Description
All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2010 | All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function. |
Github GHSA |
GHSA-7xrj-f5rp-j55h | Uncontrolled Resource Consumption in transpile |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T20:21:41.063Z
Reserved: 2021-01-08T00:00:00.000Z
Link: CVE-2021-23429
No data.
Status : Modified
Published: 2021-08-24T08:15:21.543
Modified: 2024-11-21T05:51:44.597
Link: CVE-2021-23429
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA