org.webjars.npm:path-to-regexp@1.5.3 vulnerabilities
-
latest version
6.3.0
-
latest non vulnerable version
-
first published
8 years ago
-
latest version published
2 months ago
-
licenses detected
- [0.1.3,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.npm:path-to-regexp package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) when including multiple regular expression parameters in a single segment, which will produce the regular expression Note:
While the 8.0.0 release has completely eliminated the vulnerable functionality, prior versions that have received the patch to mitigate backtracking may still be vulnerable if custom regular expressions are used. So it is strongly recommended for regular expression input to be controlled to avoid malicious performance degradation in those versions. This behavior is enforced as of version 7.1.0 via the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
[,6.3.0)
|