Search for packages
| purl | pkg:npm/nanoid@3.1.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-7cky-3c29-zyar
Aliases: CVE-2021-23566 GHSA-qrpm-p2h7-hrv2 |
Exposure of Sensitive Information to an Unauthorized Actor in nanoid The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated. |
Affected by 1 other vulnerability. |
|
VCID-s6f3-3mxh-ekfr
Aliases: CVE-2024-55565 GHSA-mwcw-c2x4-8c55 |
Predictable results in nanoid generation when given non-integer values When nanoid is called with a fractional value, there were a number of undesirable effects: 1. in browser and non-secure, the code infinite loops on while (size--) 2. in node, the value of poolOffset becomes fractional, causing calls to nanoid to return zeroes until the pool is next filled 3. if the first call in node is a fractional argument, the initial buffer allocation fails with an error Version 3.3.8 and 5.0.9 are fixed. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||