3.1.10
14 years ago
11 months ago
Known vulnerabilities in the ejs package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
ejs is a popular JavaScript templating engine. Affected versions of this package are vulnerable to Improper Control of Dynamically-Managed Code Resources due to the lack of certain pollution protection mechanisms. An attacker can exploit this vulnerability to manipulate object properties that should not be accessible or modifiable. Note: Even after updating to the fix version that adds enhanced protection against prototype pollution, it is still possible to override the How to fix Improper Control of Dynamically-Managed Code Resources? Upgrade | <3.1.10 |
ejs is a popular JavaScript templating engine. Affected versions of this package are vulnerable to Remote Code Execution (RCE) by passing an unrestricted render option via the Note: This vulnerability is exploitable only if the server is already vulnerable to Prototype Pollution. How to fix Remote Code Execution (RCE)? Upgrade | <3.1.7 |
ejs is a popular JavaScript templating engine. Affected versions of this package are vulnerable to Arbitrary Code Injection via the How to fix Arbitrary Code Injection? Upgrade | <3.1.6 |
There's also a Remote Code Execution & Denial of Service vulnerabilities caused by the same behaviour. How to fix Cross-site Scripting (XSS)? The vulnerability can be resolved by either using the GitHub integration to generate a pull-request from your dashboard or by running | <2.5.5 |
There's also a Remote Code Execution & Cross-site Scripting vulnerabilities caused by the same behaviour. How to fix Denial of Service (DoS)? The vulnerability can be resolved by either using the GitHub integration to generate a pull-request from your dashboard or by running | <2.5.5 |
There's also a Cross-site Scripting & Denial of Service vulnerabilities caused by the same behaviour. How to fix Arbitrary Code Execution? The vulnerability can be resolved by either using the GitHub integration to generate a pull-request from your dashboard or by running | <2.5.3 |