Vulnerabilities/

dectalk-tts Uses Unencrypted HTTP Request

Severity:
High

Description

In [email protected], network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack.

Recommendation

Update the dectalk-tts package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
dectalk-tts
Anything's wrong? Let us know Last updated on April 05, 2024

This issue is available in SmartScanner Professional

See Pricing