An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS12dmYyLXBwajktcHA0Oc0VyA

Inefficient Regular Expression Complexity in vuelidate

vuelidate is a simple, lightweight model-based validation for Vue.js 2.x & 3.0. A ReDoS (regular expression denial of service) flaw was found in the @vuelidate/validators package. An attacker that is able to provide crafted input to the url(input) function may cause an application to consume an excessive amount of CPU.

Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 3 years ago
Updated: over 1 year ago

CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-vvf2-ppj9-pp49, CVE-2021-3794
References: Repository:
Blast Radius: 23.7

Affected Packages

Dependent packages: 163
Dependent repositories: 1,464
Downloads: 1,027,298 last month
Affected Version Ranges: <= 2.0.0-alpha.21
Fixed in: 2.0.0-alpha.22
All affected versions: 2.0.0-alpha.0, 2.0.0-alpha.1, 2.0.0-alpha.2, 2.0.0-alpha.3, 2.0.0-alpha.4, 2.0.0-alpha.5, 2.0.0-alpha.6, 2.0.0-alpha.7, 2.0.0-alpha.8, 2.0.0-alpha.9, 2.0.0-alpha.10, 2.0.0-alpha.11, 2.0.0-alpha.12, 2.0.0-alpha.13, 2.0.0-alpha.14, 2.0.0-alpha.15, 2.0.0-alpha.16, 2.0.0-alpha.17, 2.0.0-alpha.18, 2.0.0-alpha.19, 2.0.0-alpha.20, 2.0.0-alpha.21
All unaffected versions: 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4