ulid is vulnerable to Use of Insufficiently Random Values
18
Low Risk
Affected versions of this package are vulnerable to weak random ID generation. Due to incorrect processing of random bytes, the PRNG produces biased output, causing some characters to appear more frequently than others. This reduces entropy, making generated IDs more predictable and enabling partial resource enumeration.
You are affected if you are using a version that falls within the vulnerable range.
ulid is vulnerable to Use of Insufficiently Random Values in versions 3.0.0 - 3.0.1.
Upgrade the ulid library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant