1.4.3
6 years ago
6 years ago
Known vulnerabilities in the org.webjars.bowergithub.unshiftio:url-parse package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.webjars.bowergithub.unshiftio:url-parse is a Small footprint URL parser that works seamlessly across Node.js and browser environments. Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key due to incorrect conversion of How to fix Authorization Bypass Through User-Controlled Key? There is no fixed version for | [0,) |
org.webjars.bowergithub.unshiftio:url-parse is a Small footprint URL parser that works seamlessly across Node.js and browser environments. Affected versions of this package are vulnerable to Access Restriction Bypass due to improper parsing process, that may lead to incorrect handling of authentication credentials and hostname, which allows bypass of hostname validation. How to fix Access Restriction Bypass? There is no fixed version for | [0,) |
org.webjars.bowergithub.unshiftio:url-parse is a Small footprint URL parser that works seamlessly across Node.js and browser environments. Affected versions of this package are vulnerable to Improper Input Validation. It mishandles certain uses of backslash such as How to fix Improper Input Validation? There is no fixed version for | [0,) |
org.webjars.bowergithub.unshiftio:url-parse is a Small footprint URL parser that works seamlessly across Node.js and browser environments. Affected versions of this package are vulnerable to Improper Input Validation. When using How to fix Improper Input Validation? There is no fixed version for | [0,) |