You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mem is an optimization technique used to speed up consecutive function calls by caching the result of calls with identical input.
Affected versions of this package are vulnerable to Denial of Service (DoS) attacks. Old results are not deleted from the cache and could cause a memory leak.
More about this issue
medium severity
Regular Expression Denial of Service (ReDoS)
content-type-parser parses the Content-Type header field into an introspectable data structure.
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the user agent parser. It used a regular expression (/^(.?)/(.?)([\t ];.)?$/) in order to parse user agents. This can cause a very moderate impact of about 4 seconds matching time for data 30k characters long.
More about this issue
medium severity
Time of Check Time of Use (TOCTOU)
Affected versions of chownr are vulnerable to Time of Check Time of Use (TOCTOU). It does not dereference symbolic links and changes the owner of the link.
More about this issue
low severity
Regular Expression Denial of Service (ReDoS)
eslint is an AST-based pattern checker for JavaScript.
Affected versions of the package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. This can cause an impact of about 10 seconds matching time for data 100k characters long.
More about this issue
low severity
Regular Expression Denial of Service (ReDoS)
braces is a Bash-like brace expansion, implemented in JavaScript.
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. It used a regular expression (^{(,+(?:({,+})),|,(?:({,+})),+)}) in order to detects empty braces. This can cause an impact of about 10 seconds matching time for data 50K characters long.
The text was updated successfully, but these errors were encountered:
here are vulnerabilities (credit to snyk.io):
Denial of Service (DoS)
Detailed paths and remediation
Overview
mem is an optimization technique used to speed up consecutive function calls by caching the result of calls with identical input.
Affected versions of this package are vulnerable to Denial of Service (DoS) attacks. Old results are not deleted from the cache and could cause a memory leak.
More about this issue
medium severity
Regular Expression Denial of Service (ReDoS)
Detailed paths and remediation
Overview
content-type-parser parses the Content-Type header field into an introspectable data structure.
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the user agent parser. It used a regular expression (/^(.?)/(.?)([\t ];.)?$/) in order to parse user agents. This can cause a very moderate impact of about 4 seconds matching time for data 30k characters long.
More about this issue
medium severity
Time of Check Time of Use (TOCTOU)
Detailed paths and remediation
Overview
Affected versions of chownr are vulnerable to Time of Check Time of Use (TOCTOU). It does not dereference symbolic links and changes the owner of the link.
More about this issue
low severity
Regular Expression Denial of Service (ReDoS)
Detailed paths and remediation
Overview
eslint is an AST-based pattern checker for JavaScript.
Affected versions of the package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. This can cause an impact of about 10 seconds matching time for data 100k characters long.
More about this issue
low severity
Regular Expression Denial of Service (ReDoS)
Detailed paths and remediation
…and 25 more
Overview
braces is a Bash-like brace expansion, implemented in JavaScript.
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. It used a regular expression (^{(,+(?:({,+})),|,(?:({,+})),+)}) in order to detects empty braces. This can cause an impact of about 10 seconds matching time for data 50K characters long.
The text was updated successfully, but these errors were encountered: