You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Mocha is vulnerable to ReDoS attack. If the stack trace in utils.js begins with a large error message, and full-trace is not enabled, utils.stackTraceFilter() will take exponential run time.
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
mend-for-github-combot
changed the title
WS-2019-0425 (Medium) detected in mocha-2.2.5.js
WS-2019-0425 (Medium) detected in mocha-2.2.5.js - autoclosed
May 4, 2024
mend-for-github-combot
changed the title
WS-2019-0425 (Medium) detected in mocha-2.2.5.js - autoclosed
WS-2019-0425 (Medium) detected in mocha-2.2.5.js
May 4, 2024
WS-2019-0425 - Medium Severity Vulnerability
simple, flexible, fun test framework
Library home page: https://cdnjs.cloudflare.com/ajax/libs/mocha/2.2.5/mocha.js
Path to dependency file: /node_modules/js-base64/test/index.html
Path to vulnerable library: /node_modules/js-base64/test/index.html
Dependency Hierarchy:
Found in HEAD commit: 05a5db07c2365430af002a88f0230070e3db5c49
Found in base branch: develop
Mocha is vulnerable to ReDoS attack. If the stack trace in utils.js begins with a large error message, and full-trace is not enabled, utils.stackTraceFilter() will take exponential run time.
Publish Date: 2019-01-24
URL: WS-2019-0425
Base Score Metrics:
Type: Upgrade version
Release Date: 2019-01-24
Fix Resolution: v6.0.0
The text was updated successfully, but these errors were encountered: