Search CVE reports
1 – 5 of 5 results
(follow-redirects is an open source, drop-in replacement for Node's `ht ...)
1 affected package
node-follow-redirects
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| node-follow-redirects | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain...
1 affected package
node-follow-redirects
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| node-follow-redirects | Needs evaluation | Needs evaluation | Needs evaluation | Ignored | Needs evaluation |
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to...
1 affected package
node-follow-redirects
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| node-follow-redirects | Needs evaluation | Needs evaluation | Needs evaluation | Ignored | Ignored |
Improper Removal of Sensitive Information Before Storage or Transfer in NPM follow-redirects prior to 1.14.8.
1 affected package
node-follow-redirects
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| node-follow-redirects | Needs evaluation | Needs evaluation | Needs evaluation | Ignored | Ignored |
follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
1 affected package
node-follow-redirects
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| node-follow-redirects | Not affected | Not affected | Needs evaluation | Ignored | Ignored |