{ "schema_version": "1.4.0", "id": "GHSA-qjm7-55vv-3c5f", "modified": "2023-01-20T23:35:16Z", "published": "2023-01-18T03:31:17Z", "aliases": [ "CVE-2018-25077" ], "summary": "mel-spintax has Inefficient Regular Expression Complexity", "details": "A vulnerability was found in melnaron mel-spintax. It has been rated as problematic. Affected by this issue is some unknown functionality of the file `lib/spintax.js`. The manipulation of the argument text leads to inefficient regular expression complexity. The name of the patch is 37767617846e27b87b63004e30216e8f919637d3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218456.", "severity": [], "affected": [ { "package": { "ecosystem": "npm", "name": "mel-spintax" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.0.3" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25077" }, { "type": "WEB", "url": "https://github.com/melnaron/mel-spintax/commit/37767617846e27b87b63004e30216e8f919637d3" }, { "type": "PACKAGE", "url": "https://github.com/melnaron/mel-spintax" }, { "type": "WEB", "url": "https://vuldb.com/?id.218456" } ], "database_specific": { "cwe_ids": [ "CWE-1333" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-01-20T23:35:16Z", "nvd_published_at": "2023-01-18T01:15:00Z" } }