org.webjars.npm:mocha@2.2.5 vulnerabilities

  • latest version

    10.2.0

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    1 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.webjars.npm:mocha package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Regular Expression Denial of Service (ReDoS)

    org.webjars.npm:mocha is a test framework for node.js & the browser.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in the clean function in utils.js.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade org.webjars.npm:mocha to version 10.2.0 or higher.

    [,10.2.0)
    • H
    Regular Expression Denial of Service (ReDoS)

    org.webjars.npm:mocha is a test framework for node.js & the browser.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). If the stack trace in utils.js begins with a large error message (>= 20k characters), and full-trace is not undisabled, utils.stackTraceFilter() will take exponential time to run.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade org.webjars.npm:mocha to version 6.0.0 or higher.

    [,6.0.0)