Search for vulnerabilities
| Vulnerability ID | VCID-9eyp-2a6k-xya4 |
| Aliases |
GHSA-6chw-6frg-f759
GMS-2020-702 |
| Summary | Regular Expression Denial of Service in Acorn Affected versions of acorn are vulnerable to Regular Expression Denial of Service. A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop. The string is not valid UTF16 which usually results in it being sanitized before reaching the parser. If an application processes untrusted input and passes it directly to acorn, attackers may leverage the vulnerability leading to Denial of Service. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 8.0 |
| Risk | 4.0 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| cvssv3.1 | 7.5 | https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802 |
| generic_textual | HIGH | https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802 |
| cvssv3.1 | 7.5 | https://github.com/acornjs/acorn/issues/929 |
| generic_textual | HIGH | https://github.com/acornjs/acorn/issues/929 |
| cvssv3.1_qr | HIGH | https://github.com/advisories/GHSA-6chw-6frg-f759 |
| cvssv3.1 | 7.5 | https://snyk.io/vuln/SNYK-JS-ACORN-559469 |
| generic_textual | HIGH | https://snyk.io/vuln/SNYK-JS-ACORN-559469 |
| cvssv3.1 | 7.5 | https://www.npmjs.com/advisories/1488 |
| generic_textual | HIGH | https://www.npmjs.com/advisories/1488 |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
No EPSS data available for this vulnerability.
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T12:59:28.612611+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/04/GHSA-6chw-6frg-f759/GHSA-6chw-6frg-f759.json | 38.0.0 |