Skip to content

Commit 6b0d1aa

Browse files
1 parent 18bef7e commit 6b0d1aa

2 files changed

Lines changed: 14 additions & 4 deletions

File tree

advisories/github-reviewed/2023/01/GHSA-qjm7-55vv-3c5f/GHSA-qjm7-55vv-3c5f.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qjm7-55vv-3c5f",
4-
"modified": "2023-01-20T23:35:16Z",
4+
"modified": "2026-02-17T22:04:14Z",
55
"published": "2023-01-18T03:31:17Z",
66
"aliases": [
77
"CVE-2018-25077"
88
],
99
"summary": "mel-spintax has Inefficient Regular Expression Complexity",
1010
"details": "A vulnerability was found in melnaron mel-spintax. It has been rated as problematic. Affected by this issue is some unknown functionality of the file `lib/spintax.js`. The manipulation of the argument text leads to inefficient regular expression complexity. The name of the patch is 37767617846e27b87b63004e30216e8f919637d3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218456.",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {

advisories/github-reviewed/2023/01/GHSA-vm74-j4wq-82xj/GHSA-vm74-j4wq-82xj.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vm74-j4wq-82xj",
4-
"modified": "2024-03-01T14:28:55Z",
4+
"modified": "2026-02-17T22:04:50Z",
55
"published": "2023-01-17T21:30:22Z",
66
"aliases": [
77
"CVE-2022-4891"
88
],
99
"summary": "Sisimai Inefficient Regular Expression Complexity vulnerability",
1010
"details": "A vulnerability has been found in Sisimai up to 4.25.14p11 and classified as problematic. This vulnerability affects the function `to_plain` of the file `lib/sisimai/string.rb`. The manipulation leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. Upgrading to version 4.25.14p12 is able to address this issue. The name of the patch is 51fe2e6521c9c02b421b383943dc9e4bbbe65d4e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218452.",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {

0 commit comments

Comments
 (0)