2.29.4
9 years ago
2 years ago
Known vulnerabilities in the org.webjars.bower:moment package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.webjars.bower:moment is a lightweight JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,2.29.4) |
org.webjars.bower:moment is a lightweight JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of this package are vulnerable to Directory Traversal when a user provides a locale string which is directly used to switch moment locale. How to fix Directory Traversal? Upgrade | [,2.29.3) |
org.webjars.bower:moment is a lightweight JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). It used a regular expression ( How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,2.19.3) |
Affected versions of the package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks for any locale that has separate format and standalone options and An attacker can provide a specially crafted input to the | [,2.15.2) |
An attacker can provide a long value to the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,2.11.2) |