diff --git a/advisories/github-reviewed/2017/10/GHSA-f522-ffg8-j8r6/GHSA-f522-ffg8-j8r6.json b/advisories/github-reviewed/2017/10/GHSA-f522-ffg8-j8r6/GHSA-f522-ffg8-j8r6.json index 50f87a396f345..cce569043195a 100644 --- a/advisories/github-reviewed/2017/10/GHSA-f522-ffg8-j8r6/GHSA-f522-ffg8-j8r6.json +++ b/advisories/github-reviewed/2017/10/GHSA-f522-ffg8-j8r6/GHSA-f522-ffg8-j8r6.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-f522-ffg8-j8r6", - "modified": "2024-10-02T17:16:12Z", + "modified": "2024-10-02T17:16:13Z", "published": "2017-10-24T18:33:35Z", "aliases": [ "CVE-2016-2537" ], "summary": "Regular Expression Denial of Service in is-my-json-valid", - "details": "Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function.\n\n\n## Recommendation\n\nUpdate to version 1.4.1, 2.17.2 or later.", + "details": "Version of `is-my-json-valid` before 1.4.1 or v2.12.4 are vulnerable to regular expression denial of service (ReDoS) via the email validation function.\n\n\n## Recommendation\n\nUpdate to version 1.4.1, 2.17.2 or later.", "severity": [ { "type": "CVSS_V3", @@ -28,11 +28,14 @@ "introduced": "0" }, { - "fixed": "2.17.2" + "fixed": "v2.12.4" } ] } - ] + ], + "database_specific": { + "last_known_affected_version_range": "< 2.12.4" + } } ], "references": [