Overview
About vulnerability
Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js.
This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
Details
- Affected product:
- Acorn , AlmaLinux 9.2 ESU , Angular , Next.js , Node.js , TuxCare 9.6 ESU , Ubuntu 16.04 ELS , Ubuntu 18.04 ELS , browser-env , cacheable-request , condition-travis , form-data , got , jQuery , javascript-test-reporter , jpm , jsdom , last-release-npm , loopback , loopback-connector-remote , npm-registry-client , protractor , request , semantic-release , sign-addon , strong-remoting , styled-jsx , travis-deploy-once , webdriver-manager , window , yui
- Affected packages:
- python3.5 @ 3.5.2 (+85 more)
Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js.
This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.