Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-w93e-wkm9-kuex
Summary
Regular Expression Denial of Service (ReDoS)
npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
Aliases
0
alias CVE-2021-27290
1
alias GHSA-vx3p-948g-6vhq
Fixed_packages
0
url pkg:alpm/archlinux/nodejs@16.4.1-1
purl pkg:alpm/archlinux/nodejs@16.4.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/nodejs@16.4.1-1
1
url pkg:apk/alpine/nodejs@14.16.1-r1?arch=aarch64&distroversion=v3.13&reponame=main
purl pkg:apk/alpine/nodejs@14.16.1-r1?arch=aarch64&distroversion=v3.13&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.16.1-r1%3Farch=aarch64&distroversion=v3.13&reponame=main
2
url pkg:apk/alpine/nodejs@14.16.1-r1?arch=armhf&distroversion=v3.13&reponame=main
purl pkg:apk/alpine/nodejs@14.16.1-r1?arch=armhf&distroversion=v3.13&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.16.1-r1%3Farch=armhf&distroversion=v3.13&reponame=main
3
url pkg:apk/alpine/nodejs@14.16.1-r1?arch=armv7&distroversion=v3.13&reponame=main
purl pkg:apk/alpine/nodejs@14.16.1-r1?arch=armv7&distroversion=v3.13&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.16.1-r1%3Farch=armv7&distroversion=v3.13&reponame=main
4
url pkg:apk/alpine/nodejs@14.16.1-r1?arch=mips64&distroversion=v3.13&reponame=main
purl pkg:apk/alpine/nodejs@14.16.1-r1?arch=mips64&distroversion=v3.13&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.16.1-r1%3Farch=mips64&distroversion=v3.13&reponame=main
5
url pkg:apk/alpine/nodejs@14.16.1-r1?arch=ppc64le&distroversion=v3.13&reponame=main
purl pkg:apk/alpine/nodejs@14.16.1-r1?arch=ppc64le&distroversion=v3.13&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.16.1-r1%3Farch=ppc64le&distroversion=v3.13&reponame=main
6
url pkg:apk/alpine/nodejs@14.16.1-r1?arch=s390x&distroversion=v3.13&reponame=main
purl pkg:apk/alpine/nodejs@14.16.1-r1?arch=s390x&distroversion=v3.13&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.16.1-r1%3Farch=s390x&distroversion=v3.13&reponame=main
7
url pkg:apk/alpine/nodejs@14.16.1-r1?arch=x86&distroversion=v3.13&reponame=main
purl pkg:apk/alpine/nodejs@14.16.1-r1?arch=x86&distroversion=v3.13&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.16.1-r1%3Farch=x86&distroversion=v3.13&reponame=main
8
url pkg:apk/alpine/nodejs@14.16.1-r1?arch=x86_64&distroversion=v3.13&reponame=main
purl pkg:apk/alpine/nodejs@14.16.1-r1?arch=x86_64&distroversion=v3.13&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.16.1-r1%3Farch=x86_64&distroversion=v3.13&reponame=main
9
url pkg:deb/debian/node-ssri@8.0.1-1?distro=trixie
purl pkg:deb/debian/node-ssri@8.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ssri@8.0.1-1%3Fdistro=trixie
10
url pkg:deb/debian/node-ssri@8.0.1-2?distro=trixie
purl pkg:deb/debian/node-ssri@8.0.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ssri@8.0.1-2%3Fdistro=trixie
11
url pkg:deb/debian/node-ssri@8.0.1-2
purl pkg:deb/debian/node-ssri@8.0.1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ssri@8.0.1-2
12
url pkg:deb/debian/node-ssri@9.0.1-2?distro=trixie
purl pkg:deb/debian/node-ssri@9.0.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ssri@9.0.1-2%3Fdistro=trixie
13
url pkg:deb/debian/node-ssri@9.0.1-3?distro=trixie
purl pkg:deb/debian/node-ssri@9.0.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ssri@9.0.1-3%3Fdistro=trixie
14
url pkg:npm/ssri@6.0.2
purl pkg:npm/ssri@6.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@6.0.2
15
url pkg:npm/ssri@7.1.1
purl pkg:npm/ssri@7.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@7.1.1
16
url pkg:npm/ssri@8.0.1
purl pkg:npm/ssri@8.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@8.0.1
Affected_packages
0
url pkg:alpm/archlinux/nodejs@16.4.0-1
purl pkg:alpm/archlinux/nodejs@16.4.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4kjh-zmaz-tqb7
1
vulnerability VCID-b7hq-5yyx-tuhs
2
vulnerability VCID-nj6f-gujk-wqah
3
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/nodejs@16.4.0-1
1
url pkg:deb/debian/node-ssri@5.2.4-2
purl pkg:deb/debian/node-ssri@5.2.4-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ssri@5.2.4-2
2
url pkg:npm/ssri@5.2.2
purl pkg:npm/ssri@5.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@5.2.2
3
url pkg:npm/ssri@5.2.3
purl pkg:npm/ssri@5.2.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@5.2.3
4
url pkg:npm/ssri@5.2.4
purl pkg:npm/ssri@5.2.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@5.2.4
5
url pkg:npm/ssri@5.3.0
purl pkg:npm/ssri@5.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@5.3.0
6
url pkg:npm/ssri@6.0.0
purl pkg:npm/ssri@6.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@6.0.0
7
url pkg:npm/ssri@6.0.1
purl pkg:npm/ssri@6.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@6.0.1
8
url pkg:npm/ssri@7.0.0
purl pkg:npm/ssri@7.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@7.0.0
9
url pkg:npm/ssri@7.0.1
purl pkg:npm/ssri@7.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@7.0.1
10
url pkg:npm/ssri@7.1.0
purl pkg:npm/ssri@7.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@7.1.0
11
url pkg:npm/ssri@8.0.0
purl pkg:npm/ssri@8.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ssri@8.0.0
12
url pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.2-1?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.2-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4kjh-zmaz-tqb7
1
vulnerability VCID-nj6f-gujk-wqah
2
vulnerability VCID-vg7c-pctm-m7gn
3
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.2-1%3Farch=el7
13
url pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-2?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4kjh-zmaz-tqb7
1
vulnerability VCID-nj6f-gujk-wqah
2
vulnerability VCID-vg7c-pctm-m7gn
3
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-2%3Farch=el7
14
url pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.2-1?arch=el7
purl pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.2-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4kjh-zmaz-tqb7
1
vulnerability VCID-nj6f-gujk-wqah
2
vulnerability VCID-vg7c-pctm-m7gn
3
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.2-1%3Farch=el7
15
url pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-2?arch=el7
purl pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4kjh-zmaz-tqb7
1
vulnerability VCID-nj6f-gujk-wqah
2
vulnerability VCID-vg7c-pctm-m7gn
3
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-2%3Farch=el7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27290.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27290
reference_id
reference_type
scores
0
value 0.02458
scoring_system epss
scoring_elements 0.85401
published_at 2026-05-15T12:55:00Z
1
value 0.02458
scoring_system epss
scoring_elements 0.85393
published_at 2026-05-14T12:55:00Z
2
value 0.02458
scoring_system epss
scoring_elements 0.85355
published_at 2026-05-12T12:55:00Z
3
value 0.02458
scoring_system epss
scoring_elements 0.85342
published_at 2026-05-11T12:55:00Z
4
value 0.02458
scoring_system epss
scoring_elements 0.85347
published_at 2026-05-09T12:55:00Z
5
value 0.02458
scoring_system epss
scoring_elements 0.85329
published_at 2026-05-07T12:55:00Z
6
value 0.02458
scoring_system epss
scoring_elements 0.85302
published_at 2026-05-05T12:55:00Z
7
value 0.02458
scoring_system epss
scoring_elements 0.85287
published_at 2026-04-29T12:55:00Z
8
value 0.02458
scoring_system epss
scoring_elements 0.85289
published_at 2026-04-26T12:55:00Z
9
value 0.02458
scoring_system epss
scoring_elements 0.85281
published_at 2026-04-24T12:55:00Z
10
value 0.02458
scoring_system epss
scoring_elements 0.85257
published_at 2026-04-21T12:55:00Z
11
value 0.02665
scoring_system epss
scoring_elements 0.85754
published_at 2026-04-04T12:55:00Z
12
value 0.02665
scoring_system epss
scoring_elements 0.85724
published_at 2026-04-01T12:55:00Z
13
value 0.02665
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-02T12:55:00Z
14
value 0.02665
scoring_system epss
scoring_elements 0.8576
published_at 2026-04-07T12:55:00Z
15
value 0.02665
scoring_system epss
scoring_elements 0.85779
published_at 2026-04-08T12:55:00Z
16
value 0.02665
scoring_system epss
scoring_elements 0.8579
published_at 2026-04-09T12:55:00Z
17
value 0.02665
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-11T12:55:00Z
18
value 0.04327
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-18T12:55:00Z
19
value 0.04327
scoring_system epss
scoring_elements 0.88917
published_at 2026-04-13T12:55:00Z
20
value 0.04327
scoring_system epss
scoring_elements 0.8893
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27290
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290
4
reference_url https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/npm/ssri
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ssri
7
reference_url https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2
8
reference_url https://github.com/npm/ssri/commit/809c84d09ea87c3857fa171d42914586899d4538
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ssri/commit/809c84d09ea87c3857fa171d42914586899d4538
9
reference_url https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1
10
reference_url https://github.com/npm/ssri/pull/20#issuecomment-842677644
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ssri/pull/20#issuecomment-842677644
11
reference_url https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf
12
reference_url https://npmjs.com
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://npmjs.com
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-27290
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-27290
14
reference_url https://www.npmjs.com/package/ssri
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/package/ssri
15
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941471
reference_id 1941471
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941471
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985841
reference_id 985841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985841
18
reference_url https://security.archlinux.org/ASA-202107-13
reference_id ASA-202107-13
reference_type
scores
url https://security.archlinux.org/ASA-202107-13
19
reference_url https://security.archlinux.org/AVG-2126
reference_id AVG-2126
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2126
20
reference_url https://github.com/advisories/GHSA-vx3p-948g-6vhq
reference_id GHSA-vx3p-948g-6vhq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vx3p-948g-6vhq
21
reference_url https://access.redhat.com/errata/RHSA-2021:2931
reference_id RHSA-2021:2931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2931
22
reference_url https://access.redhat.com/errata/RHSA-2021:2932
reference_id RHSA-2021:2932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2932
23
reference_url https://access.redhat.com/errata/RHSA-2021:3073
reference_id RHSA-2021:3073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3073
24
reference_url https://access.redhat.com/errata/RHSA-2021:3074
reference_id RHSA-2021:3074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3074
25
reference_url https://access.redhat.com/errata/RHSA-2021:3638
reference_id RHSA-2021:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3638
26
reference_url https://access.redhat.com/errata/RHSA-2021:3639
reference_id RHSA-2021:3639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3639
Weaknesses
0
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
1
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-w93e-wkm9-kuex