1.5.0
2 years ago
7 days ago
Known vulnerabilities in the seroval package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
seroval is a Stringify JS values Affected versions of this package are vulnerable to Deserialization of Untrusted Data in the Note: This is only exploitable if the attacker has partial knowledge of how the serialized data is processed during runtime. How to fix Deserialization of Untrusted Data? Upgrade | <1.4.2 |
seroval is a Stringify JS values Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | <1.4.2 |
seroval is a Stringify JS values Affected versions of this package are vulnerable to Prototype Pollution in the JSON deserialization process. An attacker can manipulate the prototype of objects by supplying malicious object keys during deserialization. How to fix Prototype Pollution? Upgrade | <1.4.2 |
seroval is a Stringify JS values Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the encoded array lengths serialization process. An attacker can cause excessive processing time by overriding encoded array lengths with extremely large values. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <1.4.2 |
seroval is a Stringify JS values Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling when serializing objects with very large depth. An attacker can cause resource exhaustion and disrupt service availability by submitting objects with excessive nesting depth. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <1.4.2 |