You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
serialize-to-js versions before 2.0.0 are vulnerable to DOS when ser input is not properly validated, allowing attackers to provide inputs that lead the execution to loop indefinitely.
WS-2019-0253 - Medium Severity Vulnerability
serialize objects to javascript
Library home page: https://registry.npmjs.org/serialize-to-js/-/serialize-to-js-1.2.2.tgz
Path to dependency file: /tmp/ws-scm/infinite/package.json
Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/serialize-to-js/package.json
Dependency Hierarchy:
Found in HEAD commit: f686a0f9119ce1b31715bd19e5a2f4705af80098
serialize-to-js versions before 2.0.0 are vulnerable to DOS when ser input is not properly validated, allowing attackers to provide inputs that lead the execution to loop indefinitely.
Publish Date: 2019-09-11
URL: WS-2019-0253
Base Score Metrics not available
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/790
Release Date: 2019-09-11
Fix Resolution: 2.0.0
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: