sync-message-port is vulnerable to Denial of Service (DoS)
22
Low Risk
Affected versions of this package contain a race condition in the synchronous message-port implementation that can lead to counter underflow and inconsistent message state, resulting in unexpected crashes. This issue can be triggered to cause a denial of service by repeatedly hitting the faulty code path.
You are affected if you are using a version that falls within the vulnerable range.
sync-message-port is vulnerable to Denial of Service (DoS) in versions 0.0.1 - 1.1.3.
Upgrade the sync-message-port library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant