Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown
CVE-2022-47925
Disclosure Date: March 27, 2023 (last updated February 15, 2024)
The validate JSON endpoint of the Secvisogram csaf-validator-service in versions < 0.1.0 processes tests with unexpected names. This insufficient input validation of requests by an unauthenticated remote user might lead to a partial DoS of the service. Only the request of the attacker is affected by this vulnerability.
0
Attacker Value
Unknown
CVE-2022-47924
Disclosure Date: March 27, 2023 (last updated November 08, 2023)
An high privileged attacker may pass crafted arguments to the validate function of csaf-validator-lib of a locally installed Secvisogram in versions < 0.1.0 wich can result in arbitrary code execution and DoS once the users triggers the validation.
0
Attacker Value
Unknown
CVE-2021-40901
Disclosure Date: June 27, 2022 (last updated October 07, 2023)
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in scniro-validator v1.0.1 when validating crafted invalid emails.
0
Attacker Value
Unknown
CVE-2021-43114
Disclosure Date: November 09, 2021 (last updated February 23, 2025)
FORT Validator versions prior to 1.5.2 will crash if an RPKI CA publishes an X.509 EE certificate. This will lead to RTR clients such as BGP routers to lose access to the RPKI VRP data set, effectively disabling Route Origin Validation.
0
Attacker Value
Unknown
CVE-2021-3765
Disclosure Date: November 02, 2021 (last updated February 23, 2025)
validator.js is vulnerable to Inefficient Regular Expression Complexity
0
Attacker Value
Unknown
CVE-2020-7779
Disclosure Date: November 26, 2020 (last updated February 22, 2025)
All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example, --@------------------------------------------------------------------------------------------------------------------------!.
0
Attacker Value
Unknown
CVE-2020-17479
Disclosure Date: August 10, 2020 (last updated February 21, 2025)
jpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array.
0
Attacker Value
Unknown
CVE-2019-19507
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
0
Attacker Value
Unknown
CVE-2019-18413
Disclosure Date: October 24, 2019 (last updated November 27, 2024)
In TypeStack class-validator 0.10.2, validate() input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional forbidUnknownValues parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product.
0