7.5
CVSSv3

CVE-2021-40892

Published: 24/06/2022 Updated: 08/08/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A Regular Expression Denial of Service (ReDOS) vulnerability exists in validate-color v2.1.0 when handling crafted invalid rgb(a) strings.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

validate color project validate color 2.1.0

Github Repositories

βœ…πŸŒˆπŸ™Œ Validate HTML colors by 'name', 'special name', 'hex', 'rgb', 'rgba', 'hsl', 'hsla', 'hwb' or 'lab' values

Validate Color βœ…πŸŒˆπŸ™Œ Validate HTML colors by name, special name, hex, rgb, rgba, hsl, hsla, hwb, lab or lch values HTML colors are remarkably easy to get wrong, because they allow for so many different values As I was writing Console Log Plus, I thought it would be great to allow users to pass any HTML color they wanted as one of the parameter to the function But