Search for packages
| purl | pkg:npm/brace-expansion@1.1.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3qmf-2f2m-fbes
Aliases: CVE-2017-18077 GHSA-832h-xg76-4gv6 |
Improper Input Validation index.js in brace-expansion before 1.1.7 is vulnerable to Regular Expression Denial of Service (ReDoS) attacks, as demonstrated by an expand argument containing many comma characters. |
Affected by 1 other vulnerability. |
|
VCID-bb7f-bzvg-skfe
Aliases: GMS-2017-113 |
Regular Expression DoS brace expansion is vulnerable to Regular Expression Denial of Service attacks. |
Affected by 1 other vulnerability. |
|
VCID-ugqu-gsa9-y7fq
Aliases: CVE-2025-5889 GHSA-v6h2-p8h4-qcjw |
brace-expansion Regular Expression Denial of Service vulnerability A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is `a5b98a4f30d7813266b221435e1eaaf25a1b0ac5`. It is recommended to upgrade the affected component. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||