-
Notifications
You must be signed in to change notification settings - Fork 1
Open
Labels
security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource
Description
WS-2015-0017 - Medium Severity Vulnerability
Vulnerable Library - uglify-js-2.2.5.tgz
JavaScript parser, mangler/compressor and beautifier toolkit
path: /tmp/git/keno-server/node_modules/transformers/node_modules/uglify-js/package.json
Library home page: http://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz
Dependency Hierarchy:
- jade-1.11.0.tgz (Root Library)
- transformers-2.1.0.tgz
- ❌ uglify-js-2.2.5.tgz (Vulnerable Library)
- transformers-2.1.0.tgz
Vulnerability Details
Uglify-js is vulnerable to regular expression denial of service (ReDoS) when certain types of input is passed into .parse().
Publish Date: 2015-10-24
URL: WS-2015-0017
Suggested Fix
Type: Upgrade version
Origin: https://nodesecurity.io/advisories/48
Release Date: 2015-10-24
Fix Resolution: Update to version 2.6.0 or later
Step up your Open Source Security Game with WhiteSource here
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource