This repository has been archived by the owner on Jul 13, 2021. It is now read-only.
CVE-2016-10542 (High) detected in ws-1.0.1.tgz, ws-1.1.0.tgz #63
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2016-10542 - High Severity Vulnerability
ws-1.0.1.tgz
simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455
Library home page: https://registry.npmjs.org/ws/-/ws-1.0.1.tgz
Path to dependency file: curratelo/package.json
Path to vulnerable library: curratelo/node_modules/engine.io-client/node_modules/ws/package.json
Dependency Hierarchy:
ws-1.1.0.tgz
simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455
Library home page: https://registry.npmjs.org/ws/-/ws-1.1.0.tgz
Path to dependency file: curratelo/package.json
Path to vulnerable library: curratelo/node_modules/engine.io/node_modules/ws/package.json
Dependency Hierarchy:
ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a
ws
server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.Publish Date: 2018-05-31
URL: CVE-2016-10542
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858
Release Date: 2018-12-15
Fix Resolution: v2.4.24
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: