Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-n82z-sfd6-x3af
Summary
golang.org/x/text Infinite loop
Go version v0.3.3 of the x/text package fixes a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.

### Specific Go Packages Affected
golang.org/x/text/encoding/unicode
golang.org/x/text/transform
Aliases
0
alias CVE-2020-14040
1
alias GHSA-5rcv-m4m3-hfh7
Fixed_packages
0
url pkg:deb/debian/golang-golang-x-text@0.3.3-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-text@0.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-text@0.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/golang-golang-x-text@0.3.6-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-text@0.3.6-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2dh6-y93r-2ucc
1
vulnerability VCID-6rzu-td8d-1ycn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-text@0.3.6-1%3Fdistro=trixie
2
url pkg:deb/debian/golang-golang-x-text@0.7.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-text@0.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-text@0.7.0-1%3Fdistro=trixie
3
url pkg:deb/debian/golang-golang-x-text@0.22.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-text@0.22.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-text@0.22.0-1%3Fdistro=trixie
4
url pkg:deb/debian/golang-golang-x-text@0.35.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-text@0.35.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-text@0.35.0-1%3Fdistro=trixie
5
url pkg:deb/debian/golang-golang-x-text@0.36.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-text@0.36.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-text@0.36.0-1%3Fdistro=trixie
6
url pkg:golang/golang.org/x/text@0.3.3
purl pkg:golang/golang.org/x/text@0.3.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/golang.org/x/text@0.3.3
Affected_packages
0
url pkg:rpm/redhat/buildah@1.11.6-12?arch=el7_9
purl pkg:rpm/redhat/buildah@1.11.6-12?arch=el7_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n82z-sfd6-x3af
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1.11.6-12%3Farch=el7_9
1
url pkg:rpm/redhat/go-toolset-1.13@1.13.15-1?arch=el7
purl pkg:rpm/redhat/go-toolset-1.13@1.13.15-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwge-3up7-yyaq
1
vulnerability VCID-n82z-sfd6-x3af
2
vulnerability VCID-w9qm-pwnh-4ydj
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset-1.13@1.13.15-1%3Farch=el7
2
url pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3?arch=el7
purl pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwge-3up7-yyaq
1
vulnerability VCID-n82z-sfd6-x3af
2
vulnerability VCID-w9qm-pwnh-4ydj
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3%3Farch=el7
3
url pkg:rpm/redhat/ior@1.1.6-1?arch=el8
purl pkg:rpm/redhat/ior@1.1.6-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ior@1.1.6-1%3Farch=el8
4
url pkg:rpm/redhat/kiali@1.12.10.redhat2-1?arch=el7
purl pkg:rpm/redhat/kiali@1.12.10.redhat2-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kiali@1.12.10.redhat2-1%3Farch=el7
5
url pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6?arch=el8
purl pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwge-3up7-yyaq
1
vulnerability VCID-n82z-sfd6-x3af
2
vulnerability VCID-w9qm-pwnh-4ydj
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6%3Farch=el8
6
url pkg:rpm/redhat/podman@1.6.4-26?arch=el7_9
purl pkg:rpm/redhat/podman@1.6.4-26?arch=el7_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ckg3-5czq-t7ek
1
vulnerability VCID-n82z-sfd6-x3af
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@1.6.4-26%3Farch=el7_9
7
url pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6?arch=el8
purl pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ckg3-5czq-t7ek
1
vulnerability VCID-dwge-3up7-yyaq
2
vulnerability VCID-n82z-sfd6-x3af
3
vulnerability VCID-w9qm-pwnh-4ydj
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6%3Farch=el8
8
url pkg:rpm/redhat/servicemesh@1.1.6-1?arch=el8
purl pkg:rpm/redhat/servicemesh@1.1.6-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh@1.1.6-1%3Farch=el8
9
url pkg:rpm/redhat/servicemesh-cni@1.1.6-1?arch=el8
purl pkg:rpm/redhat/servicemesh-cni@1.1.6-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-cni@1.1.6-1%3Farch=el8
10
url pkg:rpm/redhat/servicemesh-grafana@6.4.3-13?arch=el8
purl pkg:rpm/redhat/servicemesh-grafana@6.4.3-13?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-grafana@6.4.3-13%3Farch=el8
11
url pkg:rpm/redhat/servicemesh-operator@1.1.6-2?arch=el8
purl pkg:rpm/redhat/servicemesh-operator@1.1.6-2?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-operator@1.1.6-2%3Farch=el8
12
url pkg:rpm/redhat/servicemesh-prometheus@2.14.0-14?arch=el8
purl pkg:rpm/redhat/servicemesh-prometheus@2.14.0-14?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-prometheus@2.14.0-14%3Farch=el8
13
url pkg:rpm/redhat/skopeo@1:0.1.40-12?arch=el7_9
purl pkg:rpm/redhat/skopeo@1:0.1.40-12?arch=el7_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n82z-sfd6-x3af
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@1:0.1.40-12%3Farch=el7_9
14
url pkg:rpm/redhat/skopeo@1:1.1.1-2.rhaos4.6?arch=el8
purl pkg:rpm/redhat/skopeo@1:1.1.1-2.rhaos4.6?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n82z-sfd6-x3af
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@1:1.1.1-2.rhaos4.6%3Farch=el8
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14040.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14040.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14040
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00644
published_at 2026-04-18T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00661
published_at 2026-04-08T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00639
published_at 2026-04-16T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00648
published_at 2026-04-13T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00646
published_at 2026-04-12T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00653
published_at 2026-04-11T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00663
published_at 2026-04-01T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00667
published_at 2026-04-02T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00659
published_at 2026-04-04T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00662
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14040
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14040
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/golang/go/issues/39491
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/golang/go/issues/39491
5
reference_url https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e
6
reference_url https://go.dev/cl/238238
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/238238
7
reference_url https://go.dev/issue/39491
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/39491
8
reference_url https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e
9
reference_url https://go-review.googlesource.com/c/text/+/238238
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go-review.googlesource.com/c/text/+/238238
10
reference_url https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0
11
reference_url https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-14040
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-14040
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1853652
reference_id 1853652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1853652
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964272
reference_id 964272
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964272
16
reference_url https://access.redhat.com/errata/RHSA-2020:3087
reference_id RHSA-2020:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3087
17
reference_url https://access.redhat.com/errata/RHSA-2020:3369
reference_id RHSA-2020:3369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3369
18
reference_url https://access.redhat.com/errata/RHSA-2020:3372
reference_id RHSA-2020:3372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3372
19
reference_url https://access.redhat.com/errata/RHSA-2020:3578
reference_id RHSA-2020:3578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3578
20
reference_url https://access.redhat.com/errata/RHSA-2020:3665
reference_id RHSA-2020:3665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3665
21
reference_url https://access.redhat.com/errata/RHSA-2020:3727
reference_id RHSA-2020:3727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3727
22
reference_url https://access.redhat.com/errata/RHSA-2020:3780
reference_id RHSA-2020:3780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3780
23
reference_url https://access.redhat.com/errata/RHSA-2020:3783
reference_id RHSA-2020:3783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3783
24
reference_url https://access.redhat.com/errata/RHSA-2020:4214
reference_id RHSA-2020:4214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4214
25
reference_url https://access.redhat.com/errata/RHSA-2020:4297
reference_id RHSA-2020:4297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4297
26
reference_url https://access.redhat.com/errata/RHSA-2020:4298
reference_id RHSA-2020:4298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4298
27
reference_url https://access.redhat.com/errata/RHSA-2020:4694
reference_id RHSA-2020:4694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4694
28
reference_url https://access.redhat.com/errata/RHSA-2020:5054
reference_id RHSA-2020:5054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5054
29
reference_url https://access.redhat.com/errata/RHSA-2020:5055
reference_id RHSA-2020:5055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5055
30
reference_url https://access.redhat.com/errata/RHSA-2020:5056
reference_id RHSA-2020:5056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5056
31
reference_url https://access.redhat.com/errata/RHSA-2020:5149
reference_id RHSA-2020:5149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5149
32
reference_url https://access.redhat.com/errata/RHSA-2020:5198
reference_id RHSA-2020:5198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5198
33
reference_url https://access.redhat.com/errata/RHSA-2020:5605
reference_id RHSA-2020:5605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5605
34
reference_url https://access.redhat.com/errata/RHSA-2020:5606
reference_id RHSA-2020:5606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5606
35
reference_url https://access.redhat.com/errata/RHSA-2020:5633
reference_id RHSA-2020:5633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5633
36
reference_url https://access.redhat.com/errata/RHSA-2020:5635
reference_id RHSA-2020:5635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5635
37
reference_url https://access.redhat.com/errata/RHSA-2021:0420
reference_id RHSA-2021:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0420
38
reference_url https://access.redhat.com/errata/RHSA-2021:0980
reference_id RHSA-2021:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0980
39
reference_url https://access.redhat.com/errata/RHSA-2021:1129
reference_id RHSA-2021:1129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1129
40
reference_url https://access.redhat.com/errata/RHSA-2021:1369
reference_id RHSA-2021:1369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1369
41
reference_url https://access.redhat.com/errata/RHSA-2021:2039
reference_id RHSA-2021:2039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2039
42
reference_url https://usn.ubuntu.com/5873-1/
reference_id USN-5873-1
reference_type
scores
url https://usn.ubuntu.com/5873-1/
Weaknesses
0
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
1
cwe_id 835
name Loop with Unreachable Exit Condition ('Infinite Loop')
description The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Exploits
Severity_range_score4.0 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-n82z-sfd6-x3af