You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Request is an http client. If a request is made using multipart, and the body type is a number, then the specified number of non-zero memory is passed in the body. This affects Request >=2.2.6 <2.47.0 || >2.51.0 <=2.67.0.
mend-bolt-for-githubbot
changed the title
CVE-2017-16026 (Medium) detected in request-2.67.0.tgz
CVE-2017-16026 (Medium) detected in https://source.codeaurora.org/quic/le/platform/external/node/v0.10.44
Nov 18, 2020
CVE-2017-16026 - Medium Severity Vulnerability
Vulnerable Library - https://source.codeaurora.org/quic/le/platform/external/node/v0.10.44
Library home page: https://source.codeaurora.org/quic/le/platform/external/node/
Found in HEAD commit: cf1f1c0344fa01406f61ff7437a72714be39b47e
Vulnerable Source Files (2)
angular/packages/benchpress/node_modules/request/lib/multipart.js
angular/packages/benchpress/node_modules/request/lib/multipart.js
Vulnerability Details
Request is an http client. If a request is made using
multipart
, and the body type is anumber
, then the specified number of non-zero memory is passed in the body. This affects Request >=2.2.6 <2.47.0 || >2.51.0 <=2.67.0.Publish Date: 2018-06-04
URL: CVE-2017-16026
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-16026
Release Date: 2018-06-04
Fix Resolution: 2.47.1,2.67.1
The text was updated successfully, but these errors were encountered: