This repository was archived by the owner on Jul 13, 2021. It is now read-only.
WS-2016-0040 (High) detected in ws-1.0.1.tgz, ws-1.1.0.tgz #39
Labels
security vulnerability
Security vulnerability detected by WhiteSource
WS-2016-0040 - High Severity Vulnerability
ws-1.0.1.tgz
simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455
Library home page: https://registry.npmjs.org/ws/-/ws-1.0.1.tgz
Path to dependency file: curratelo/package.json
Path to vulnerable library: curratelo/node_modules/engine.io-client/node_modules/ws/package.json
Dependency Hierarchy:
ws-1.1.0.tgz
simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455
Library home page: https://registry.npmjs.org/ws/-/ws-1.1.0.tgz
Path to dependency file: curratelo/package.json
Path to vulnerable library: curratelo/node_modules/engine.io/node_modules/ws/package.json
Dependency Hierarchy:
By sending an overly long websocket payload to a ws server, it is possible to crash the node process.
Publish Date: 2016-06-23
URL: WS-2016-0040
Base Score Metrics:
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/120/versions
Release Date: 2016-06-23
Fix Resolution: 1.1.1
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: