1.3.1
10 years ago
2 years ago
Known vulnerabilities in the org.webjars.npm:node-forge package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version | 
|---|---|
 org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA's  How to fix Improper Verification of Cryptographic Signature? Upgrade   | [,1.3.1)  | 
 org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA How to fix Improper Verification of Cryptographic Signature? Upgrade   | [,1.3.1)  | 
 org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA's  How to fix Improper Verification of Cryptographic Signature? Upgrade   | [,1.3.1)  | 
 org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Prototype Pollution via the  How to fix Prototype Pollution? Upgrade   | [,1.3.1)  | 
 org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Open Redirect via  PoC:
How to fix Open Redirect? Upgrade   | [,1.3.1)  | 
 org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Prototype Pollution via the  Note: version 0.10.0 is a breaking change removing the vulnerable functions. POC:
How to fix Prototype Pollution? Upgrade   | [,1.3.1)  |