Search for packages
| purl | pkg:npm/brace-expansion@1.1.7 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-ugqu-gsa9-y7fq
Aliases: CVE-2025-5889 GHSA-v6h2-p8h4-qcjw |
brace-expansion Regular Expression Denial of Service vulnerability A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is `a5b98a4f30d7813266b221435e1eaaf25a1b0ac5`. It is recommended to upgrade the affected component. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-3qmf-2f2m-fbes | Improper Input Validation index.js in brace-expansion before 1.1.7 is vulnerable to Regular Expression Denial of Service (ReDoS) attacks, as demonstrated by an expand argument containing many comma characters. |
CVE-2017-18077
GHSA-832h-xg76-4gv6 |
| VCID-bb7f-bzvg-skfe | Regular Expression DoS brace expansion is vulnerable to Regular Expression Denial of Service attacks. |
GMS-2017-113
|