Safer version of eval()
safe-eval has critical vulnerabilities — do not use
| Severity | ID | Summary | Fixed in |
|---|---|---|---|
| critical | CVE-2022-25904 | safe-eval vulnerable to Prototype Pollution | — |
| critical | CVE-2023-26122 | safe-eval vulnerable to Sandbox Bypass due to improper input sanitization | — |
| high | GHSA-9pcf-h8q9-63f6 | Sandbox Breakout / Arbitrary Code Execution in safe-eval | — |
| critical | CVE-2023-26121 | safe-eval vulnerable to Prototype Pollution via the safeEval function | — |
| critical | CVE-2020-7710 | Sandbox Breakout / Arbitrary Code Execution in safe-eval | — |
Get this data programmatically — free, no authentication.
curl https://depscope.dev/api/check/npm/safe-evalFirst published · 2015-08-30T19:23:49.558Z
Last updated · 2018-07-27T07:36:17.187Z