Search CVE reports
1 – 5 of 5 results
(follow-redirects is an open source, drop-in replacement for Node's `ht ...)
1 affected package
node-follow-redirects
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| node-follow-redirects | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Some fixes available 3 of 6
follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain...
1 affected package
node-follow-redirects
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| node-follow-redirects | Not affected | Not affected | Fixed | Fixed | Fixed |
Some fixes available 3 of 7
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to...
1 affected package
node-follow-redirects
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| node-follow-redirects | Not affected | Not affected | Fixed | Fixed | Fixed |
Some fixes available 2 of 8
Improper Removal of Sensitive Information Before Storage or Transfer in NPM follow-redirects prior to 1.14.8.
1 affected package
node-follow-redirects
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| node-follow-redirects | Not affected | Not affected | Not affected | Fixed | Fixed |
Some fixes available 2 of 5
follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
1 affected package
node-follow-redirects
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| node-follow-redirects | Not affected | Not affected | Not affected | Fixed | Fixed |