You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 16, 2023. It is now read-only.
Potential security vulnerability received. Please review and correct at next test/fix-update:
1 stringstream vulnerability found in …/cli/package-lock.json 11 days ago
Remediation
Upgrade stringstream to version 0.0.6 or later. For example:
"dependencies": {
"stringstream": ">=0.0.6"
}
or…
"devDependencies": {
"stringstream": ">=0.0.6"
}
Always verify the validity and compatibility of suggestions with your codebase.
Details
WS-2018-0103
More information
moderate severity
Vulnerable versions: < 0.0.6
Patched version: 0.0.6
stringstream versions before 0.0.6 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below.
The text was updated successfully, but these errors were encountered:
Potential security vulnerability received. Please review and correct at next test/fix-update:
1 stringstream vulnerability found in …/cli/package-lock.json 11 days ago
Remediation
Upgrade stringstream to version 0.0.6 or later. For example:
"dependencies": {
"stringstream": ">=0.0.6"
}
or…
"devDependencies": {
"stringstream": ">=0.0.6"
}
Always verify the validity and compatibility of suggestions with your codebase.
Details
WS-2018-0103
More information
moderate severity
Vulnerable versions: < 0.0.6
Patched version: 0.0.6
stringstream versions before 0.0.6 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below.
The text was updated successfully, but these errors were encountered: