org.webjars.npm:mocha@3.5.3 vulnerabilities

  • latest version

    10.2.0

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    8 months ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.npm:mocha package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Regular Expression Denial of Service (ReDoS)

org.webjars.npm:mocha is a test framework for node.js & the browser.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in the clean function in utils.js.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade org.webjars.npm:mocha to version 10.2.0 or higher.

[,10.2.0)
  • H
Regular Expression Denial of Service (ReDoS)

org.webjars.npm:mocha is a test framework for node.js & the browser.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). If the stack trace in utils.js begins with a large error message (>= 20k characters), and full-trace is not undisabled, utils.stackTraceFilter() will take exponential time to run.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade org.webjars.npm:mocha to version 6.0.0 or higher.

[,6.0.0)