org.webjars.npm:send@0.1.4 vulnerabilities
-
latest version
0.18.0
-
first published
9 years ago
-
latest version published
2 years ago
-
licenses detected
- [0.1.4,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.npm:send package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Cross-site Scripting due to improper user input sanitization passed to the Note: Exploiting this vulnerability requires the following:
How to fix Cross-site Scripting? A fix was pushed into the |
[0,)
|
Send is a library for streaming files from the file system as an http response. It supports partial responses (Ranges), conditional-GET negotiation, high test coverage, and granular events which may be leveraged to take appropriate actions in your application or framework. Affected versions of this package are vulnerable to a Root Path Disclosure. How to fix Root Path Disclosure? Upgrade |
[,0.11.1)
|
send is a library for streaming files from the file system. Affected versions of this package are vulnerable to Directory-Traversal attacks due to insecure comparison.
When relying on the root option to restrict file access a malicious user may escape out of the restricted directory and access files in a similarly named directory. For example, a path like How to fix Directory Traversal? Upgrade to a version greater than or equal to 0.8.4. |
[,0.8.4)
|