We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Today I got a message from https://nodesecurity.io:
142 - Buffer Overread
Vulnerable: All - Patched: None - Path: multer@1.3.0 > concat-stream@1.6.0
How to fix Consider using the --zero-fill-buffers command line argument to zero out buffer before using them.
Avoid passing numeric values to the write function.
The text was updated successfully, but these errors were encountered:
Duplicate of #56.
Sorry, something went wrong.
This was fixed in concat-stream 1.5.2, yet for some reason nodesecurity still shows it as vulnerable...
No branches or pull requests
Today I got a message from https://nodesecurity.io:
142 - Buffer Overread
Vulnerable: All - Patched: None - Path: multer@1.3.0 > concat-stream@1.6.0
How to fix
Consider using the --zero-fill-buffers command line argument to zero out buffer before using them.
Avoid passing numeric values to the write function.
The text was updated successfully, but these errors were encountered: