org.webjars.npm:picomatch@2.2.3

  • latest version

    4.0.3

  • first published

    6 years ago

  • latest version published

    8 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.webjars.npm:picomatch package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Prototype Pollution

    Affected versions of this package are vulnerable to Prototype Pollution via the POSIX_REGEX_SOURCE object. An attacker can cause unintended files to be matched by injecting specially crafted POSIX bracket expressions that reference inherited method names, leading to incorrect glob matching behavior. This can result in security-relevant logic errors in applications that rely on glob matching for filtering, validation, or access control.

    How to fix Prototype Pollution?

    A fix was pushed into the master branch but not yet published.

    [0,)
    • H
    Regular Expression Denial of Service (ReDoS)

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. An attacker can cause excessive CPU consumption and block the event loop by supplying crafted extglob patterns that trigger catastrophic backtracking in regular expressions.

    How to fix Regular Expression Denial of Service (ReDoS)?

    A fix was pushed into the master branch but not yet published.

    [0,)