tough-cookie@0.10.0 vulnerabilities
RFC6265 Cookies and Cookie Jar for node.js
-
latest version
4.1.3
-
latest non vulnerable version
-
first published
13 years ago
-
latest version published
a year ago
-
licenses detected
- >=0.9.0 <0.13.0
Direct Vulnerabilities
Known vulnerabilities in the tough-cookie package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js. Affected versions of this package are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in How to fix Prototype Pollution? Upgrade |
<4.1.3
|
Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks. An attacker may pass a specially crafted cookie, causing the server to hang. How to fix Regular Expression Denial of Service (ReDoS)? Upgrade to version |
<2.3.3
|
tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). An attacker can provide a cookie, which nearly matches the pattern being matched. This will cause the regular expression matching to take a long time, all the while occupying the event loop and preventing it from processing other requests and making the server unavailable (a Denial of Service attack). How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
>=0.9.7 <2.3.0
|
tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). An attacker can provide a cookie, which nearly matches the pattern being matched. This will cause the regular expression matching to take a long time, all the while occupying the event loop and preventing it from processing other requests and making the server unavailable (a Denial of Service attack). How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
>=0.9.7 <2.3.0
|