1.3.1
10 years ago
3 years ago
Known vulnerabilities in the org.webjars.npm:node-forge package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Uncontrolled Recursion via the How to fix Uncontrolled Recursion? A fix was pushed into the | [0,) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the How to fix Integer Overflow or Wraparound? A fix was pushed into the | [0,) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Interpretation Conflict via the How to fix Interpretation Conflict? A fix was pushed into the | [0,) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA's How to fix Improper Verification of Cryptographic Signature? Upgrade | [,1.3.1) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA How to fix Improper Verification of Cryptographic Signature? Upgrade | [,1.3.1) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA's How to fix Improper Verification of Cryptographic Signature? Upgrade | [,1.3.1) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Prototype Pollution via the How to fix Prototype Pollution? Upgrade | [,1.3.1) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Open Redirect via PoC:
How to fix Open Redirect? Upgrade | [,1.3.1) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Prototype Pollution via the Note: version 0.10.0 is a breaking change removing the vulnerable functions. POC:
How to fix Prototype Pollution? Upgrade | [,1.3.1) |
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. This can cause an impact of about 10 seconds matching time for data 3K characters long. How to fix Regular Expression Denial of Service (ReDoS)? Update | [,0.7.4) |