You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There is a potential remote memory exposure vulnerability in request from version 2.2.5 before version 2.68.0. If the node process makes a request with a multipart attachment, and the type of the body option is a Number, then that many bytes of uninitialized memory will be sent in the body of the request.
WS-2016-0025 - Medium Severity Vulnerability
Vulnerable Library - request-2.16.6.tgz
Simplified HTTP request client.
path: /tmp/git/sqs-poller/node_modules/request/package.json
Library home page: http://registry.npmjs.org/request/-/request-2.16.6.tgz
Dependency Hierarchy:
Vulnerability Details
There is a potential remote memory exposure vulnerability in request from version 2.2.5 before version 2.68.0. If the node process makes a request with a multipart attachment, and the type of the body option is a Number, then that many bytes of uninitialized memory will be sent in the body of the request.
Publish Date: 2016-03-22
URL: WS-2016-0025
CVSS 2 Score Details (6.1)
Base Score Metrics not available
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: