We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Parse, validate, manipulate, and display dates
path: /zerhuel-online-platform/xx_public/assets/themes/corastore/vendor/daterangepicker/moment.min.js
Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.13.0/moment.min.js
Dependency Hierarchy:
path: /zerhuel-online-platform/xx_public/assets/themes/corastore/vendor/daterangepicker/moment.js
Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.13.0/moment.js
Found in HEAD commit: 53adf471a707419dfe40ccb6f77c78f9c2216a00
Regular expression denial of service vulnerability in the moment package, by using a specific 40 characters long string in the "format" method.
Publish Date: 2016-10-24
URL: WS-2016-0075
Base Score Metrics not available
Type: Change files
Origin: moment/moment@663f33e
Release Date: 2016-10-24
Fix Resolution: Replace or update the following files: month.js, lt.js
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered:
No branches or pull requests
WS-2016-0075 - Medium Severity Vulnerability
Vulnerable Libraries - moment-2.13.0.min.js, moment-2.13.0.js
moment-2.13.0.min.js
Parse, validate, manipulate, and display dates
path: /zerhuel-online-platform/xx_public/assets/themes/corastore/vendor/daterangepicker/moment.min.js
Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.13.0/moment.min.js
Dependency Hierarchy:
moment-2.13.0.js
Parse, validate, manipulate, and display dates
path: /zerhuel-online-platform/xx_public/assets/themes/corastore/vendor/daterangepicker/moment.js
Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.13.0/moment.js
Dependency Hierarchy:
Found in HEAD commit: 53adf471a707419dfe40ccb6f77c78f9c2216a00
Vulnerability Details
Regular expression denial of service vulnerability in the moment package, by using a specific 40 characters long string in the "format" method.
Publish Date: 2016-10-24
URL: WS-2016-0075
CVSS 2 Score Details (5.8)
Base Score Metrics not available
Suggested Fix
Type: Change files
Origin: moment/moment@663f33e
Release Date: 2016-10-24
Fix Resolution: Replace or update the following files: month.js, lt.js
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: