Description
Raneto v0.17.0 employs weak password complexity requirements, allowing attackers to crack user passwords via brute-force attacks. Version 0.17.1 contains security mitigations for this and other vulnerabilities.
Recommendation
Update the raneto
package to the latest compatible version. Followings are version details:
- Affected version(s): <= 0.17.0
- Patched version(s): 0.17.1
References
- GHSA-7942-2fx8-qhpf
- cwe.mitre.org
- gainsec.com
- raneto.com
- CVE-2022-35143
- CWE-521
- CAPEC-310
- OWASP 2021-A6
- OWASP 2021-A7
Related Issues
- @digitalocean/do-markdownit has Type Confusion vulnerability - CVE-2025-59717
- node-opcua-alarm-condition prototype pollution vulnerability - CVE-2024-57086
- Parse Server before v3.4.1 vulnerable to Denial of Service - CVE-2019-1020012
- axios Inefficient Regular Expression Complexity vulnerability - CVE-2021-3749
- Tags:
- npm
- raneto
Anything's wrong? Let us know Last updated on January 31, 2023