snyk issue reported on multer/dicer #1297
Replies: 1 comment
-
Update multer to v2 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Based on snyk review the current version of multer/dicer is reporting an issue as below. Can you please provide us a resolution due to its criticality
dicer Denial of Service (DoS)
Detailed paths
Introduced through: [email protected] › [email protected] › [email protected] › [email protected]
Fix: No remediation path available.
Security information
Factors contributing to the scoring:
Snyk: CVSS v3.1 7.5 - High Severity
NVD: CVSS v3.1 7.5 - High Severity
Why are the scores different? Learn how Snyk evaluates vulnerability scores
Overview
Affected versions of this package are vulnerable to Denial of Service (DoS). A malicious attacker can send a modified form to server, and crash the nodejs service. An attacker could sent the payload again and again so that the service continuously crashes.
Denial of Service (DoS) in dicer | CVE-2022-24434 | Snyk
High severity (7.5) Denial of Service (DoS) in dicer | CVE-2022-24434
Beta Was this translation helpful? Give feedback.
All reactions