Vulnerability Details CVE-2020-7661
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.013
EPSS Ranking 78.6%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 7.8
Products affected by CVE-2020-7661
-
cpe:2.3:a:url-regex_project:url-regex:-
-
cpe:2.3:a:url-regex_project:url-regex:1.0.0
-
cpe:2.3:a:url-regex_project:url-regex:1.0.1
-
cpe:2.3:a:url-regex_project:url-regex:1.0.2
-
cpe:2.3:a:url-regex_project:url-regex:1.0.3
-
cpe:2.3:a:url-regex_project:url-regex:1.0.4
-
cpe:2.3:a:url-regex_project:url-regex:2.0.0
-
cpe:2.3:a:url-regex_project:url-regex:2.0.1
-
cpe:2.3:a:url-regex_project:url-regex:2.0.2
-
cpe:2.3:a:url-regex_project:url-regex:2.0.3
-
cpe:2.3:a:url-regex_project:url-regex:2.1.0
-
cpe:2.3:a:url-regex_project:url-regex:2.1.1
-
cpe:2.3:a:url-regex_project:url-regex:2.1.2
-
cpe:2.3:a:url-regex_project:url-regex:2.1.3
-
cpe:2.3:a:url-regex_project:url-regex:3.0.0
-
cpe:2.3:a:url-regex_project:url-regex:3.0.1
-
cpe:2.3:a:url-regex_project:url-regex:3.1.0
-
cpe:2.3:a:url-regex_project:url-regex:3.1.1
-
cpe:2.3:a:url-regex_project:url-regex:3.2.0
-
cpe:2.3:a:url-regex_project:url-regex:4.0.0
-
cpe:2.3:a:url-regex_project:url-regex:4.1.0
-
cpe:2.3:a:url-regex_project:url-regex:4.1.1
-
cpe:2.3:a:url-regex_project:url-regex:5.0.0