue is some unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The name of the patch is 0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56. It is recommended to apply a patch to fix this issue. VDB-216854 is the identifier assigned to this vulnerability.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0044
Percentile
0,6th
Updated
EPSS Score Trend (Last 90 Days)
1333
Inefficient Regular Expression Complexity
DraftCommon Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Resource Consumption (Cpu)
Applicable Platforms
All platforms may be affected
Application
Email-Existence by Email-Existence Project
CPE Identifier
View Detailed Analysis
cpe:2.3:a:email-existence_project:email-existence:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/nmanousos/email-existence/commit/0029ba71b6ad0d8ec0baa2ecc62…
https://github.com/nmanousos/email-existence/pull/37
https://vuldb.com/?ctiid.216854
https://vuldb.com/?id.216854
https://github.com/nmanousos/email-existence/commit/0029ba71b6ad0d8ec0baa2ecc62…
https://github.com/nmanousos/email-existence/pull/37
https://vuldb.com/?ctiid.216854
https://vuldb.com/?id.216854